VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 21–30 of 198

Q21

You are configuring a DLP policy with both blocking and monitoring actions. What happens when both actions are triggered?

  • A Only blocking action is executed
  • B Monitoring action is executed first
  • C Both actions are executed
  • D None of the actions are executed
Explanation Both actions can be executed simultaneously under the correct conditions.
Q22

Which protocol is primarily used for data transmission within Symantec DLP?

  • A HTTP
  • B SMTP
  • C TCP
  • D FTP
Explanation TCP is the main protocol for data transfer, while others serve different purposes.
Q23

A company needs to ensure that sensitive data is not sent through external email. What is the best way to achieve this in Symantec DLP?

  • A Create an endpoint policy
  • B Implement email monitoring rules
  • C Disable email services
  • D Use file transfer monitoring
Explanation Email monitoring rules directly prevent sensitive info sent externally.
Q24

You are configuring a new policy in Symantec DLP. What happens when you set the detection method to 'Exact Data Match'?

  • A It detects all file types
  • B It only detects text files
  • C It relies on predefined data sets
  • D It cannot be configured for data detection
Explanation 'Exact Data Match' uses predefined data sets for precise matching.
Q25

Which service in DLP helps to monitor email activities?

  • A Email Surveillance
  • B Data Watch
  • C Email Protection
  • D Email Insight
Explanation Email Surveillance specifically monitors email activities, while the others are not DLP services.
Q26

A company needs to protect sensitive data during internet browsing. Which DLP feature should they implement?

  • A Web Filter
  • B Endpoint Encryption
  • C Cloud Assessor
  • D Network Monitor
Explanation Web Filter is designed to control browsing activities specific to sensitive data protection.
Q27

What happens when DLP policy violations exceed set thresholds?

  • A Policy ceases to function
  • B Alerts are sent to admin
  • C Data is automatically deleted
  • D Security context is escalated
Explanation Alerts are typically generated to inform administrators, while the other options do not reflect standard DLP behavior.
Q28

Which service in Symantec DLP helps enforce policies on network traffic?

  • A Network Monitor
  • B Endpoint Agent
  • C File Server Agent
  • D Email Prevent
Explanation Network Monitor analyzes and acts on network data, while others have different focuses.
Q29

A company needs to prevent users from transferring sensitive data via USB devices. What should the DLP policy primarily target?

  • A Disallowed devices
  • B File types only
  • C User behavior
  • D Content awareness
Explanation Targeting disallowed devices effectively blocks USB transfers; other options alone won't prevent it.
Q30

You are configuring a Data Loss Prevention policy and want to detect credit card numbers. Which option should you utilize?

  • A Predefined Data Identifier
  • B File Type Identifier
  • C User Input Log
  • D Behavior Analytics
Explanation Predefined Data Identifiers are specifically created for patterns like credit card numbers, while others do not meet this need.