VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 181–190 of 198

Q181

Which service in Symantec DLP enables policy enforcement on endpoints?

  • A Endpoint Protection
  • B Network Prevent
  • C Endpoint Prevent
  • D Cloud Prevent
Explanation Endpoint Prevent is dedicated to protecting data on endpoints, while others focus on different areas.
Q182

A company needs to monitor sensitive data transferred over email. Which feature should they implement?

  • A Email Disk Encryption
  • B Network Monitor
  • C Cloud Data Protection
  • D Email Prevent
Explanation Email Prevent specifically blocks or encrypts sensitive email data, unlike others that serve different functions.
Q183

What happens when a DLP incident is triggered but no response is configured?

  • A The data is deleted automatically
  • B An alert is sent automatically
  • C The incident is logged but not acted on
  • D The user is informed immediately
Explanation Without configured responses, incidents are only logged for analysis later; no automatic actions occur.
Q184

Which service is responsible for managing DLP policies in Symantec DLP?

  • A Management Console
  • B Agent Service
  • C Data Enforcer
  • D Web Application
Explanation The Management Console is essential for creating and managing DLP policies, while other options serve different roles.
Q185

A company needs to ensure protection of sensitive data in emails. What should be configured?

  • A Web Filter Policies
  • B Email DLP Policies
  • C Endpoint Policies
  • D Network Discover Policies
Explanation Email DLP Policies specifically safeguard sensitive information in email communications.
Q186

What happens when two overlapping DLP policies are triggered on the same data?

  • A Only the first one wins
  • B Both policies apply penalties
  • C Actions will conflict
  • D Log only the second policy
Explanation In overlapping policies, typically only the first policy triggered is applied, unless configured otherwise.
Q187

Which service is responsible for inspecting data in transit?

  • A Network Prevent
  • B Endpoint Discover
  • C Cloud Detection
  • D Storage Integrity
Explanation Network Prevent inspects data as it travels, while others do not focus on real-time network data monitoring.
Q188

A company needs to enforce DLP policies on mobile devices. Which solution could they implement?

  • A Mobile Endpoint Detection
  • B Cloud DLP Solutions
  • C Network Detection Service
  • D Endpoint Agent
Explanation Endpoint Agent allows DLP policies on mobile devices, unlike others that aren't tailored for mobile.
Q189

What happens when a user tries to copy sensitive data to a USB drive while DLP is active?

  • A Data is always copied regardless.
  • B User receives a blocking notification.
  • C System ignores the copy action.
  • D Attempts are logged only.
Explanation While DLP is active, the user gets a blocking notification to prevent potential data loss, contrary to other options.
Q190

Which service would you use to monitor endpoint activities within DLP?

  • A Endpoint Protection
  • B Data Insight
  • C Messaging Security
  • D Network Monitoring
Explanation Endpoint Protection monitors activities effectively; others do not focus specifically on endpoint data.