Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Administration of Symantec Data Loss Prevention 15

Last Update 19 hours ago Total Questions : 70

The Administration of Symantec Data Loss Prevention 15 content is now fully updated, with all current exam questions added 19 hours ago. Deciding to include 250-438 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 250-438 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 250-438 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Administration of Symantec Data Loss Prevention 15 practice test comfortably within the allotted time.

Question # 4

What detection server type requires a minimum of two physical network interface cards?

A.

Network Prevent for Web

B.

Network Prevent for Email

C.

Network Monitor

D.

Cloud Detection Service (CDS)

Question # 5

A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the “User Reporting” privilege enabled, but User Risk reporting is still not working.

What is the probable reason that the User Risk Summary report is blank?

A.

Only DLP administrators are permitted to access and view data for high risk users.

B.

The Enforce server has insufficient permissions for importing user attributes.

C.

User attribute data must be configured separately from incident data attributed.

D.

User attributes have been incorrectly mapped to Active Directory accounts.

Question # 6

What is required on the Enforce server to communicate with the Symantec DLP database?

A.

Port 8082 should be opened

B.

CryptoMasterKey.properties file

C.

Symbolic links to .dbf files

D.

SQL*plus Client

Question # 7

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?

A.

Network Discover

B.

Cloud Service for Email

C.

Endpoint Prevent

D.

Network Protect

Question # 8

What detection method utilizes Data Identifiers?

A.

Indexed Document matching (IDM)

B.

Described Content Matching (DCM)

C.

Directory Group Matching (DGM)

D.

Exact Data Matching (EDM)

Question # 9

Which two Network Discover/Cloud Storage targets apply Information Centric Encryption as policy response rules?

A.

Microsoft Exchange

B.

Windows File System

C.

SQL Databases

D.

Microsoft SharePoint

E.

Network File System (NFS)

Question # 10

Which two components can perform a file system scan of a workstation? (Choose two.)

A.

Endpoint Server

B.

DLP Agent

C.

Network Prevent for Web Server

D.

Discover Server

E.

Enforce Server

Go to page: