Which best describes BCAAA?
Which best describes BCAAA? (Choose the best answer.) A. An intermediary between the ProxySG and an authentication server B. An application that sends sysinfo snapshots to Symantec support C. Symantec’s internal authorization and authentication service D. A utility that allows a direct connection between the ProxySG and an authentication domain.
Which service is provided by the ProxySG?
Which service is provided by the ProxySG? (Choose the best answer.) A. Virus scanning B. Strong authentication C. Edge routing D. Sandboxing
What is a component of a proxy service listener?
What is a component of a proxy service listener? (Choose the best answer.) A. Encryption hash B. Source IP address C. Proxy mode D. Proxy type
When will a policy trace report a rule processing result of “N/A”?
When will a policy trace report a rule processing result of “N/A”? (Choose the best answer.) A. When the layer containing the rule is disabled B. When the rule is not reached during evaluation C. When the rule makes no sense for the specific transaction being processed D. When the rule is contradicted by a […]
Which option correctly describes the two-tier installation type for Symantec DLP?
Which option correctly describes the two-tier installation type for Symantec DLP? A. Install the Oracle database on the host, and install the Enforce server and a detection server on a second host. B. Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the […]
Which action should a DLP administrator take to secure communications between an on-premises Enforce server an
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud? A. Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers. B. Use the built-in Symantec DLP certificate for both the […]
Which detection method depends on “training sets”?
Which detection method depends on “training sets”? A. Form Recognition B. Vector Machine Learning (VML) C. Index Document Matching (IDM) D. Exact Data Matching (IDM) Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on?
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.) A. Exchange B. Jiveon C. File store D. SharePoint E. Confluence Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric-encryption-en.pdf
Which product is able to replace a confidential document residing on a file share with a marker file explainin
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed? A. Network Discover B. Cloud Service for Email C. Endpoint Prevent D. Network Protect Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network-Protect-for-file-shares?locale=EN_US
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
What detection server is used for Network Discover, Network Protect, and Cloud Storage? A. Network Protect Storage Discover B. Network Discover/Cloud Storage Discover C. Network Prevent/Cloud Detection Service D. Network Protect/Cloud Detection Service Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-Network-Discover-Cloud-Storage-Discover-Server-configuration?locale=EN_US