VMware
Symantec Data Loss Prevention 16.x Administration Technical Specialist
250-587
Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.
198 questions
0 views
Free
Questions 21–30 of 198
You are configuring a DLP policy with both blocking and monitoring actions. What happens when both actions are triggered?
-
A
Only blocking action is executed
-
B
Monitoring action is executed first
-
C
Both actions are executed
-
D
None of the actions are executed
Explanation
Both actions can be executed simultaneously under the correct conditions.
Which protocol is primarily used for data transmission within Symantec DLP?
-
A
HTTP
-
B
SMTP
-
C
TCP
-
D
FTP
Explanation
TCP is the main protocol for data transfer, while others serve different purposes.
A company needs to ensure that sensitive data is not sent through external email. What is the best way to achieve this in Symantec DLP?
-
A
Create an endpoint policy
-
B
Implement email monitoring rules
-
C
Disable email services
-
D
Use file transfer monitoring
Explanation
Email monitoring rules directly prevent sensitive info sent externally.
You are configuring a new policy in Symantec DLP. What happens when you set the detection method to 'Exact Data Match'?
-
A
It detects all file types
-
B
It only detects text files
-
C
It relies on predefined data sets
-
D
It cannot be configured for data detection
Explanation
'Exact Data Match' uses predefined data sets for precise matching.
Which service in DLP helps to monitor email activities?
-
A
Email Surveillance
-
B
Data Watch
-
C
Email Protection
-
D
Email Insight
Explanation
Email Surveillance specifically monitors email activities, while the others are not DLP services.
A company needs to protect sensitive data during internet browsing. Which DLP feature should they implement?
-
A
Web Filter
-
B
Endpoint Encryption
-
C
Cloud Assessor
-
D
Network Monitor
Explanation
Web Filter is designed to control browsing activities specific to sensitive data protection.
What happens when DLP policy violations exceed set thresholds?
-
A
Policy ceases to function
-
B
Alerts are sent to admin
-
C
Data is automatically deleted
-
D
Security context is escalated
Explanation
Alerts are typically generated to inform administrators, while the other options do not reflect standard DLP behavior.
Which service in Symantec DLP helps enforce policies on network traffic?
-
A
Network Monitor
-
B
Endpoint Agent
-
C
File Server Agent
-
D
Email Prevent
Explanation
Network Monitor analyzes and acts on network data, while others have different focuses.
A company needs to prevent users from transferring sensitive data via USB devices. What should the DLP policy primarily target?
-
A
Disallowed devices
-
B
File types only
-
C
User behavior
-
D
Content awareness
Explanation
Targeting disallowed devices effectively blocks USB transfers; other options alone won't prevent it.
You are configuring a Data Loss Prevention policy and want to detect credit card numbers. Which option should you utilize?
-
A
Predefined Data Identifier
-
B
File Type Identifier
-
C
User Input Log
-
D
Behavior Analytics
Explanation
Predefined Data Identifiers are specifically created for patterns like credit card numbers, while others do not meet this need.