VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 51–60 of 198

Q51

What happens when an incident is created in Symantec DLP?

  • A It automatically resolves the issue.
  • B It generates an alert for review.
  • C It deletes the offending data.
  • D It triggers a full system scan.
Explanation An incident generates an alert for review, whereas the others are incorrect actions.
Q52

Which service in Symantec DLP monitors USB device usage?

  • A Endpoint Prevention Service
  • B Network Monitoring Service
  • C Data Discovery Service
  • D Email Protection Service
Explanation Endpoint Prevention Service tracks USB usage, while others focus on different contexts.
Q53

A company needs to ensure that sensitive files are encrypted when sent via email. What should be configured?

  • A Email Encryption Policy
  • B Web Filtering Policy
  • C Network Detection Policy
  • D Storage Use Policy
Explanation Email Encryption Policy ensures sensitive data is encrypted, unlike policies addressing web or storage.
Q54

What happens when a file is flagged as containing sensitive information according to DLP rules?

  • A Immediate deletion of the file
  • B File quarantine and alert generation
  • C Automatic encryption of the file
  • D No action taken, just logging
Explanation Flagged files are quarantined and alerts sent, not deleted or encrypted automatically.
Q55

Which service in DLP is responsible for monitoring network traffic?

  • A Network Monitor
  • B Endpoint Protector
  • C Email Gateway
  • D Data Discovery
Explanation Network Monitor captures and analyzes traffic, unlike the others focused on file access or email.
Q56

A company needs to ensure unauthorized file access is detected. What should they configure?

  • A Policy-based alerts
  • B Encryption rules
  • C Web security settings
  • D User access logs
Explanation Policy-based alerts specifically monitor and trigger notifications for unauthorized access.
Q57

What happens when a DLP policy creates a false positive?

  • A DLP will ignore it
  • B User is notified automatically
  • C Incident is logged but not alerted
  • D Policy is enforced without interruption
Explanation The incident is logged, but it does not trigger alerts unless configured to do so.
Q58

Which service in Symantec DLP provides secure proxy for sensitive data transfers?

  • A DLP Cloud Proxy
  • B DLP Endpoint Protection
  • C DLP Network Monitor
  • D DLP Discovery Service
Explanation DLP Cloud Proxy provides secure data transfers; others do not focus on this function.
Q59

A company needs to classify data based on its content for compliance. Which DLP feature should they use?

  • A Discovery Policies
  • B Agent Policies
  • C Incident Policies
  • D Encryption Policies
Explanation Discovery Policies allow classification based on content; other policies serve different purposes.
Q60

What happens when an incident is triggered in Symantec DLP?

  • A Incident is ignored automatically
  • B Notification is sent to admins
  • C Sensitive data is deleted
  • D Policy enforcement is bypassed
Explanation A notification is sent to admins for review; incidents are not ignored or bypassed, nor is data deleted automatically.