A company needs to prevent confidential email data from being sent outside the organization. What policy should they implement?
ANetwork discovery policy
BEmail compliance policy
CFile share monitoring policy
DWeb application policy
Explanation
An Email compliance policy specifically targets the protection of sensitive data in emails, unlike the other options which monitor different types of data incidents.
Q72
You are configuring an incident response in DLP. What happens when you set actions to 'Monitor' and 'Block' simultaneously?
AOnly the monitor action takes effect
BBoth actions execute in sequence
COnly the block action takes effect
DAn error occurs; no action taken
Explanation
In DLP, when actions are set to 'Monitor' and 'Block', only the monitor action will function, as simultaneous actions are not allowed for one incident.
Q73
Which service in Symantec DLP allows for deployment oversight across various endpoints?
AEndpoint Detection Service
BData Insight Service
CPolicy Monitoring Service
DManagement Console Service
Explanation
The Management Console Service oversees endpoints; others do not admin tools.
Q74
A company needs to ensure that confidential files are not sent via email. What is the best approach?
AUse DLP email policies
BImplement two-factor authentication
CIncrease employee email storage limits
DSet up public email filters
Explanation
DLP email policies specifically prevent sensitive data in emails; others do not address data leakage directly.
Q75
You are configuring a DLP policy for a specific file type. What happens if a file with that type does not comply?
AFile is deleted automatically
BAction based on policy rules
CFile conversion to compliant type
DFile is ignored completely
Explanation
Non-compliant files trigger action based on set policy rules; others misinterpret DLP behavior.
Q76
Which service in Symantec DLP analyzes network traffic?
ANetwork Monitor
BEndpoint Agent
CStorage Discovery
DCloud Endpoint
Explanation
Network Monitor specifically analyzes network traffic, while others focus on different areas.
Q77
A company needs to ensure secure PDF documents remain protected in emails. What should they enable?
AFile Integrity Monitoring
BEmail Auto-Protection
CDatabase Discovery
DThreshold Alerts
Explanation
Email Auto-Protection specifically secures email attachments like PDFs, while others address different issues.
Q78
You are configuring a DLP policy for monitoring credit card information. What happens when a hard limit is reached?
APolicy becomes inactive
BAlerts are sent only
CCustom actions occur
DAll monitoring stops
Explanation
When a hard limit is reached, custom actions defined in the policy are executed, to manage the situation appropriately.
Q79
Which service in DLP helps manage policies?
AData Loss Prevention Manager
BPolicy Compliance Checker
CEndpoint Protection
DIncident Management System
Explanation
The Data Loss Prevention Manager oversees policy management, while other options do not encompass this function.
Q80
A company needs to prevent sensitive data from being sent through personal email accounts. What should be configured?
AEmail Encryption
BHTTP Policy
CEmail DLP Policy
DWeb Traffic Filtering
Explanation
Email DLP Policy specifically prevents sensitive data leaks via email, unlike the other options.