We at Crack4sure are committed to giving students who are preparing for the Symantec 250-587 Exam the most current and reliable questions . To help people study, we've made some of our Symantec Data Loss Prevention 16.x Administration Technical Specialist exam materials available for free to everyone. You can take the Free 250-587 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
A DLP administrator is testing Network Prevent for Web functionality. When the administrator posts a small test file to a cloud storage website, no new incidents are reported.
What should the administrator do to allow incidents to be generated against this file?
What detection method utilizes Data Identifiers?
A compliance officer needs to understand how the company is complying with its data security policies over time.
Which report should be compliance officer generate to obtain the compliance information?
What is the default fallback option for the Endpoint Prevent Encrypt response rule?
Which two factors are common sources of data leakage where the main actor is well-meaning insider? (Choose two.)
When managing an Endpoint Discover scan, a DLP administrator notices some endpoint computers are NOT completing their scans.
When does the DLP agent stop scanning?
Which detection server is available from Symantec as a hardware appliance?
A customer needs to integrate information from DLP incidents into external Governance, Risk and Compliance dashboards.
Which feature should a third party component integrate with to provide dynamic reporting, create custom incident remediation processes, or support business processes?
What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?
Why would an administrator set the Similarity Threshold to zero when testing and tuning a Vector Machine Learning (VML) profile?
Why is it important for an administrator to utilize the grid scan feature?
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
Which two (2) detection technology options run ONLY on detection servers and NOT on endpoint agents? (Choose two.)
A DLP administrator has performed a test deployment of the DLP 15.0 Endpoint agent and now wants to uninstall the agent. However, the administrator no longer remembers the uninstall password.
What should the administrator do to work around the password problem?
An administrator is unable to log in to the Enforce management console as “sysadmin”. Symantec DLP is configured to use Active Directory authentication. The administrator is a member of two roles: “sysadmin” and “remediator.”
How should the administrator log in to the Enforce console with the “sysadmin” role?
A software company wants to protect its source code, including new source code created between scheduled indexing runs.
Which detection method should the company use to meet this requirement?
A DLP administrator determines that the \SymantecDLP\Protect\Incidents folder on the Enforce server contains. BAD files dated today, while other. IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD files.
What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files?
What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?
Where in the Enforce management console can a DLP administrator change the “UI.NO_SCAN.int” setting to disable the “Inspecting data” pop-up?
What is the Symantec recommended order for stopping Symantec DLP services on a Windows Enforce server?
Which service encrypts the message when using a Modify SMTP Message response rule?
Which two (2) technologies should an organization utilize for integration with the Network Prevent products? (Choose two.)
Which type of response rule does Cloud Service for Email use to block confidential emails?
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
What is the correct configuration for “BoxMonitor.Channels” that will allow the server to start as a Network Monitor server?
3 Months Free Update
3 Months Free Update
3 Months Free Update