Which detection server is available from Symantec as a hardware appliance?
Answer : D
Reference:
https://help.symantec.com/cs/dlp15.0/DLP/v122938258_v120691346/Setting-up-the-DLP-S500-Appliance?locale=EN_US
DRAG DROP -
The Symantec Data Loss risk reduction approach has six stages.
Drag and drop the six correct risk reduction stages in the proper order of Occurrence column.
Select and Place:
Answer :
Reference:
https://www.slideshare.net/iftikhariqbal/symantec-data-loss-prevention-technical-proposal-general
An organization wants to restrict employees to copy files only a specific set of USB thumb drives owned by the organization.
Which detection method should the organization use to meet this requirement?
Answer : C
Reference:
https://help.symantec.com/cs/DLP15.0/DLP/v27745860_v120691346/Data-Loss-Prevention-policy-detection-technologies?locale=EN_US
What detection server type requires a minimum of two physical network interface cards?
Answer : C
Refer to the exhibit. Which type of Endpoint response rule is shown?
Answer : B
Reference:
https://help.symantec.com/cs/dlp15.0/DLP/v27595430_v120691346/Configuring-the-Endpoint-Prevent:-Block-action?locale=EN_US
Why would an administrator set the Similarity Threshold to zero when testing and tuning a Vector Machine Learning (VML) profile?
Answer : D
Reference:
https://help.symantec.com/cs/dlp15.0/DLP/v45067125_v120691346/Adjusting-the-Similarity-Threshold?locale=EN_US
Which Network Prevent action takes place when the Network Incident list shows the message is ג€Modifiedג€?
Answer : C
Which two technologies should an organization utilize for integration with the Network Prevent products? (choose two.)
Answer : CD
Reference:
https://www.symantec.com/connect/articles/network-prevent
A customer needs to integrate information from DLP incidents into external Governance, Risk and Compliance dashboards.
Which feature should a third party component integrate with to provide dynamic reporting, create custom incident remediation processes, or support business processes?
Answer : B
Which two detection technology options ONLY run on a detection server? (Choose two.)
Answer : BD
Reference:
https://support.symantec.com/en_US/article.INFO5070.html
A DLP administrator needs to remove an agent its associated events from an Endpoint server.
Which Agent Task should the administrator perform to disable the agentג€™s visibility in the Enforce management console?
Answer : C
A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information.
What detection method should the company use?
Answer : C
Reference:
https://help.symantec.com/cs/dlp15.5/DLP/v40148006_v128674454/About-Data-Owner-Exception?locale=EN_US
What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?
Answer : B
Why is it important for an administrator to utilize the grid scan feature?
Answer : D
Explanation -
If you plan to use the grid scanning feature to distribute the scanning workload across multiple detection servers, retain the default value (1)
Which two Network Discover/Cloud Storage targets apply Information Centric Encryption as policy response rules?
Answer : DE
Reference:
https://help.symantec.com/cs/ice1.0/ICE/v126756321_v120576779/Using-ICE-with-Symantec-Data-Loss-Prevention?locale=EN_US