Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Symantec 250-587 - Symantec Data Loss Prevention 16.x Administration Technical Specialist

Page: 3 / 3
Total 100 questions

Which tool must a DLP administrator run to certify the database prior to upgrading DLP?

A.

Lob_Tablespace Reclamation Tool

B.

Upgrade Readiness Tool

C.

SymDiag

D.

EnforceMigrationUtility

Which two (2) detection servers are available as virtual appliances? (Choose two.)

A.

Network Prevent for Email

B.

Network Monitor

C.

Network Discover

D.

Network Prevent for Web

E.

Optical Character Recognition (OCR)

A company needs to implement Data Owner Exception so that incidents when employees send or receive their own personal information.

What detection method should the company use?

A.

Indexed Document Matching (IDM)

B.

Vector Machine Learning (VML)

C.

Exact data matching (EDM)

D.

Described Content matching (DCM)

Why is it important for an administrator to utilize the grid scan feature?

A.

To distribute the scan workload across multiple network discover servers

B.

To distribute the scan workload across the cloud servers

C.

To distribute the scan workload across multiple endpoint servers

D.

To distribute the scan workload across multiple detection servers

What is Application Detection Configuration?

A.

The Cloud Detection Service (CDS) process that tells Enforce a policy has been violated

B.

The Data Loss Prevention (DLP) policy which has been pushed into Cloud Detection Service (CDC) for files in transit to or residing in Cloud apps

C.

The terminology describing the Data Loss Prevention (DLP) process within the CloudSOC administration portal

D.

the setting configured within the user interface (UI) that determines whether CloudSOC should send a file to Cloud Detection Service (CDS) for analysis.

Which two detection technology options run on the DLP agent? (Choose two.)

A.

Optical Character Recognition (OCR)

B.

Described Content Matching (DCM)

C.

Directory Group Matching (DGM)

D.

Form Recognition

E.

Indexed Document Matching (IDM)

A DLP administrator determines that the \SymantecDLP\Protect\Incidents folder on the Enforce server contains. BAD files dated today, while other. IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD files.

What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files?

A.

A corrupted policy was deployed.

B.

The Enforce server’s hard drive is out of space.

C.

A detection server has excessive filereader restarts.

D.

Tablespace is almost full.

Which two detection technology options ONLY run on a detection server? (Choose two.)

A.

Form Recognition

B.

Indexed Document matching (IDM)

C.

Described Content Matching (DCM)

D.

Exact data matching (EDM)

E.

vector Machine Learning (VML)

A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display.

What are the processes missing from the Server Detail page display?

A.

The Display Process Control setting on the Advanced Settings page is disabled.

B.

The Advanced Process Control setting on the System Settings page is deselected.

C.

The detection server Display Control Process option is disabled on the Server Detail page.

D.

The detection server PacketCapture process is displayed on the Server Overview page.

What is the correct installation sequence for the components shown here, according to the Symantec Installation Guide?

Place the options in the correct installation sequence.