VMware
Symantec Data Loss Prevention 16.x Administration Technical Specialist
250-587
Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.
198 questions
0 views
Free
Questions 41–50 of 198
A company needs to prevent sensitive data from being transferred via USB ports. Which feature should they implement?
-
A
Endpoint DLP
-
B
Email DLP
-
C
Web DLP
-
D
Network DLP
Explanation
Endpoint DLP specifically controls data on endpoints such as USB ports.
You are configuring a policy in Symantec DLP. What happens when you set an action to 'Detect only'?
-
A
Data is blocked immediately
-
B
User is notified of incidents
-
C
No action is taken on data
-
D
Data is encrypted automatically
Explanation
'Detect only' means no action will prevent data; it only logs incidents.
Which service is responsible for monitoring data transfers in Symantec DLP?
-
A
Network Monitor
-
B
Endpoint Protector
-
C
Policy Server
-
D
Incident Response
Explanation
Network Monitor captures and analyzes data transfers, while others serve different roles in DLP management.
A company needs to prevent unauthorized USB access. What should they configure?
-
A
Endpoint policies
-
B
Email policies
-
C
Web filtering rules
-
D
Cloud storage settings
Explanation
Endpoint policies can enforce restrictions on hardware access like USB drives, unlike other options which focus on different areas.
What happens when a DLP policy is set to 'Monitor' for a specific file type?
-
A
Data is blocked automatically
-
B
Alerts are generated on violations
-
C
Action log files are deleted
-
D
Reporting is disabled for the file
Explanation
Setting a policy to 'Monitor' generates alerts without blocking, while the other options do not apply to 'Monitor' status.
Which service allows for encryption of sensitive data in transit?
-
A
TLS
-
B
HTTP
-
C
SMTP
-
D
FTP
Explanation
TLS encrypts data in transit, ensuring security, while others do not primarily serve this purpose.
A company needs to prevent unauthorized file transfers. Which DLP policy should they implement?
-
A
Blocking outbound emails
-
B
User access control
-
C
Network segmentation
-
D
Database encryption
Explanation
Blocking outbound emails directly addresses unauthorized file transfers, unlike the other options.
What happens when a DLP rule matches but no action is configured?
-
A
Alerts are triggered only
-
B
Data is encrypted
-
C
No action occurs
-
D
Access is revoked
Explanation
If no action is defined, the matched rule performs no response, unlike alerting or data encryption capabilities.
Which service provides real-time monitoring of endpoints in Symantec DLP?
-
A
Endpoint Protection
-
B
Data Insight
-
C
Detection Server
-
D
System Monitor
Explanation
Endpoint Protection provides real-time monitoring; the others serve different purposes.
A company needs to block USB devices but still allow keyboard inputs. What feature should be configured?
-
A
Device Control
-
B
Network Control
-
C
Endpoint Discovery
-
D
Content Compliance
Explanation
Device Control manages USB access types; the others don't specifically target hardware inputs.