VMware

Symantec Data Loss Prevention 16.x Administration Technical Specialist

250-587

Prepare for the 250-587 exam to demonstrate your expertise in Data Loss Prevention.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 71–80 of 198

Q71

A company needs to prevent confidential email data from being sent outside the organization. What policy should they implement?

  • A Network discovery policy
  • B Email compliance policy
  • C File share monitoring policy
  • D Web application policy
Explanation An Email compliance policy specifically targets the protection of sensitive data in emails, unlike the other options which monitor different types of data incidents.
Q72

You are configuring an incident response in DLP. What happens when you set actions to 'Monitor' and 'Block' simultaneously?

  • A Only the monitor action takes effect
  • B Both actions execute in sequence
  • C Only the block action takes effect
  • D An error occurs; no action taken
Explanation In DLP, when actions are set to 'Monitor' and 'Block', only the monitor action will function, as simultaneous actions are not allowed for one incident.
Q73

Which service in Symantec DLP allows for deployment oversight across various endpoints?

  • A Endpoint Detection Service
  • B Data Insight Service
  • C Policy Monitoring Service
  • D Management Console Service
Explanation The Management Console Service oversees endpoints; others do not admin tools.
Q74

A company needs to ensure that confidential files are not sent via email. What is the best approach?

  • A Use DLP email policies
  • B Implement two-factor authentication
  • C Increase employee email storage limits
  • D Set up public email filters
Explanation DLP email policies specifically prevent sensitive data in emails; others do not address data leakage directly.
Q75

You are configuring a DLP policy for a specific file type. What happens if a file with that type does not comply?

  • A File is deleted automatically
  • B Action based on policy rules
  • C File conversion to compliant type
  • D File is ignored completely
Explanation Non-compliant files trigger action based on set policy rules; others misinterpret DLP behavior.
Q76

Which service in Symantec DLP analyzes network traffic?

  • A Network Monitor
  • B Endpoint Agent
  • C Storage Discovery
  • D Cloud Endpoint
Explanation Network Monitor specifically analyzes network traffic, while others focus on different areas.
Q77

A company needs to ensure secure PDF documents remain protected in emails. What should they enable?

  • A File Integrity Monitoring
  • B Email Auto-Protection
  • C Database Discovery
  • D Threshold Alerts
Explanation Email Auto-Protection specifically secures email attachments like PDFs, while others address different issues.
Q78

You are configuring a DLP policy for monitoring credit card information. What happens when a hard limit is reached?

  • A Policy becomes inactive
  • B Alerts are sent only
  • C Custom actions occur
  • D All monitoring stops
Explanation When a hard limit is reached, custom actions defined in the policy are executed, to manage the situation appropriately.
Q79

Which service in DLP helps manage policies?

  • A Data Loss Prevention Manager
  • B Policy Compliance Checker
  • C Endpoint Protection
  • D Incident Management System
Explanation The Data Loss Prevention Manager oversees policy management, while other options do not encompass this function.
Q80

A company needs to prevent sensitive data from being sent through personal email accounts. What should be configured?

  • A Email Encryption
  • B HTTP Policy
  • C Email DLP Policy
  • D Web Traffic Filtering
Explanation Email DLP Policy specifically prevents sensitive data leaks via email, unlike the other options.