VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 11–20 of 198

Q11

A company needs to block the transfer of sensitive data via email. What feature should they configure in Symantec DLP?

  • A Email Rules
  • B Web Rules
  • C File Rules
  • D Network Rules
Explanation Email Rules are specifically designed to enforce policy on email traffic, while the other rules apply to different data transport scenarios.
Q12

You are configuring data identifiers in Symantec DLP. What happens when two identifiers conflict?

  • A First identifier is always chosen
  • B Second identifier overrides first
  • C Both identifiers become inactive
  • D Data remains unrestricted
Explanation In conflicts, the second identifier is prioritized and overrides the first; the first does not become inactive, and data restrictions will apply based on the active identifier.
Q13

Which service is responsible for analyzing content in DLP?

  • A Content Analysis Engine
  • B Policy Management Service
  • C Incident Management Tool
  • D Endpoint Protection Service
Explanation The Content Analysis Engine analyzes data to enforce DLP policies; others are for management or protection.
Q14

A company needs to protect sensitive data accessed on employee smartphones. What DLP feature should they implement?

  • A Cloud Access Security Broker
  • B Mobile Device Management
  • C Prevention Policy
  • D Email Encryption
Explanation Mobile Device Management allows policy enforcement on smartphones; others do not specifically address mobile data security.
Q15

What happens when a DLP policy is set to notify, but not to block?

  • A Users are notified but data is not secured.
  • B Data is encrypted automatically.
  • C All incidents are logged only.
  • D Policy enforcement is ineffective.
Explanation Notification policies inform users without restricting access; blocking is not enabled, so data remains unprotected.
Q16

Which service in Symantec DLP helps to monitor email communications?

  • A Email Prevent
  • B Network Monitor
  • C Cloud Security
  • D Endpoint Discoverer
Explanation Email Prevent monitors and controls email communications, making it the correct choice. Network Monitor deals with network traffic, Cloud Security focuses on cloud services, and Endpoint Discoverer scans for sensitive data.
Q17

A company needs to enforce data privacy for its cloud deployments. What should they configure in DLP?

  • A Cloud Storage Policies
  • B File Storage Monitoring
  • C Local Backup Solutions
  • D Email Filtering Rules
Explanation Cloud Storage Policies are specifically designed to enforce data privacy in cloud services. The other options do not directly pertain to cloud data privacy.
Q18

You are configuring a DLP policy. What happens when a user tries to copy sensitive data to removable media?

  • A Data is always allowed
  • B User receives a warning
  • C Removable media is blocked
  • D Data is copied without alerts
Explanation When a policy detects a violation, users typically receive a warning about the action. The other options misrepresent DLP behavior concerning sensitive data restrictions.
Q19

Which service in Symantec DLP is used for endpoint data protection?

  • A Endpoint Agent
  • B Network Prevent
  • C Cloud Data Protection
  • D Vulnerability Manager
Explanation Endpoint Agent protects data on user devices, while others focus on network or cloud.
Q20

A company needs to enforce a strict data transfer policy. What feature should they use?

  • A Network Prevent for Email
  • B Storage Discovery
  • C Agent Less Client
  • D Encryption Management
Explanation Network Prevent for Email can block unauthorized data transfers.