McAfee NDLP
McAfee Network Data Loss Prevention (NDLP) is a data protection solution developed by McAfee, a leading cybersecurity company. NDLP is designed to help organizations prevent data breaches and protect sensitive information from unauthorized access, disclosure, or loss.
It focuses on monitoring and controlling the network traffic within an organization to identify and prevent data leaks or unauthorized transfers. It works by inspecting data in motion, including email, web traffic, file transfers, and other network protocols, to detect and prevent the transmission of sensitive data.
Take this assessment to check how good you are with McAfee NDLP.
Click the Rewards tab for eligibility requirements.
Read the FAQs tab carefully for Instructions before beginning the assessment.
NYXPoints are used to generate the Leaderboard (coming soon). They are awarded for achieving a certain score.
- 200 nyxpoints for a passing score of 80% or more
- 300 nyxpoints for a perfect score of 100%
- Didn’t pass? You still get 30 nyxpoints for attempting the assesment
IMPORTANT instructions for taking the Assessment
- The timer starts when you click Start Assessment
- DO NOT refresh/reload the page or use the back button to navigate away from the page.
- Navigating away from the assessment page DOES NOT stop/pause the timer and the will restart the assessment when you come back to it. The answers are NOT saved.
General
- There are NO pre-requisites to take this assessment. Take this assessment even if you are completely new to Linux.
- The assessment is completely FREE.
- Preferably take it in a closed book mode.
- DO NOT copy/paste, share or upload questions elsewhere.
Eligible Rewards
300 NyxCoins*
* NyxCoins vary on score
Assessment Summary
0 of 30 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 30 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 30
1. Question
Which McAfee DLP solution can remediate sensitive data residing on local network and cloud repositories?
CorrectIncorrect -
Question 2 of 30
2. Question
Which McAfee DLP solution works with a web proxy or MTA server to protect web and email traffic?
CorrectIncorrect -
Question 3 of 30
3. Question
Which McAfee DLP appliance is used to analyze data received on a SPAN port?
CorrectIncorrect -
Question 4 of 30
4. Question
How many hard drives are supported by McAfee DLP 5500 appliance model?
CorrectIncorrect -
Question 5 of 30
5. Question
You are configuring sharing for resource folders. You want to ensure the evidence share is hidden. Which name would you use?
CorrectIncorrect -
Question 6 of 30
6. Question
On a McAfee DLP Monitor appliance, the capture port is set to which mode?
CorrectIncorrect -
Question 7 of 30
7. Question
Where do you assign and deploy DLP policies to systems and system groups?
CorrectIncorrect -
Question 8 of 30
8. Question
Which definition would you use in a web protection rule?
CorrectIncorrect -
Question 9 of 30
9. Question
Which of the below is an optional building block for data protection rules?
CorrectIncorrect -
Question 10 of 30
10. Question
What is the two data protection rule type(s) does McAfee DLP Prevent support? (Multiple Choice)
CorrectIncorrect -
Question 11 of 30
11. Question
Which type of protection rules used by McAfee DLP Monitor, cannot be shared with McAfee DLP Prevent?
CorrectIncorrect -
Question 12 of 30
12. Question
Select the two types of searches you can perform on captured content. (Multiple Choice)
CorrectIncorrect -
Question 13 of 30
13. Question
Which of the following is a term for the process of reducing a word to its root form?
CorrectIncorrect -
Question 14 of 30
14. Question
Which of the following scan types cannot be run against a database?
CorrectIncorrect -
Question 15 of 30
15. Question
Which type(s) of scans can be used to better target remediation scans?
CorrectIncorrect -
Question 16 of 30
16. Question
Fingerprint criteria applies to which type of scan?
CorrectIncorrect -
Question 17 of 30
17. Question
What does the MTA use to enforce McAfee DLP policy decisions?
CorrectIncorrect -
Question 18 of 30
18. Question
Which port is typically used for ICAP connections?
CorrectIncorrect -
Question 19 of 30
19. Question
Which tab in the DLP Incident Manager provides a list of actions you can take on the Incident list or selected parts of it?
CorrectIncorrect -
Question 20 of 30
20. Question
Which McAfee DLP appliance can move files from a data store to another location?
CorrectIncorrect -
Question 21 of 30
21. Question
Where can a user see all incidents assigned to them?
CorrectIncorrect -
Question 22 of 30
22. Question
Which DLP dashboard displays the system health status for your McAfee DLP Monitor?
CorrectIncorrect -
Question 23 of 30
23. Question
When will DLP Appliances apply classification criteria? (Multiple Choice)
CorrectIncorrect -
Question 24 of 30
24. Question
How can an administrator connect McAfee DLP to McAfee MVISION Security Cloud in the MVISION Cloud interface?
CorrectIncorrect -
Question 25 of 30
25. Question
Why do administrators want to reduce false positives?
CorrectIncorrect -
Question 26 of 30
26. Question
In McAfee DLP Discover, a __________ scan creates signatures of files.
CorrectIncorrect -
Question 27 of 30
27. Question
What is the minimum RAM required to setup McAfee DLP Server?
CorrectIncorrect -
Question 28 of 30
28. Question
The maximum number of registration scans, enabled and disabled, that can be listed in Scan Operations is __________.
CorrectIncorrect -
Question 29 of 30
29. Question
McAfee DLP Monitor taps into the network .What are the valid options to use to accomplish this task? (Multiple Choice)
CorrectIncorrect -
Question 30 of 30
30. Question
What information is displayed by the dashboard named “DLP: Incident Summary”?
CorrectIncorrect