VMware
Symantec Data Loss Prevention 16.x Administration Technical Specialist
250-587
Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.
198 questions
0 views
Free
Questions 191–198 of 198
A company needs to classify sensitive information across multiple sources. What should be implemented?
-
A
One DLP policy for all sources
-
B
Multiple separate DLP policies
-
C
Data Loss Prevention tool only
-
D
Information Rights Management only
Explanation
Multiple policies tailor controls for each source's requirements; others lack specificity or functionality.
What happens when a file is incorrectly classified by DLP as sensitive?
-
A
It is deleted automatically
-
B
It only triggers an alert
-
C
Users can override the classification
-
D
Data is encrypted immediately
Explanation
Users may override incorrect classifications; others do not resolve misclassification issues.
Which feature of DLP helps in detecting sensitive data?
-
A
Content Inspection
-
B
User Authentication
-
C
Network Speed Monitoring
-
D
System Health Checks
Explanation
Content Inspection analyzes data for sensitive information, while the others do not relate to data detection.
A company needs to restrict the sharing of confidential files via email. Which DLP policy should they configure?
-
A
Endpoint Protection Policy
-
B
Network Monitoring Policy
-
C
Email Protection Policy
-
D
Web Filtering Policy
Explanation
Email Protection Policy specifically targets email communication for sensitive data sharing.
You are configuring incident response for several DLP violations. What happens when you set the escalation notification threshold to '3'?
-
A
Alerts after first violation
-
B
No notifications sent
-
C
Alerts after second violation
-
D
Alerts after third violation
Explanation
Setting the threshold to '3' triggers alerts only after the third violation.
Which service is primarily responsible for detecting and preventing data loss in Symantec DLP?
-
A
Content Inspection
-
B
Encryption Management
-
C
Network Traffic Analysis
-
D
Authentication Services
Explanation
Content Inspection identifies sensitive data to prevent loss, while others do not focus on detection.
A company needs to ensure that sensitive data is not sent via unauthorized USB devices. What should they implement?
-
A
Endpoint Discoverer
-
B
Network Discoverer
-
C
Data Masking
-
D
Endpoint Protection
Explanation
Endpoint Discoverer monitors USB usage, while the others do not specifically control device access.
What happens when a DLP rule triggers an alert but the policy is not set to enforce an action?
-
A
No action is taken
-
B
An incident is created
-
C
Data is encrypted automatically
-
D
Users receive a notification
Explanation
If no action is enforced, the alert is generated but no intervention occurs.