What is Application Detection Configuration?
What detection method utilizes Data Identifiers?
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans.When does the DLP agent stop scanning?
Which two detection servers are available as virtual appliances? (Choose two.)
A company needs to secure the content of all Mergers and Acquisitions Agreements However, the standard text included in all company literature needs to be excluded.How should the company ensure that this standard text is excluded from detection?
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a `copy to USB device` operation?