VMware
Symantec Data Loss Prevention 16.x Administration Technical Specialist
250-587
Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.
198 questions
0 views
Free
Questions 91–100 of 198
Which service in Symantec DLP is primarily used for monitoring data in motion?
-
A
Network Prevent
-
B
Data Classification
-
C
Endpoint Protection
-
D
Policy Violation Alerts
Explanation
Network Prevent inspects data as it travels, while others do not focus on this aspect.
A company needs to prevent copying sensitive data to USB devices. Which policy should be assigned?
-
A
Endpoint Content Monitoring
-
B
Network Command Alerts
-
C
File Integrity Monitoring
-
D
Cloud Protection Policy
Explanation
Endpoint Content Monitoring specifically addresses data on endpoints, unlike the other options.
What happens when a DLP policy violation occurs and the action is set to 'Encrypt'?
-
A
Data is blocked from access
-
B
User receives a custom alert
-
C
Data gets encrypted automatically
-
D
Policy is ignored during this event
Explanation
Encrypting the data is the specified action, while others do not happen based on this action.
Which service in Symantec DLP helps monitor and control data in motion?
-
A
Network Prevent
-
B
Endpoint Discovery
-
C
Data Insight
-
D
Mobile Prevent
Explanation
Network Prevent monitors data in motion, others serve different functions.
A company needs to enforce encryption on sensitive emails only. Which DLP feature should they configure?
-
A
Policy Matching
-
B
Content Inspect
-
C
Email Protect
-
D
Data Classification
Explanation
Email Protect is specifically for securing sensitive emails, while others don’t restrict email content.
What happens when a DLP rule blocks a user action?
-
A
Action is automatically logged.
-
B
User is notified immediately.
-
C
Action is silently allowed.
-
D
Data is deleted immediately.
Explanation
Blocked actions are logged for auditing, contrary to other options.
Which DLP policy component allows users to submit false positives?
-
A
Exception Handling
-
B
Incident Response
-
C
User Override
-
D
Policy Rule
Explanation
User Override enables users to mark false positives, while others do not allow user input.
You are configuring a DLP policy. What happens when you set the action to 'Encrypt' on a detected incident?
-
A
The data remains unprotected
-
B
Data is automatically deleted
-
C
Data is encrypted before sending
-
D
User receives alert only
Explanation
Setting to 'Encrypt' ensures data is protected before transfer, not just alerted.
A company needs to ensure that customer credit card numbers are never sent via email. What feature should they use?
-
A
Whitelist Monitoring
-
B
Signature-based Detection
-
C
User Education Program
-
D
Contextual Data Protection
Explanation
Signature-based Detection specifically identifies sensitive data patterns, unlike the other options.
Which service in Symantec DLP is responsible for identifying sensitive data?
-
A
Data Fingerprinting
-
B
Agent Deployment
-
C
Policy Management
-
D
Incident Response
Explanation
Data Fingerprinting identifies sensitive data patterns, while the others handle deployment, policy settings, or incident management.