A company needs to secure credit card information across emails. Which policy should they configure in Symantec DLP?
AEndpoint Protection Policy
BNetwork Discovery Policy
CEmail Policy
DStorage Policy
Explanation
An Email Policy is specifically designed to monitor and protect sensitive information in emails.
Q102
What happens when a DLP rule triggers a blocking action on a document?
ADocument is deleted permanently
BUser is notified and action logged
CDocument is moved to quarantine
DDocument is uploaded to cloud
Explanation
When blocking action occurs, the user is notified, and the incident is logged for review.
Q103
Which service is primarily responsible for policy management in Symantec Data Loss Prevention?
AData Loss Prevention Manager
BEndpoint Protection Service
CIncidents and Alerts Service
DInformation Classification Service
Explanation
The Data Loss Prevention Manager centralizes policy management, while the others serve different functions.
Q104
A company needs to prevent data exfiltration through email. Which policy should they enforce?
AEmail Encryption Policy
BEmail Detonation Policy
CEmail Content Inspection Policy
DWeb Upload Inspection Policy
Explanation
The Email Content Inspection Policy scans emails for sensitive data, unlike the other options.
Q105
You are configuring thresholds for alerts in DLP. What happens when a threshold is exceeded?
ANo action taken
BPolicy violations are logged
CUsers are automatically notified
DImmediate quarantine of data
Explanation
Policy violations are logged, while the other options don't represent default DLP actions.
Q106
Which service in Symantec DLP is responsible for detecting data in use?
AEndpoint agent
BNetwork Prevent
CData Insight
DCloudSOC
Explanation
The Endpoint agent monitors data on devices to prevent unauthorized use, while Network Prevent focuses on data in transit.
Q107
A company needs to track sensitive data movement across their network. Which feature should they implement?
AData Discovery
BReporting and Dashboards
CIncidents Management
DNetwork Monitor
Explanation
Network Monitor captures and monitors sensitive data in transit, while Data Discovery locates data at rest.
Q108
You are configuring a policy to prevent data upload to untrusted cloud services. What should you prioritize?
AUser behavior analytics
BFile type verification
CNetwork location examination
DCustom blocking options
Explanation
Network location examination ensures compliance with policies by verifying upload destinations, while user behavior analytics focus more on identifying anomalies.
Q109
Which service in DLP allows for real-time monitoring of sensitive data?
ADLP Monitor Service
BDLP Detection Service
CDLP Policy Service
DDLP Incident Service
Explanation
The DLP Monitor Service provides real-time monitoring of sensitive data, while the other options are not specific services used for monitoring.
Q110
A company needs to apply DLP policies across multiple platforms. What is the best way to achieve this?
AUse unified DLP policies
BCreate separate policies for each platform
CBase policies on historical data
DApply policies manually per device
Explanation
Unified DLP policies simplify management across platforms, while separate policies create unnecessary complexity.