Which two Network Discover/Cloud Storage targets apply Information Centric Encryption as policy response rules?
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
A DLP administrator needs to remove an agent its associated events from an Endpoint server.
Which Agent Task should the administrator perform to disable the agent’s visibility in the Enforce management console?
A compliance officer needs to understand how the company is complying with its data security policies over time.
Which report should be compliance officer generate to obtain the compliance information?
What is the correct order for data in motion when a customer has integrated their CloudSOC and DLP solutions?