VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 171–180 of 198

Q171

What happens when an incident is triggered by a DLP policy violation?

  • A Immediate blocking of the data flow
  • B An alert is generated and logged
  • C The system shuts down for analysis
  • D No action occurs unless manually escalated
Explanation An alert is generated and logged to notify administrators, allowing for investigation without automatically blocking data flows.
Q172

Which service in DLP is responsible for policy enforcement?

  • A Endpoint Agent
  • B Network Monitor
  • C Incident Response
  • D User Activity Log
Explanation The Endpoint Agent enforces DLP policies on devices, while the other options serve different functions.
Q173

A company needs to prevent unauthorized data sharing via email. What should be configured?

  • A Email Monitoring Rule
  • B Network Firewall
  • C Intrusion Detection System
  • D User Authentication
Explanation An Email Monitoring Rule specifically targets data sharing through email, while the other options address different security aspects.
Q174

What happens when a DLP policy triggers a block action?

  • A User receives a warning message
  • B Data is deleted permanently
  • C Access to data is blocked
  • D An alert is sent to IT
Explanation Blocking action prevents access to sensitive data, whereas other options are misinterpretations of the action taken.
Q175

Which service in Symantec DLP detects webmail usage?

  • A Web Proxy Server
  • B Data Identification
  • C Endpoint Prevent
  • D Network Monitor
Explanation The Web Proxy Server service is specifically designed to inspect and control webmail traffic, unlike the others.
Q176

A company needs to prevent users from uploading sensitive files to cloud storage. What feature should they use in DLP?

  • A File Type Monitoring
  • B Cloud Storage Policy
  • C Email Protection
  • D Endpoint Protection
Explanation The Cloud Storage Policy directly addresses controlling uploads to cloud services, while the others focus on different scenarios.
Q177

You are configuring response rules for a policy. What happens when a user bypasses the policy rules?

  • A Incident is logged
  • B Action is applied immediately
  • C No action occurs
  • D User receives warning
Explanation Bypassing policy rules means no enforcement occurs, while the others suggest actions that contradict bypassing.
Q178

Which service in DLP provides incident management and reporting?

  • A DLP Console
  • B Notification Service
  • C Data Insight
  • D Endpoint Security
Explanation The DLP Console manages incidents; others don't.
Q179

A company needs to protect sensitive emails from unauthorized forwarding. What DLP feature should they implement?

  • A Network Discovery
  • B Email Protection
  • C Content Examination
  • D Cloud Service Monitoring
Explanation Email Protection specifically prevents unauthorized actions on emails.
Q180

You are configuring a DLP policy rule with mixed criteria. What happens when criteria are met partially?

  • A Policy enforcement continues as normal.
  • B Zero incidents will generate.
  • C Only matched criteria triggers action.
  • D The rule is ignored entirely.
Explanation Only matched criteria will invoke the specified action in DLP.