VMware
Symantec Data Loss Prevention 16.x Administration Technical Specialist
250-587
Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.
198 questions
0 views
Free
Questions 171–180 of 198
What happens when an incident is triggered by a DLP policy violation?
-
A
Immediate blocking of the data flow
-
B
An alert is generated and logged
-
C
The system shuts down for analysis
-
D
No action occurs unless manually escalated
Explanation
An alert is generated and logged to notify administrators, allowing for investigation without automatically blocking data flows.
Which service in DLP is responsible for policy enforcement?
-
A
Endpoint Agent
-
B
Network Monitor
-
C
Incident Response
-
D
User Activity Log
Explanation
The Endpoint Agent enforces DLP policies on devices, while the other options serve different functions.
A company needs to prevent unauthorized data sharing via email. What should be configured?
-
A
Email Monitoring Rule
-
B
Network Firewall
-
C
Intrusion Detection System
-
D
User Authentication
Explanation
An Email Monitoring Rule specifically targets data sharing through email, while the other options address different security aspects.
What happens when a DLP policy triggers a block action?
-
A
User receives a warning message
-
B
Data is deleted permanently
-
C
Access to data is blocked
-
D
An alert is sent to IT
Explanation
Blocking action prevents access to sensitive data, whereas other options are misinterpretations of the action taken.
Which service in Symantec DLP detects webmail usage?
-
A
Web Proxy Server
-
B
Data Identification
-
C
Endpoint Prevent
-
D
Network Monitor
Explanation
The Web Proxy Server service is specifically designed to inspect and control webmail traffic, unlike the others.
A company needs to prevent users from uploading sensitive files to cloud storage. What feature should they use in DLP?
-
A
File Type Monitoring
-
B
Cloud Storage Policy
-
C
Email Protection
-
D
Endpoint Protection
Explanation
The Cloud Storage Policy directly addresses controlling uploads to cloud services, while the others focus on different scenarios.
You are configuring response rules for a policy. What happens when a user bypasses the policy rules?
-
A
Incident is logged
-
B
Action is applied immediately
-
C
No action occurs
-
D
User receives warning
Explanation
Bypassing policy rules means no enforcement occurs, while the others suggest actions that contradict bypassing.
Which service in DLP provides incident management and reporting?
-
A
DLP Console
-
B
Notification Service
-
C
Data Insight
-
D
Endpoint Security
Explanation
The DLP Console manages incidents; others don't.
A company needs to protect sensitive emails from unauthorized forwarding. What DLP feature should they implement?
-
A
Network Discovery
-
B
Email Protection
-
C
Content Examination
-
D
Cloud Service Monitoring
Explanation
Email Protection specifically prevents unauthorized actions on emails.
You are configuring a DLP policy rule with mixed criteria. What happens when criteria are met partially?
-
A
Policy enforcement continues as normal.
-
B
Zero incidents will generate.
-
C
Only matched criteria triggers action.
-
D
The rule is ignored entirely.
Explanation
Only matched criteria will invoke the specified action in DLP.