Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?A . Network DiscoverB . Cloud Service for EmailC . Endpoint PreventD . Network ProtectView AnswerAnswer: D Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network­Protect-for-file-shares?locale=EN_US

April 25, 2020 No Comments READ MORE +

How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device” operation?

How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device” operation?A . Add a “Limit Incident Data Retention” response rule with “retain Original Message” option selected.B . Modify the agent config.db to include the...

April 25, 2020 No Comments READ MORE +

Which option correctly describes the two-tier installation type for Symantec DLP?

Which option correctly describes the two-tier installation type for Symantec DLP?A . Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.B . Install the Oracle database on a local physical host, and install the Enforce server and detection servers...

April 24, 2020 No Comments READ MORE +

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control?

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control?A . Add “custom_app.exe” to the “Application Whitelist” on all Endpoint servers.B . Add “custom_app.exe” Application Monitoring Configuration and de-select all its channel options.C . Add “custom_app_.exe” as a filename exception...

April 24, 2020 No Comments READ MORE +

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)A . To specify Wi-Fi SSID namesB . To specify an IP address or rangeC . To specify the endpoint serverD . To specify domain namesE . To specify network card status (ON/OFF)View...

April 24, 2020 No Comments READ MORE +

Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)

Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)A . ExchangeB . JiveonC . File storeD . SharePointE . ConfluenceView AnswerAnswer: CD Explanation: Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric­encryption-en.pdf

April 23, 2020 No Comments READ MORE +

How should the company ensure that this standard text is excluded from detection?

A company needs to secure the content of all mergers and Acquisitions Agreements/ However, the standard text included in all company literature needs to be excluded. How should the company ensure that this standard text is excluded from detection?A . Create a Whitelisted.txtfile after creating the Vector Machine Learning (VML)...

April 23, 2020 No Comments READ MORE +

Which two detection servers are available as virtual appliances? (Choose two.)

Which two detection servers are available as virtual appliances? (Choose two.)A . Network MonitorB . Network Prevent for WebC . Network DiscoverD . Network Prevent for EmailE . Optical Character Recognition (OCR)View AnswerAnswer: BD Explanation: Reference: https://help.symantec.com/cs/dlp15.0/DLP/v123002905_v120691346/About-DLP-Appliances? locale=EN_US

April 23, 2020 No Comments READ MORE +

Which detection method should the company use to meet this requirement?

A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?A . Exact Data Matching (EDM)B . Described Content Matching (DCM)C . Vector Machine Learning (VML)D . Indexed Document Matching (IDM)View AnswerAnswer:...

September 28, 2019 1 Comment READ MORE +

What is the default fallback option for the Endpoint Prevent Encrypt response rule?

What is the default fallback option for the Endpoint Prevent Encrypt response rule?A . BlockB . User CancelC . EncryptD . NotifyView AnswerAnswer: D

September 26, 2019 No Comments READ MORE +