Shared Flashcard Set

Details

STS Test Prep
Questions from STS practice exam
127
Computer Science
Professional
10/24/2011

Additional Computer Science Flashcards

 


 

Cards

Term
How can Discover scans be optimized in the future, once a full scan has been performed?
Definition
Use an incremental scan to only include previously unscanned or recently changed items
Term
Which two products in the Symantec DLP Suite are required to quarantine confidential files inappropriately on a NAS share?
Definition
Network Discover and Network Protect
Term
What two types of products are leveraged for Network Prevent Integration?
Definition
Mail Transfer Agent and Web Proxy Server
Term
How can you exclude specific text from an Indexed Document Matching (IDM) profile?
Definition
Create a whitelisted.txt file before creating the IDM profile
Term
An organization needs to determine if anyone other than the CEO is e-mailing PDF documents that contain the phrase "Revenue Operating Report". How many rules and exceptions must be created to write this policy with the fewest possible false positives?
Definition
One rule with two conditions and one user exception
Term
How can you determine if a certain percentage or more of a sensitive document is leaving an organization?
Definition
Using minimum document exposure
Term
How can you make a policy detect a group of users based on Active Directory group membership?
Definition
Using "Sender/receiver matches Group based on Directory Server Group".
Term
A company is using an EDM profile that is updated weekly, but customers are added daily. What type of rule will protect the new customers until the profile is updated?
Definition
A separate rule that uses Data Identifiers
Term
Where does a Data Loss Prevention Administrator recycle the File Reader process on a detection server?
Definition
Server Detail Page
Term
Where can a Data Loss Prevention Administrator view the number of messages per protocol that have been monitored for a given time period?
Definition
Traffic Detail Page
Term
An administrator has received the system event: "Table space is almost full." How should the administrator resolve the issue?
Definition
Create additional table space for the Oracle database
Term
Which feature allows the sending of reports, based on groups of incidents associated to individuals, on an automated schedule?
Definition
Data owner remediation
Term
According to Symantec's risk reduction model, which type of detection should be used during the Baseline phase?
Definition
EDM/IDM detection
Term
According to Symantec's risk reduction model, what is noticed during the notification phase of risk reduction?
Definition
A significant decrease in the number of incidents
Term
According to Symantec's risk reduction model, what are the four phases, in order?
Definition
Baseline, Remediation, Notification, Prevention/Protection
Term
When and how is the license for Symantec DLP 11 applied during installation?
Definition
By uploading the license file when prompted by the installer
Term
How should reports be configured in the system for secure distribution ?
Definition
as links
Term
What is the maximum number of port lets can be used in a dashboard?
Definition
6
Term
If the Network Monitor is discarding an increasing number of packets throughout the day, what change should be made to reduce the number of discarded packets?
Definition
Uncheck unnecessary protocols from the Monitor configuration page
Term
Which feature will allow an incident responder to begin to determine where an attachment has created other violations?
Definition
Report Filters
Term
Where can the list of Keyword validators included with a Data Identifier be found?
Definition
User Interface - Edit Policy > Edit Rule > More Info
Term
When doing a DAR scan, where can you find details such as the total run time of the scan and the number of errors encountered?
Definition
Discover Targets page
Term
What are the two primary benefits of the data owner remediation process?
Definition
Batch notification for incident remediation, and automated scheduled notification for the owner
Term
Under incident actions, if the lookup attributes option is missing, what section in the Plugins.properties file is misconfigured?
Definition
Plugin Execution chain is undefined.
Term
In which two ways can the listening port for a detection server be modified?
Definition
In the Enforce UI under System > Overview, and by editing the Communication.properties file on the detection server
Term
What two activities are included in the
Remediation phase of Symantec's risk reduction model?
Definition
Business Unit Interviews and fixing broken business processes
Term
What action must a Data Loss Prevention Analyst take after modifying protocol filters?
Definition
recycle Vontu services on any Network Monitor using the affected protocols
Term
When will a file be duplicated during an Endpoint Discover scan?
Definition
When a file is quarantined
Term
When implementing Network Monitor in an Enterprise environment, which should be implemented first, outbound or inbound traffic?
Definition
Outbound traffic
Term
Which Data Loss Prevention feature can prevent an unauthorized tool from accessing confidential data?
Definition
Application Monitoring
Term
Define a Symantec DLP three tier installation.
Definition
The Oracle Database, Enforce server, and a detection server all installed on separate machines.
Term
Which detection server has the ability to block FTP upload requests?
Definition
HTTP Prevent
Term
For greater accuracy, what is the minimum recommended number of columns in a data source for use in an EDM profile?
Definition
3
Term
Which Symantec DLP product can replace a confidential document with a marker file explaining why the document was removed?
Definition
Network Protect
Term
Which detection method is used for fingerprinting and protecting unstructured data, such as merger and acquisition documents?
Definition
Indexed Data Matching
Term
What two methods are available to notify users when SMTP e-mails are blocked by SMTP Prevent?
Definition
MTA generated delivery status notification and Symantec Response Rule generated notification
