Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Symantec Data Loss Prevention 250-587 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is required on the Enforce server to communicate with the Symantec DLP database?

Options:

A.

Port 8082 should be opened


B.

CryptoMasterKey.properties file


C.

Symbolic links to .dbf files


D.

SQL*plus Client


Expert Solution
Questions # 2:

A DLP administrator is attempting to add a new Network Discover detection server from the Enforce management console. However, the only available options are Network Monitor and Endpoint servers.

What should the administrator do to make the Network Discover option available?

Options:

A.

Restart the Symantec DLP Controller service


B.

Apply a new software license file from the Enforce console


C.

Install a new Network Discover detection server


D.

Restart the Vontu Monitor Service


Expert Solution
Questions # 3:

An administrator is unable to log in to the Enforce management console as “sysadmin”. Symantec DLP is configured to use Active Directory authentication. The administrator is a member of two roles: “sysadmin” and “remediator.”

How should the administrator log in to the Enforce console with the “sysadmin” role?

Options:

A.

sysadmin\username


B.

sysadmin\username@domain


C.

domain\username


D.

username\sysadmin


Expert Solution
Questions # 4:

What detection technology supports partial contents matching?

Options:

A.

Indexed Document Matching (IDM)


B.

Described Content Matching (DCM)


C.

Exact Data Matching (DCM)


D.

Optical Character Recognition (OCR)


Expert Solution
Questions # 5:

What detection method utilizes Data Identifiers?

Options:

A.

Indexed Document matching (IDM)


B.

Described Content Matching (DCM)


C.

Directory Group Matching (DGM)


D.

Exact Data Matching (EDM)


Expert Solution
Questions # 6:

Which tool must a DLP administrator run to certify the database prior to upgrading DLP?

Options:

A.

Lob_Tablespace Reclamation Tool


B.

Upgrade Readiness Tool


C.

SymDiag


D.

EnforceMigrationUtility


Expert Solution
Questions # 7:

A DLP administrator determines that the \SymantecDLP\Protect\Incidents folder on the Enforce server contains. BAD files dated today, while other. IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD files.

What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files?

Options:

A.

A corrupted policy was deployed.


B.

The Enforce server’s hard drive is out of space.


C.

A detection server has excessive filereader restarts.


D.

Tablespace is almost full.


Expert Solution
Questions # 8:

How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device” operation?

Options:

A.

Add a “Limit Incident Data Retention” response rule with “retain Original Message” option selected.


B.

Modify the agent config.db to include the file


C.

Modify the “Endpoint_Retain_Files.int” setting in the Endpoint server configuration


D.

Modify the agent configuration and select the option “retain Original Files”


Expert Solution
Questions # 9:

Under the “System Overview” in the Enforce management console, the status of a Network Monitor detection server is shown as “Running Selected.” The Network Monitor server’s event logs indicate that the packet capture and filereader processes are crashing.

What is a possible cause for the Network Monitor server being in this state?

Options:

A.

There is insufficient disk space on the Network Monitor server.


B.

The Network Monitor server’s certificate is corrupt or missing.


C.

The Network Monitor server’s license file has expired.


D.

The Enforce and Network Monitor servers are running different versions of DLP.


Expert Solution
Questions # 10:

A software company wants to protect its source code, including new source code created between scheduled indexing runs.

Which detection method should the company use to meet this requirement?

Options:

A.

Exact Data Matching (EDM)


B.

Described Content Matching (DCM)


C.

Indexed Document Matching (IDM)


D.

Vector Machine Learning (VML)


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions