PrepAway - Latest Free Exam Questions & Answers

Category: 250-438

Exam 250-438: Administration of Symantec Data Loss Prevention 15

Which action should a DLP administrator take to secure communications between an on-premises Enforce server an

Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud? A. Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers. B. Use the built-in Symantec DLP certificate for both the […]

Which product is able to replace a confidential document residing on a file share with a marker file explainin

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed? A. Network Discover B. Cloud Service for Email C. Endpoint Prevent D. Network Protect Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network-Protect-for-file-shares?locale=EN_US

What detection server is used for Network Discover, Network Protect, and Cloud Storage?

What detection server is used for Network Discover, Network Protect, and Cloud Storage? A. Network Protect Storage Discover B. Network Discover/Cloud Storage Discover C. Network Prevent/Cloud Detection Service D. Network Protect/Cloud Detection Service Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-Network-Discover-Cloud-Storage-Discover-Server-configuration?locale=EN_US

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.) A. To specify Wi-Fi SSID names B. To specify an IP address or range C. To specify the endpoint server D. To specify domain names E. To specify network card status (ON/OFF) Reference: https://help.symantec.com/cs/dlp15.1/DLP/v18349332_v125428396/Setting-the-endpoint-location?locale=EN_US

Which detection method should the company use to meet this requirement?

A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement? A. Exact Data Matching (EDM) B. Described Content Matching (DCM) C. Vector Machine Learning (VML) D. Indexed Document Matching (IDM) Reference: https://help.symantec.com/cs/DLP15.0/DLP/v100774847_v120691346/Scheduling-remote-indexing?locale=EN_US

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being mon

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control? A. Add “custom_app.exe” to the “Application Whitelist” on all Endpoint servers. B. Add “custom_app.exe” Application Monitoring Configuration and de-select all its channel options. C. Add “custom_app_.exe” as a filename exception to the Endpoint Prevent policy. […]

What is the probable reason that the User Risk Summary report is blank?

A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the “User Reporting” privilege enabled, but […]


Page 1 of 212