You are attempting to block uploads of password-protected files. You have created the file profile shown in the exhibit. Where should you add this profile to use in a Real-time Protection policy?
A.
Add the profile to a DLP profile that is used in a Real-time Protection policy.
B.
Add the profile to a Malware Detection profile that is used in a Real-time Protection policy.
C.
Add the profile directly to a Real-time Protection policy as a Constraint.
D.
Add the profile to a Constraint profile that is used in a Real-time Protection policy.
Sorry - the primary objective is to block password-protected file uploads, option A is the most appropriate. Option B may not be the best practice in this case, as it does not specifically focus on data loss prevention.
Worng! B. Add the profile to a Malware Detection profile that is used in a Real-time Protection policy.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Metgatz
1 month, 4 weeks agoMetgatz
1 month, 4 weeks ago