Which two components can perform a file system scan of a workstation? (Choose two.)
Which two components can perform a file system scan of a workstation? (Choose two.)A . Endpoint ServerB . DLP AgentC . Network Prevent for Web ServerD . Discover ServerE . Enforce ServerView AnswerAnswer: BD
When does the DLP agent stop scanning?
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans. When does the DLP agent stop scanning?A . When the agent sends a report within the “Scan Idle Timeout” periodB . When the endpoint computer is rebooted and the agent is startedC...
Which channel does Endpoint Prevent protect using Device Control?
Which channel does Endpoint Prevent protect using Device Control?A . BluetoothB . USB storageC . CD/DVDD . Network cardView AnswerAnswer: B Explanation: Reference: https://support.symantec.com/en_US/article.HOWTO80865.html#v36651044
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)A . ExchangeB . JiveonC . File storeD . SharePointE . ConfluenceView AnswerAnswer: CD Explanation: Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centricencryption-en.pdf
What does the DLP administrator need to configure to generate this report?
A divisional executive requests a report of all incidents generated by a particular region, summarized by department. What does the DLP administrator need to configure to generate this report?A . Custom attributesB . Status attributesC . Sender attributesD . User attributesView AnswerAnswer: A
What is the correct configuration for “BoxMonitor.Channels”that will allow the server to start as a Network Monitor server?
What is the correct configuration for “BoxMonitor.Channels”that will allow the server to start as a Network Monitor server?A . Packet Capture, Span PortB . Packet Capture, Network TapC . Packet Capture, Copy RuleD . Packet capture, Network MonitorView AnswerAnswer: C Explanation: Reference: https://support.symantec.com/en_US/article.TECH218980.html
What detection method utilizes Data Identifiers?
What detection method utilizes Data Identifiers?A . Indexed Document matching (IDM)B . Described Content Matching (DCM)C . Directory Group Matching (DGM)D . Exact Data Matching (EDM)View AnswerAnswer: D Explanation: Reference: https://www.symantec.com/connect/forums/edm-policy-exception
What is the probable reason that the User Risk Summary report is blank?
A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the...
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?A . Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers.B . Use the built-in Symantec...
Which two detection servers are available as virtual appliances? (Choose two.)
Which two detection servers are available as virtual appliances? (Choose two.)A . Network MonitorB . Network Prevent for WebC . Network DiscoverD . Network Prevent for EmailE . Optical Character Recognition (OCR)View AnswerAnswer: BD Explanation: Reference: https://help.symantec.com/cs/dlp15.0/DLP/v123002905_v120691346/About-DLP-Appliances? locale=EN_US