Symantec 250-438 Administration of Symantec Data Loss Prevention 15 Online Training
Symantec 250-438 Online Training
The questions for 250-438 were last updated at Mar 09,2025.
- Exam Code: 250-438
- Exam Name: Administration of Symantec Data Loss Prevention 15
- Certification Provider: Symantec
- Latest update: Mar 09,2025
A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display.
What are the processes missing from the Server Detail page display?
- A . The Display Process Control setting on the Advanced Settings page is disabled.
- B . The Advanced Process Control setting on the System Settings page is deselected.
- C . The detection server Display Control Process option is disabled on the Server Detail page.
- D . The detection server PacketCapture process is displayed on the Server Overview page.
What detection technology supports partial contents matching?
- A . Indexed Document Matching (IDM)
- B . Described Content Matching (DCM)
- C . Exact Data Matching (DCM)
- D . Optical Character Recognition (OCR)
What is Application Detection Configuration?
- A . The Cloud Detection Service (CDS) process that tells Enforce a policy has been violated
- B . The Data Loss Prevention (DLP) policy which has been pushed into Cloud Detection Service (CDC) for files in transit to or residing in Cloud apps
- C . The terminology describing the Data Loss Prevention (DLP) process within the CloudSOC administration portal
- D . the setting configured within the user interface (UI) that determines whether CloudSOC should send a file to Cloud Detection Service (CDS) for analysis.
What detection method utilizes Data Identifiers?
- A . Indexed Document matching (IDM)
- B . Described Content Matching (DCM)
- C . Directory Group Matching (DGM)
- D . Exact Data Matching (EDM)
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans.
When does the DLP agent stop scanning?
- A . When the agent sends a report within the “Scan Idle Timeout” period
- B . When the endpoint computer is rebooted and the agent is started
- C . When the agent is unable to send a status report within the “Scan Idle Timeout” period
- D . When the agent sends a report immediately after the “Scan Idle Timeout” period
Which two detection servers are available as virtual appliances? (Choose two.)
- A . Network Monitor
- B . Network Prevent for Web
- C . Network Discover
- D . Network Prevent for Email
- E . Optical Character Recognition (OCR)
A company needs to secure the content of all mergers and Acquisitions Agreements/ However, the standard text included in all company literature needs to be excluded.
How should the company ensure that this standard text is excluded from detection?
- A . Create a Whitelisted.txtfile after creating the Vector Machine Learning (VML) profile.
- B . Create a Whitelisted.txtfile after creating the Exact Data Matching (EDM) profile
- C . Create a Whitelisted.txtfile before creating the Indexed Document Matching (IDM) profile
- D . Create a Whitelisted.txtfile before creating the Exact Data Matching (EDM) profile
Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?
- A . Exchange
- B . File System
- C . Lotus Notes
- D . SharePoint