Symantec 250-438 Administration of Symantec Data Loss Prevention 15 Online Training
Symantec 250-438 Online Training
The questions for 250-438 were last updated at Mar 09,2025.
- Exam Code: 250-438
- Exam Name: Administration of Symantec Data Loss Prevention 15
- Certification Provider: Symantec
- Latest update: Mar 09,2025
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
- A . Exchange
- B . Jiveon
- C . File store
- D . SharePoint
- E . Confluence
Which detection method depends on “training sets”?
- A . Form Recognition
- B . Vector Machine Learning (VML)
- C . Index Document Matching (IDM)
- D . Exact Data Matching (IDM)
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
- A . Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers.
- B . Use the built-in Symantec DLP certificate for both the Enforce server and the hosted detection servers.
- C . Set up a Virtual Private Network (VPN) for the Enforce server and the hosted detection servers.
- D . Use the “sslkeytool” utility to create certificates for the Enforce server and the hosted detection servers.
Which option correctly describes the two-tier installation type for Symantec DLP?
- A . Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.
- B . Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.
- C . Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.
- D . Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.
Which two detection technology options run on the DLP agent? (Choose two.)
- A . Optical Character Recognition (OCR)
- B . Described Content Matching (DCM)
- C . Directory Group Matching (DGM)
- D . Form Recognition
- E . Indexed Document Matching (IDM)
A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data.
However, data transfers to these devices are still being blocked.
What is the first action an administrator should take to enable data transfers to the approved endpoint devices?
- A . Disable and re-enable the Endpoint Prevent policy to activate the changes
- B . Double-check that the correct device ID or class has been entered for each device
- C . Verify Application File Access Control (AFAC) is configured to monitor the specific application
- D . Edit the exception rule to ensure that the “Match On” option is set to “Attachments”
What is the default fallback option for the Endpoint Prevent Encrypt response rule?
- A . Block
- B . User Cancel
- C . Encrypt
- D . Notify
Which two components can perform a file system scan of a workstation? (Choose two.)
- A . Endpoint Server
- B . DLP Agent
- C . Network Prevent for Web Server
- D . Discover Server
- E . Enforce Server
Which channel does Endpoint Prevent protect using Device Control?
- A . Bluetooth
- B . USB storage
- C . CD/DVD
- D . Network card
A divisional executive requests a report of all incidents generated by a particular region, summarized by department.
What does the DLP administrator need to configure to generate this report?
- A . Custom attributes
- B . Status attributes
- C . Sender attributes
- D . User attributes