Term
When installing an Endpoint Server, at what point does it register with the Enforce Server?
Definition
After adding the server from within the Enforce interface
Term
What are the five steps, in order, of the Symantec Data Loss Prevention policy lifecycle?
Definition
identify threat, build policy, test policy, tune policy, deploy policy
Term
When should Network Discover Scanners be used?
Definition
To scan data repositories that require special access methods to be readable
Term
Name two ways of collecting log information from Enforce Servers.
Definition
Use the log collection and configuration tool, and navigate manually to the log directory of the Enforce Server installation
Term
Which two conditions can be specified when creating an incident access condition in a role?
Definition
A custom attribute, and a policy group
Term
If a scanner fails to return results upon completion of the scan process. Which file should be removed to eliminate previous scan issues?
Definition
scanner_typeScanner.cfg
Term
How do you retrieve Agent logs from the Enforce Server?
Definition
Use the pull logs agent task
Term
How are logs copied to the Enforce Server?
Definition
Using the Log Collection tool
Term
When adding an application for Application Monitoring, which field provides the option to verify the information that has been entered?
Definition
Publisher name
Term
When an administrator manually indexes an Exact Data Match profile through the GUI, which log file should be checked for error messages?
Definition
localhost.%date%.log
Term
Which response rule condition allows a policy manager to configure an Automated Response rule to execute while a user is traveling?
Definition
Endpoint Location
Term
What can cause an increase in DLP agent footprint?
Definition
Additional Policies
Term
Which incidents will appear when the Network Prevent Action is set to Modified?
Definition
Incidents in which an SMTP/HTTP incident was changed
Term
If Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict?
Definition
Endpoint Discover pauses any scans if resources are needed.
Term
Will the agent status remain green an the Agents Events page while the machine is shut down?
Definition
Yes
Term
What can be used to identify a prioritized exposure score for file shares?
Definition
Folder Risk Report
Term
What should be used to exclude all messages sent to a specific domain across all policies?
Definition
The L7 filter
Term
Which file needs to be edited to increase the log level for the Vontu Monitor service?
Definition
\\Vontu\Protect\config\VontuMonitor.conf
Term
What is the benefit of using Flex Response for Network Discover?
Definition
Customizable incident remediation actions can be manually executed
Term
What is the function of the Remote Indexer?
Definition
To create EDM profiles on a remote server
Term
Which setting allows a user to stop the file reader process from the user interface?
Definition
Advanced Process Control
Term
Which incident severity level should be set as the default?
Definition
The lowest level the policy writer wants to assign
Term
Which product enables an incident responder to identify who has access to a confidential files on a public share?
Definition
Network Discover
Term
Which two requirements must be met in order to successfully use Network Monitor on a Windows based Detection Server?
Definition
WinPCAP must be installed on the system and there must be two network interfaces must be available
Term
Which report will allow you view the risk for users?
Definition
User Risk Summary
Term
What should be used to detect existing source code information for a customer?
Definition
Index Document Matching
Term
Which two database versions are supported by Symantec DLP 11?
Definition
Oracle 10g and Oracle 11g
Term
Which Vontu service is responsible for starting and controlling the user interface?
Definition
VontuManager
Term
Where can a Data Loss Prevention administrator configure the throttling option for a DLP agent?
Definition
Agent Configuration Section
Term
Which product must run on a physical server?
Definition
Network Monitor
Term
How does a Data Loss Prevention administrator verify the health of a Network Monitor server?
Definition
By checking Incident Queue and Message Wait Time on the System Overview page
Term
What is the default result when importing a policy template?
Definition
The template will be listed under Imported Templates
Term
Which command line utility will generate custom authentication keys to improve the security of the data that is transmitted between the Enforce server and detection servers?
Definition
ssl key tool
Term
Which two options can an incident responder select when deleting incidents?
Definition
Delete the incident completely or delete the original message and retain the incident
Term
In which two places in the user interface are Smart Response rules invoked?
Definition
incident list reports, Incident Snapshot reports
Term
Which three file types should be excluded from initial scans according to Symantec best practices?
Definition
.mp3 .dat and .dll
Term
Which two components can perform a scan of a workstation?
Definition
DLP Agents and a Discover Server
Term
How can an administrator validate that once a policy is updated and saved it has been enabled on a specific detection server?
Definition
Check to see whether the policy was loaded under System > Servers > Events
Term
If a Discover Scanner is unable to communicate back to the Discover Server, where will the files be stored?
Definition
Scanner's outgoing folder
Term
Which two remediation actions are available for Network Protect?
Definition
Copy and Quarantine
Term
Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?
Definition
Inventory Mode Scanning
Term
A Data Loss Prevention administrator notices that several errors occurred during a Network Discover scan. Which report can the administrator use to determine exactly which errors occured and when?
Definition
Full Activity report for that particular scan
Term
What must a policy manager do when working with Exact Data Matching indexes if the source data schema changes?
