VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 91–100 of 198

Q91

Which service in Symantec DLP is primarily used for monitoring data in motion?

  • A Network Prevent
  • B Data Classification
  • C Endpoint Protection
  • D Policy Violation Alerts
Explanation Network Prevent inspects data as it travels, while others do not focus on this aspect.
Q92

A company needs to prevent copying sensitive data to USB devices. Which policy should be assigned?

  • A Endpoint Content Monitoring
  • B Network Command Alerts
  • C File Integrity Monitoring
  • D Cloud Protection Policy
Explanation Endpoint Content Monitoring specifically addresses data on endpoints, unlike the other options.
Q93

What happens when a DLP policy violation occurs and the action is set to 'Encrypt'?

  • A Data is blocked from access
  • B User receives a custom alert
  • C Data gets encrypted automatically
  • D Policy is ignored during this event
Explanation Encrypting the data is the specified action, while others do not happen based on this action.
Q94

Which service in Symantec DLP helps monitor and control data in motion?

  • A Network Prevent
  • B Endpoint Discovery
  • C Data Insight
  • D Mobile Prevent
Explanation Network Prevent monitors data in motion, others serve different functions.
Q95

A company needs to enforce encryption on sensitive emails only. Which DLP feature should they configure?

  • A Policy Matching
  • B Content Inspect
  • C Email Protect
  • D Data Classification
Explanation Email Protect is specifically for securing sensitive emails, while others don’t restrict email content.
Q96

What happens when a DLP rule blocks a user action?

  • A Action is automatically logged.
  • B User is notified immediately.
  • C Action is silently allowed.
  • D Data is deleted immediately.
Explanation Blocked actions are logged for auditing, contrary to other options.
Q97

Which DLP policy component allows users to submit false positives?

  • A Exception Handling
  • B Incident Response
  • C User Override
  • D Policy Rule
Explanation User Override enables users to mark false positives, while others do not allow user input.
Q98

You are configuring a DLP policy. What happens when you set the action to 'Encrypt' on a detected incident?

  • A The data remains unprotected
  • B Data is automatically deleted
  • C Data is encrypted before sending
  • D User receives alert only
Explanation Setting to 'Encrypt' ensures data is protected before transfer, not just alerted.
Q99

A company needs to ensure that customer credit card numbers are never sent via email. What feature should they use?

  • A Whitelist Monitoring
  • B Signature-based Detection
  • C User Education Program
  • D Contextual Data Protection
Explanation Signature-based Detection specifically identifies sensitive data patterns, unlike the other options.
Q100

Which service in Symantec DLP is responsible for identifying sensitive data?

  • A Data Fingerprinting
  • B Agent Deployment
  • C Policy Management
  • D Incident Response
Explanation Data Fingerprinting identifies sensitive data patterns, while the others handle deployment, policy settings, or incident management.