What is the first action an administrator should take to enable data transfers to the approved endpoint devices?

A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data. However, data transfers to these devices are still being blocked. What is the first action an administrator should take to enable data transfers to the approved endpoint...

August 12, 2019 No Comments READ MORE +

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)A . To specify Wi-Fi SSID namesB . To specify an IP address or rangeC . To specify the endpoint serverD . To specify domain namesE . To specify network card status (ON/OFF)View...

August 7, 2019 No Comments READ MORE +

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?A . Network DiscoverB . Cloud Service for EmailC . Endpoint PreventD . Network ProtectView AnswerAnswer: D Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network­Protect-for-file-shares?locale=EN_US

August 5, 2019 No Comments READ MORE +

How should the company ensure that this standard text is excluded from detection?

A company needs to secure the content of all mergers and Acquisitions Agreements/ However, the standard text included in all company literature needs to be excluded. How should the company ensure that this standard text is excluded from detection?A . Create a Whitelisted.txtfile after creating the Vector Machine Learning (VML)...

August 1, 2019 No Comments READ MORE +

Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?

Which server target uses the “Automated Incident Remediation Tracking” feature in Symantec DLP?A . ExchangeB . File SystemC . Lotus NotesD . SharePointView AnswerAnswer: B Explanation: Reference: https://help.symantec.com/cs/DLP15.0/DLP/v83981880_v120691346/Troubleshooting­automated-incident-remediation-tracking?locale=EN_US

July 31, 2019 No Comments READ MORE +

What detection technology supports partial contents matching?

What detection technology supports partial contents matching?A . Indexed Document Matching (IDM)B . Described Content Matching (DCM)C . Exact Data Matching (DCM)D . Optical Character Recognition (OCR)View AnswerAnswer: A Explanation: Reference: https://help.symantec.com/cs/dlp15.1/DLP/v115965297_v125428396/Mac-agent-detection­technologies?locale=EN_US

July 30, 2019 No Comments READ MORE +