VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 41–50 of 198

Q41

A company needs to prevent sensitive data from being transferred via USB ports. Which feature should they implement?

  • A Endpoint DLP
  • B Email DLP
  • C Web DLP
  • D Network DLP
Explanation Endpoint DLP specifically controls data on endpoints such as USB ports.
Q42

You are configuring a policy in Symantec DLP. What happens when you set an action to 'Detect only'?

  • A Data is blocked immediately
  • B User is notified of incidents
  • C No action is taken on data
  • D Data is encrypted automatically
Explanation 'Detect only' means no action will prevent data; it only logs incidents.
Q43

Which service is responsible for monitoring data transfers in Symantec DLP?

  • A Network Monitor
  • B Endpoint Protector
  • C Policy Server
  • D Incident Response
Explanation Network Monitor captures and analyzes data transfers, while others serve different roles in DLP management.
Q44

A company needs to prevent unauthorized USB access. What should they configure?

  • A Endpoint policies
  • B Email policies
  • C Web filtering rules
  • D Cloud storage settings
Explanation Endpoint policies can enforce restrictions on hardware access like USB drives, unlike other options which focus on different areas.
Q45

What happens when a DLP policy is set to 'Monitor' for a specific file type?

  • A Data is blocked automatically
  • B Alerts are generated on violations
  • C Action log files are deleted
  • D Reporting is disabled for the file
Explanation Setting a policy to 'Monitor' generates alerts without blocking, while the other options do not apply to 'Monitor' status.
Q46

Which service allows for encryption of sensitive data in transit?

  • A TLS
  • B HTTP
  • C SMTP
  • D FTP
Explanation TLS encrypts data in transit, ensuring security, while others do not primarily serve this purpose.
Q47

A company needs to prevent unauthorized file transfers. Which DLP policy should they implement?

  • A Blocking outbound emails
  • B User access control
  • C Network segmentation
  • D Database encryption
Explanation Blocking outbound emails directly addresses unauthorized file transfers, unlike the other options.
Q48

What happens when a DLP rule matches but no action is configured?

  • A Alerts are triggered only
  • B Data is encrypted
  • C No action occurs
  • D Access is revoked
Explanation If no action is defined, the matched rule performs no response, unlike alerting or data encryption capabilities.
Q49

Which service provides real-time monitoring of endpoints in Symantec DLP?

  • A Endpoint Protection
  • B Data Insight
  • C Detection Server
  • D System Monitor
Explanation Endpoint Protection provides real-time monitoring; the others serve different purposes.
Q50

A company needs to block USB devices but still allow keyboard inputs. What feature should be configured?

  • A Device Control
  • B Network Control
  • C Endpoint Discovery
  • D Content Compliance
Explanation Device Control manages USB access types; the others don't specifically target hardware inputs.