What is the default fallback option for the Endpoint Prevent Encrypt response rule?
What is the default fallback option for the Endpoint Prevent Encrypt response rule?A . BlockB . User CancelC . EncryptD . NotifyView AnswerAnswer: D
Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?
Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?A . ExchangeB . File SystemC . Lotus NotesD . SharePointView AnswerAnswer: B Explanation: Reference: https://help.symantec.com/cs/DLP15.0/DLP/v83981880_v120691346/Troubleshootingautomated-incident-remediation-tracking?locale=EN_US
Which two detection technology options run on the DLP agent? (Choose two.)
Which two detection technology options run on the DLP agent? (Choose two.)A . Optical Character Recognition (OCR)B . Described Content Matching (DCM)C . Directory Group Matching (DGM)D . Form RecognitionE . Indexed Document Matching (IDM)View AnswerAnswer: BE
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?A . Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers.B . Use the built-in Symantec...
What does the DLP administrator need to configure to generate this report?
A divisional executive requests a report of all incidents generated by a particular region, summarized by department. What does the DLP administrator need to configure to generate this report?A . Custom attributesB . Status attributesC . Sender attributesD . User attributesView AnswerAnswer: A
Which detection method depends on “training sets”?
Which detection method depends on “training sets”?A . Form RecognitionB . Vector Machine Learning (VML)C . Index Document Matching (IDM)D . Exact Data Matching (IDM)View AnswerAnswer: B Explanation: Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_enus.pdf
Which two Infrastructure-as-a-Service providers are supported for hosting Cloud Prevent for Office 365? (Choose two.)
Which two Infrastructure-as-a-Service providers are supported for hosting Cloud Prevent for Office 365? (Choose two.)A . Any customer-hosted private cloudB . Amazon Web ServicesC . AT&TD . VerizonE . RackspaceView AnswerAnswer: BE Explanation: Reference: https://symwisedownload.symantec.com//resources/sites/SYMWISE/content/live/ DOCUMENTATION/8000/DOC8244/en_US/Symantec_DLP_15.0_Cloud_Prevent_O365.pdf? __gda__=1554430310_584ffada3918e15ced8b6483a2bfb6fb (14)
Which two components can perform a file system scan of a workstation? (Choose two.)
Which two components can perform a file system scan of a workstation? (Choose two.)A . Endpoint ServerB . DLP AgentC . Network Prevent for Web ServerD . Discover ServerE . Enforce ServerView AnswerAnswer: BD
What is the first action an administrator should take to enable data transfers to the approved endpoint devices?
A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data. However, data transfers to these devices are still being blocked. What is the first action an administrator should take to enable data transfers to the approved endpoint...
What are the processes missing from the Server Detail page display?
A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display. What are the processes missing from the Server Detail page display?A . The Display Process Control setting on the...