A company needs to block the transfer of sensitive data via email. What feature should they configure in Symantec DLP?
AEmail Rules
BWeb Rules
CFile Rules
DNetwork Rules
Explanation
Email Rules are specifically designed to enforce policy on email traffic, while the other rules apply to different data transport scenarios.
Q12
You are configuring data identifiers in Symantec DLP. What happens when two identifiers conflict?
AFirst identifier is always chosen
BSecond identifier overrides first
CBoth identifiers become inactive
DData remains unrestricted
Explanation
In conflicts, the second identifier is prioritized and overrides the first; the first does not become inactive, and data restrictions will apply based on the active identifier.
Q13
Which service is responsible for analyzing content in DLP?
AContent Analysis Engine
BPolicy Management Service
CIncident Management Tool
DEndpoint Protection Service
Explanation
The Content Analysis Engine analyzes data to enforce DLP policies; others are for management or protection.
Q14
A company needs to protect sensitive data accessed on employee smartphones. What DLP feature should they implement?
ACloud Access Security Broker
BMobile Device Management
CPrevention Policy
DEmail Encryption
Explanation
Mobile Device Management allows policy enforcement on smartphones; others do not specifically address mobile data security.
Q15
What happens when a DLP policy is set to notify, but not to block?
AUsers are notified but data is not secured.
BData is encrypted automatically.
CAll incidents are logged only.
DPolicy enforcement is ineffective.
Explanation
Notification policies inform users without restricting access; blocking is not enabled, so data remains unprotected.
Q16
Which service in Symantec DLP helps to monitor email communications?
AEmail Prevent
BNetwork Monitor
CCloud Security
DEndpoint Discoverer
Explanation
Email Prevent monitors and controls email communications, making it the correct choice. Network Monitor deals with network traffic, Cloud Security focuses on cloud services, and Endpoint Discoverer scans for sensitive data.
Q17
A company needs to enforce data privacy for its cloud deployments. What should they configure in DLP?
ACloud Storage Policies
BFile Storage Monitoring
CLocal Backup Solutions
DEmail Filtering Rules
Explanation
Cloud Storage Policies are specifically designed to enforce data privacy in cloud services. The other options do not directly pertain to cloud data privacy.
Q18
You are configuring a DLP policy. What happens when a user tries to copy sensitive data to removable media?
AData is always allowed
BUser receives a warning
CRemovable media is blocked
DData is copied without alerts
Explanation
When a policy detects a violation, users typically receive a warning about the action. The other options misrepresent DLP behavior concerning sensitive data restrictions.
Q19
Which service in Symantec DLP is used for endpoint data protection?
AEndpoint Agent
BNetwork Prevent
CCloud Data Protection
DVulnerability Manager
Explanation
Endpoint Agent protects data on user devices, while others focus on network or cloud.
Q20
A company needs to enforce a strict data transfer policy. What feature should they use?
ANetwork Prevent for Email
BStorage Discovery
CAgent Less Client
DEncryption Management
Explanation
Network Prevent for Email can block unauthorized data transfers.