Symantec 250-438 - Administration of Symantec Data Loss Prevention 15
Which two actions are available for a “Network Prevent: Remove HTTP/HTTPS content†response rule when the content is unable to be removed? (Choose two.)
A DLP administrator needs to remove an agent its associated events from an Endpoint server.
Which Agent Task should the administrator perform to disable the agent’s visibility in the Enforce management console?
Which two detection technology options ONLY run on a detection server? (Choose two.)
Which option correctly describes the two-tier installation type for Symantec DLP?
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
An organization wants to restrict employees to copy files only a specific set of USB thumb drives owned by the organization.
Which detection method should the organization use to meet this requirement?
Which detection server is available from Symantec as a hardware appliance?
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
An administrator is unable to log in to the Enforce management console as “sysadminâ€. Symantec DLP is configured to use Active Directory authentication. The administrator is a member of two roles: “sysadmin†and “remediator.â€
How should the administrator log in to the Enforce console with the “sysadmin†role?
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device†operation?