What is the first action an administrator should take to enable data transfers to the approved endpoint devices?
A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data. However, data transfers to these devices are still being blocked. What is the first action an administrator should take to enable data transfers to the approved endpoint...
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)A . To specify Wi-Fi SSID namesB . To specify an IP address or rangeC . To specify the endpoint serverD . To specify domain namesE . To specify network card status (ON/OFF)View...
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?A . Network DiscoverB . Cloud Service for EmailC . Endpoint PreventD . Network ProtectView AnswerAnswer: D Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-NetworkProtect-for-file-shares?locale=EN_US
How should the company ensure that this standard text is excluded from detection?
A company needs to secure the content of all mergers and Acquisitions Agreements/ However, the standard text included in all company literature needs to be excluded. How should the company ensure that this standard text is excluded from detection?A . Create a Whitelisted.txtfile after creating the Vector Machine Learning (VML)...
Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?
Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?A . ExchangeB . File SystemC . Lotus NotesD . SharePointView AnswerAnswer: B Explanation: Reference: https://help.symantec.com/cs/DLP15.0/DLP/v83981880_v120691346/Troubleshootingautomated-incident-remediation-tracking?locale=EN_US
What detection technology supports partial contents matching?
What detection technology supports partial contents matching?A . Indexed Document Matching (IDM)B . Described Content Matching (DCM)C . Exact Data Matching (DCM)D . Optical Character Recognition (OCR)View AnswerAnswer: A Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v115965297_v125428396/Mac-agent-detectiontechnologies?locale=EN_US