Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Symantec Data Loss Prevention 250-587 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

A company needs to secure the content of all mergers and Acquisitions Agreements/ However, the standard text included in all company literature needs to be excluded.

How should the company ensure that this standard text is excluded from detection?

Options:

A.

Create a Whitelisted.txt file after creating the Vector Machine Learning (VML) profile.


B.

Create a Whitelisted.txt file after creating the Exact Data Matching (EDM) profile


C.

Create a Whitelisted.txt file before creating the Indexed Document Matching (IDM) profile


D.

Create a Whitelisted.txt file before creating the Exact Data Matching (EDM) profile


Expert Solution
Questions # 12:

What detection server type requires a minimum of two physical network interface cards?

Options:

A.

Network Prevent for Web


B.

Network Prevent for Email


C.

Network Monitor


D.

Cloud Detection Service (CDS)


Expert Solution
Questions # 13:

Which statement accurately describes where Optical Character Recognition (OCR) On-Premises DLP Core components must be installed?

Options:

A.

The OCR engine must be installed directly on the Enforce server.


B.

The OCR engine must be installed on one or more detection servers.


C.

The OCR server software must by installed on one or more dedicated (non-detection) Windows servers.


D.

The OCR server software must be installed on one or more dedicated (non-detection) Linux servers.


Expert Solution
Questions # 14:

Which network Prevent action takes place when the network Incident list shows the message is “Modified”?

Options:

A.

Remove attachments from an email


B.

Obfuscate text in the body of an email


C.

Add one or more SMTP headers to an email


D.

Modify content from the body of an email


Expert Solution
Questions # 15:

What is the default fallback option for the Endpoint Prevent Encrypt response rule?

Options:

A.

Block


B.

User Cancel


C.

Encrypt


D.

Notify


Expert Solution
Questions # 16:

Which option correctly describes the two-tier installation type for Symantec DLP?

Options:

A.

Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.


B.

Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.


C.

Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.


D.

Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.


Expert Solution
Questions # 17:

An organization wants to restrict employees to copy files only a specific set of USB thumb drives owned by the organization.

Which detection method should the organization use to meet this requirement?

Options:

A.

Exact data Matching (EDM)


B.

Indexed Document matching (IDM)


C.

Described Content Matching (DCM)


D.

Vector Machine Learning (VML)


Expert Solution
Questions # 18:

When Symantec DLP is integrated with Microsoft Purview Information Protection (MPIP, also previously known as MIP), to which content types can the Mac DLP Agent apply MPIP labels (classification tags)?

Options:

A.

Microsoft Word, Excel, and PowerPoint files


B.

Microsoft Word, Excel, and PowerPoint files; and Adobe PDF files


C.

Microsoft Word, Excel, and PowerPoint files; and Microsoft Outlook emails


D.

Microsoft Word, Excel, and PowerPoint files; Microsoft Outlook emails; and Adobe PDF files


Expert Solution
Questions # 19:

Which two components can perform a file system scan of a workstation? (Choose two.)

Options:

A.

Endpoint Server


B.

DLP Agent


C.

Network Prevent for Web Server


D.

Discover Server


E.

Enforce Server


Expert Solution
Questions # 20:

A compliance officer needs to understand how the company is complying with its data security policies over time.

Which report should be compliance officer generate to obtain the compliance information?

Options:

A.

Policy report, filtered on date and summarized by policy


B.

Policy Trend report, summarized by policy, then quarter


C.

Policy report, filtered on quarter and summarized by policy


D.

Policy Trend report, summarized by policy, then severity


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions