What happens when a detected incident is escalated in DLP?
AData is deleted from the system
BNotification sent to the security team
CNo relevant action taken
DEndpoint is automatically locked
Explanation
Escalating an incident typically results in notifications to the security team for further action, unlike the other options.
Q142
Which service does Symantec DLP use for data discovery?
AEndpoint Detection Service
BNetwork Monitoring Service
CData Insight Service
DData Classification Service
Explanation
Data Insight Service provides comprehensive data discovery capabilities, whereas the others focus on security monitoring or classification.
Q143
A company needs to prevent the use of unapproved applications on company devices. Which DLP feature should they configure?
AEndpoint Data Loss Prevention
BBehavioral Policy
CNetwork DLP
DContent Inspection
Explanation
Endpoint Data Loss Prevention specifically manages application use, while the others address data transfer or content.
Q144
You are configuring a policy that detects credit card information. What happens when a violation is detected in a monitored email?
AEmail is automatically deleted.
BUser receives a warning only.
CEmail is quarantined for review.
DData is automatically encrypted.
Explanation
When a violation is detected, typically the email is quarantined for review, unlike other options which misrepresent DLP behavior.
Q145
Which service is essential for monitoring data channel activity in Symantec DLP?
AData Insight
BData Loss Prevention
CEndpoint Protection
DInformation Risk Management
Explanation
Data Insight analyzes and monitors data usage; the other options do not specifically focus on monitoring data channels.
Q146
A company needs to prevent users from copying sensitive documents to USB drives. What should they do?
AImplement endpoint DLP policies
BUse data backup solutions
CLimit user access to drives
DRemove USB ports from devices
Explanation
Implementing endpoint DLP policies specifically targets preventing data transfers to unauthorized devices, while the others do not directly stop copying sensitive documents.
Q147
What happens when a DLP policy is set to 'monitor' mode?
AData theft is actively blocked
BAlerts are generated for incidents
CNothing happens until enforcement is set
DAll files are encrypted automatically
Explanation
In monitor mode, policies generate alerts without blocking, while the other options do not accurately describe monitoring behavior.
Q148
Which service in Symantec DLP is responsible for monitoring network traffic?
ANetwork Monitor
BEndpoint Protector
CEmail Prevention
DData Insight
Explanation
Network Monitor specifically analyzes network traffic, while others focus on endpoints or emails.
Q149
A company needs to prevent sensitive data from leaving via USB devices. What should they enable?
AEndpoint Policies
BNetwork Discovery
CEmail DLP
DWeb Security
Explanation
Endpoint Policies are designed for controlling data transfer via devices like USBs.
Q150
What happens when a policy is in 'Test' mode?
ABlocks data instantly
BSends alerts only
CDoes not log events
DRequires user confirmation
Explanation
'Test' mode generates alerts without blocking or logging any data actions.