Symantec 250-587 - Symantec Data Loss Prevention 16.x Administration Technical Specialist
What detection method utilizes Data Identifiers?
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device†operation?
Which two factors are common sources of data leakage where the main actor is well-meaning insider? (Choose two.)
A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data. However, data transfers to these devices are still being blocked.
What is the first action an administrator should take to enable data transfers to the approved endpoint devices?
A DLP administrator has performed a test deployment of the DLP 15.0 Endpoint agent and now wants to uninstall the agent. However, the administrator no longer remembers the uninstall password.
What should the administrator do to work around the password problem?
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans.
When does the DLP agent stop scanning?
What detection technology supports partial contents matching?
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
What detection technology supports partial row matching?
Which network Prevent action takes place when the network Incident list shows the message is “Modified�
