Filters
Question type

Study Flashcards

An employee reports that a message sent to a customer was rejected. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know why that message was blocked. Which section of the Message Audit Log detail page would provide this information?


A) Verdict(s)
B) Action(s)
C) IP Blocklist Lookup Tool
D) Block Reason

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

What detection technology supports partial contents matching?


A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Exact Data Matching (DCM)
D) Optical Character Recognition (OCR)

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed?


A) The license is included with Symantec Protection Suite.
B) The license is included with Symantec Messaging Gateway 10.5.
C) The license is included with Symantec Content Encryption.
D) The license is available with a PGP Universal license.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A DLP administrator has performed a test deployment of the DLP 15.0 Endpoint agent and now wants to uninstall the agent. However, the administrator no longer remembers the uninstall password. What should the administrator do to work around the password problem?


A) Apply a new global agent uninstall password in the Enforce management console.
B) Manually delete all the Endpoint agent files from the test computer and install a new agent package.
C) Replace the PGPsdk.dll file on the agent's assigned Endpoint server with a copy from a different Endpoint server Replace the PGPsdk.dll file on the agent's assigned Endpoint server with a copy from a different Endpoint server
D) Use the UninstallPwdGenerator to create an UninstallPasswordKey . Use the UninstallPwdGenerator to create an UninstallPasswordKey .

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?


A) Exact Data Matching (EDM)
B) Described Content Matching (DCM)
C) Vector Machine Learning (VML)
D) Indexed Document Matching (IDM)

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?


A) Network Discover
B) Cloud Service for Email
C) Endpoint Prevent
D) Network Protect

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

The Symantec Messaging Gateway 10.5 appliance will be deployed with the following topology: Internet Default Gateway (10.10.10.1) <--> Email Gateway (10.10.10.11) <--> Symantec Messaging Gateway (10.10.10.21) <--> Internal Mail Server (10.10.10.31) Which IP address should be specified in the Mail Filtering - Non-local Mail Delivery page of the site setup wizard?


A) 10.10.10.1
B) 10.10.10.11
C) 10.10.10.21
D) 10.10.10.31

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What will trigger a spam policy by default in Symantec Messaging Gateway 10.5?


A) adding a text file attachment with the word SPAM to the message
B) inserting the header X-Bulk: into the message header
C) prepending the subject line of the message with the following: [SPAM TEST]
D) inserting the header X-Advertisement: spam into the message header

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Where in the Enforce management console can a DLP administrator change the "UI.NO_SCAN.int" setting to disable the "Inspecting data" pop-up?


A) Advanced Server Settings from the Endpoint Server Configuration
B) Advanced Monitoring from the Agent Configuration
C) Advanced Agent Settings from the Agent Configuration
D) Application Monitoring from the Agent Configuration

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. What detection method should the company use?


A) Indexed Document Matching (IDM)
B) Vector Machine Learning (VML)
C) Exact Data Matching (EDM)
D) Described Content Matching (DCM)

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What is an advantage of Symantec Content Encryption over TLS encryption?


A) Ensures compliance with government-mandated regulations
B) TLS encryption provides better security than content encryption.
C) May be implemented without requiring SSL certificates for each scanner
D) Ensures secure end-to-end delivery of sensitive messages

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which two factors are common sources of data leakage where the main actor is well-meaning insider? (Choose two.)


A) An absence of a trained incident response team
B) A disgruntled employee for a job with a competitor
C) Merger and Acquisition activities
D) Lack of training and awareness
E) Broken business processes

F) B) and E)
G) A) and D)

Correct Answer

verifed

verified

Which detection server is available from Symantec as a hardware appliance?


A) Network Prevent for Email
B) Network Discover
C) Network Monitor
D) Network Prevent for Web

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

A customer receives large amounts of non-spam mail from thousands of different users, which consumes significant resources on Symantec Messaging Gateway 10.5. Which feature should be enabled to improve system performance while minimizing the risk of false positives?


A) Creation of custom spam rules using SenderID
B) Fastpass
C) Domain whitelisting
D) Sender authentication

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What happens to an IP listed in the Fastpass exclusions?


A) The IP will not be processed for spam, but will still be scanned for malware.
B) The IP will be excluded from spam scanning.
C) The IP will never get a Fastpass.
D) The IP will be excluded from compliance scanning.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the default fallback option for the Endpoint Prevent Encrypt response rule?


A) Block
B) User Cancel
C) Encrypt
D) Notify

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?


A) Smart Response on the Incident page
B) Automated Response on the Incident Snapshot page
C) Smart Response on an Incident List report
D) Automated Response on an Incident List report

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What detection technology supports partial contents matching?


A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Exact Data Matching (EDM)
D) Optical Character Recognition (OCR)

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Which two Infrastructure-as-a-Service providers are supported for hosting Cloud Prevent for Office 365? (Choose two.)


A) Any customer-hosted private cloud
B) Amazon Web Services
C) AT&T
D) Verizon
E) Rackspace

F) A) and C)
G) A) and E)

Correct Answer

verifed

verified

A compliance officer needs to understand how the company is complying with its data security policies over time. Which report should be compliance officer generate to obtain the compliance information?


A) Policy report, filtered on date and summarized by policy
B) Policy Trend report, summarized by policy, then quarter
C) Policy report, filtered on quarter and summarized by policy
D) Policy Trend report, summarized by policy, then severity

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 138

Related Exams

Show Answer