VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 101–110 of 198

Q101

A company needs to secure credit card information across emails. Which policy should they configure in Symantec DLP?

  • A Endpoint Protection Policy
  • B Network Discovery Policy
  • C Email Policy
  • D Storage Policy
Explanation An Email Policy is specifically designed to monitor and protect sensitive information in emails.
Q102

What happens when a DLP rule triggers a blocking action on a document?

  • A Document is deleted permanently
  • B User is notified and action logged
  • C Document is moved to quarantine
  • D Document is uploaded to cloud
Explanation When blocking action occurs, the user is notified, and the incident is logged for review.
Q103

Which service is primarily responsible for policy management in Symantec Data Loss Prevention?

  • A Data Loss Prevention Manager
  • B Endpoint Protection Service
  • C Incidents and Alerts Service
  • D Information Classification Service
Explanation The Data Loss Prevention Manager centralizes policy management, while the others serve different functions.
Q104

A company needs to prevent data exfiltration through email. Which policy should they enforce?

  • A Email Encryption Policy
  • B Email Detonation Policy
  • C Email Content Inspection Policy
  • D Web Upload Inspection Policy
Explanation The Email Content Inspection Policy scans emails for sensitive data, unlike the other options.
Q105

You are configuring thresholds for alerts in DLP. What happens when a threshold is exceeded?

  • A No action taken
  • B Policy violations are logged
  • C Users are automatically notified
  • D Immediate quarantine of data
Explanation Policy violations are logged, while the other options don't represent default DLP actions.
Q106

Which service in Symantec DLP is responsible for detecting data in use?

  • A Endpoint agent
  • B Network Prevent
  • C Data Insight
  • D CloudSOC
Explanation The Endpoint agent monitors data on devices to prevent unauthorized use, while Network Prevent focuses on data in transit.
Q107

A company needs to track sensitive data movement across their network. Which feature should they implement?

  • A Data Discovery
  • B Reporting and Dashboards
  • C Incidents Management
  • D Network Monitor
Explanation Network Monitor captures and monitors sensitive data in transit, while Data Discovery locates data at rest.
Q108

You are configuring a policy to prevent data upload to untrusted cloud services. What should you prioritize?

  • A User behavior analytics
  • B File type verification
  • C Network location examination
  • D Custom blocking options
Explanation Network location examination ensures compliance with policies by verifying upload destinations, while user behavior analytics focus more on identifying anomalies.
Q109

Which service in DLP allows for real-time monitoring of sensitive data?

  • A DLP Monitor Service
  • B DLP Detection Service
  • C DLP Policy Service
  • D DLP Incident Service
Explanation The DLP Monitor Service provides real-time monitoring of sensitive data, while the other options are not specific services used for monitoring.
Q110

A company needs to apply DLP policies across multiple platforms. What is the best way to achieve this?

  • A Use unified DLP policies
  • B Create separate policies for each platform
  • C Base policies on historical data
  • D Apply policies manually per device
Explanation Unified DLP policies simplify management across platforms, while separate policies create unnecessary complexity.