A company needs to prevent unauthorized file transfers via email. What should be the first step?
ACreate a stringent policy for emails
BTrain users on data protection
CImplement a security awareness program
DDisable email access entirely
Explanation
Creating a policy specifically targets unauthorized file transfers, while other options are less direct solutions.
Q162
You are configuring a DLP policy for cloud storage. What takes precedence if a conflict arises with a data discovery policy?
AThe least restrictive policy
BLocal endpoint settings
CThe most restrictive policy
DUser security roles
Explanation
The most restrictive policy overrides any conflicts to maximize data protection, unlike the other options.
Q163
Which service does Symantec DLP use to identify sensitive data?
AContent Inspection
BNetwork Monitoring
CEndpoint Security
DData Encryption
Explanation
Content Inspection actively scans data for sensitive information; the others do not specifically target data identification.
Q164
A company needs to restrict the sending of company secrets via email. What DLP feature should they use?
AEmail Policy
BVideo Policy
CMessage Archiving
DDevice Control
Explanation
Email Policy specifically governs email actions; the others are not relevant to email restriction.
Q165
You are configuring a DLP rule for file uploads. What happens when a file matches the rule conditions?
AFile is deleted immediately.
BUser notified of violation.
CFile upload is always allowed.
DFile is encrypted automatically.
Explanation
Users are notified of violations to deter risky behavior; the other options incorrectly assume immediate action without consent or context.
Q166
Which service is responsible for monitoring network data in Symantec DLP?
ANetwork Prevent
BData Insight
CEndpoint Protection
DCloudSOC
Explanation
Network Prevent captures and inspects network traffic, while the others focus on different aspects of data security.
Q167
A company needs to prevent users from copying sensitive information to USB drives. What should they implement?
AData Loss Prevention Policies
BFirewall Rules
CUser Access Controls
DNetwork Encryption
Explanation
DLP Policies specifically prevent unauthorized data transfers, unlike the other options.
Q168
You are configuring email protection in DLP. What happens when a policy violation occurs?
AAlert sent to administrator
BEmail is blocked immediately
CUser receives warning notification
DEmail is re-routed silently
Explanation
Users typically receive a warning for policy violations that helps improve compliance, while others do not reflect the standard DLP process.
Q169
Which service does Symantec Data Loss Prevention use for real-time communication monitoring?
AWeb Prevent
BNetwork Prevent
CStorage Prevent
DCloud Prevent
Explanation
Web Prevent monitors real-time web communications, while others focus on different data types or locations.
Q170
A company needs to protect sensitive data being sent via email. What is the best approach with DLP?
ABlock all emails containing any attachment
BUse Email Protect with policy application
CAllow all attachments but monitor recipients
DWhitelist emails from trusted domains only
Explanation
Using Email Protect with specific policies effectively safeguards sensitive data in emails while allowing legitimate communication.