What is the correct configuration for “BoxMonitor.Channels”that will allow the server to start as a Network Monitor server?
What is the correct configuration for “BoxMonitor.Channels”that will allow the server to start as a Network Monitor server?A . Packet Capture, Span PortB . Packet Capture, Network TapC . Packet Capture, Copy RuleD . Packet capture, Network MonitorView AnswerAnswer: C Explanation: Reference: https://support.symantec.com/en_US/article.TECH218980.html
What is a possible cause for the Network Monitor server being in this state?
Under the “System Overview” in the Enforce management console, the status of a Network Monitor detection server is shown as “Running Selected.” The Network Monitor server’s event logs indicate that the packet capture and filereader processes are crashing. What is a possible cause for the Network Monitor server being in...
When does the DLP agent stop scanning?
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans. When does the DLP agent stop scanning?A . When the agent sends a report within the “Scan Idle Timeout” periodB . When the endpoint computer is rebooted and the agent is startedC...
What is Application Detection Configuration?
What is Application Detection Configuration?A . The Cloud Detection Service (CDS) process that tells Enforce a policy has been violatedB . The Data Loss Prevention (DLP) policy which has been pushed into Cloud Detection Service (CDC) for files in transit to or residing in Cloud appsC . The terminology describing...
Which channel does Endpoint Prevent protect using Device Control?
Which channel does Endpoint Prevent protect using Device Control?A . BluetoothB . USB storageC . CD/DVDD . Network cardView AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.HOWTO80865.html#v36651044
What detection technology supports partial contents matching?
What detection technology supports partial contents matching?A . Indexed Document Matching (IDM)B . Described Content Matching (DCM)C . Exact Data Matching (DCM)D . Optical Character Recognition (OCR)View AnswerAnswer: A Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v115965297_v125428396/Mac-agent-detectiontechnologies?locale=EN_US
What is the probable reason that the User Risk Summary report is blank?
A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the...
What detection method utilizes Data Identifiers?
What detection method utilizes Data Identifiers?A . Indexed Document matching (IDM)B . Described Content Matching (DCM)C . Directory Group Matching (DGM)D . Exact Data Matching (EDM)View AnswerAnswer: D Explanation: Reference: https://www.symantec.com/connect/forums/edm-policy-exception
Which detection method should the company use to meet this requirement?
A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?A . Exact Data Matching (EDM)B . Described Content Matching (DCM)C . Vector Machine Learning (VML)D . Indexed Document Matching (IDM)View AnswerAnswer:...
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
What detection server is used for Network Discover, Network Protect, and Cloud Storage?A . Network Protect Storage DiscoverB . Network Discover/Cloud Storage DiscoverC . Network Prevent/Cloud Detection ServiceD . Network Protect/Cloud Detection ServiceView AnswerAnswer: B Explanation: Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-NetworkDiscover-Cloud-Storage-Discover-Server-configuration?locale=EN_US