Definition
Create a new data profile
Term
Which two policy management actions can result in a reduced number of incidents for a given traffic flow?
Definition
Adding data owner exceptions, increasing condition match counts
Term
What will allow keyword pairs to be evaluated independently?
Definition
Keyword Proximity Matching
Term
What must be configured on a user's role in order for incident history to be included in a report?
Definition
Incident history
Term
If DLP is configured to use Active Directory Authentication, how should the user log into the interface in the sysadmin role?
Definition
sysadmin\username
Term
Which product includes support for the Citrix Xenapp virtualization platform?
Definition
Endpoint Prevent
Term
Where should the Network Discover server be placed in a corporate network architecture?
Definition
Inside the corporate network
Term
Which DLP Agent task is unique to the Symantec Management Platform and is unavailable through the Enforce console?
Definition
Set log level
Term
If you want to have a report of all incidents generated by a particular region, summarized by department,what must be populated?
Definition
Custom Attributes
Term
What will allow someone to see how a company is complying with policies over time?
Definition
Policy trend report, summarized by policy, then by quarter
Term
Which Network incident report shows where employees are most often sending e-mails in violation of policies?
Definition
Top Recipient Domains
Term
When reviewing an SMTP incident snapshot, which reporting feature would a Data Loss Prevention administrator use to quickly find recent incidents with the same subject and sender?
Definition
Incident Correlations
Term
When deploying the Symantec DLP 12 solution to multiple servers, which mix of Operating Systems is supported?
Definition
Any mix of supported Linux and Windows Operating Systems is allowed.  32 bit servers are no longer supported as of the 12.0 release
Term
How is a policy applied to Network Discover scans?
Definition
by assigning policy groups to the scan target
Term
On which protocols does Symantec DLP 11 use port-based protocol recognition?
Definition
user-defined TCP protocols
Term
Which Oracle utility can be run from the Enforce server to test connectivity between Enforce and the Oracle database?
Definition
sqlplus
Term
Which software components need to be deployed in order to use native Sharepoint scanning available in Symantec DLP 11?
Definition
Network Discover DLP Solution installed on a Share Point WFE (Web Front End) server
Term
Which application or destination is selected for endpoint monitoring by default?
Definition
Removable Storage
Term
What should a Data Loss Prevention administrator do when the license file expires?
Definition
Reference a new file on the System Settings page
Term
Which command line diagnostic tool will give the Data Loss Prevention administrator the OS versions for all detection servers?
Definition
Environment Check Utility
Term
Which feature enables data extraction with incident data from the Enforce Platform based on report ID?
Definition
Reporting API
Term
Which Network Monitor Operating System can handle a minimum of 500Mbps of outbound network traffic with native packet capture?
Definition
Red Hat Server (32-bit)
Term
Which server encrypts the message when using a Modify SMTP Message response rule?
Definition
Encryption Gateway
Term
To which file system folder does PAcket Capture write reconstructed SMTP messages?
Definition
drop_pcap
Term
Which tool is provided by default to edit a database on an endpoint?
Definition
vontu_sqlite3.exe
Term
What is the purpose of the cg.ead endpoint database?
Definition
To tune and change debugging levels
Term
Why would all of the processes be missing from the Server Detail display?
Definition
The Advanced Process Control setting on the System Settings page has been deselected
Term
Which Symantec Data Loss Prevention components can be deployed in a hosted service provider?
Definition
Network Prevent for web and e-mail
Term
Which two detection condition types match on all Envelope, Subject, Body, and Attachments components?
Definition
Keyword and Data Identifier
Term
In addition to creating an Automated Response Rule, what action must a policy manager take for the rule to execute?
Definition
Add the response rule to the appropriate policy
Term
Which Detection Server requires two physical network interface cards?
Definition
Network Monitor
Term
When configuring endpoint agents, what does the File Recovery Area location setting determine?
Definition
The temporary backup location of blocked files
Term
According to Symantec's four phases of risk reduction model, what should occur during the baselining phase?
Definition
Monitor incidents and tune the policy to reduce false positives
Term
What does Network Monitor use to identify SMTP network traffic going to a non standard port?
Definition
Protocol Signature
Term
A client needs to create a custom role that limits a user to incidents generated by a single policy group. Which role configuration tab is used to configure this function?
Definition
Incident Access
Term
Which feature moves confidential data to a secure location when scanning endpoint targets?
Definition
Endpoint Quarantine
Term
Which two functions does Data Owner Exception provide?
Definition
Allows data owners to send and receive their own data, prevents confidential from being sent to the wrong recipient
Term
When manually installing an endpoint agent, how can you hide the agent from registering itself in the Windows Control Panel?
Definition
add ARPSYSTEMCOMPONENT="1" to the installer batch file
Term
Which Symantec Data Loss Prevention service should be started first on the Enforce Server?
Definition
Vontu Notifier
Term
What is the correct utility for generating new certificates used for securing communication between the Enforce and detection servers?
Definition
sslkeytool.exe
Term
Which file on the endpoint machine stores messages that are temporarily cached when using two-tier policies such as IDM and EDM?
Definition
ttds.ead
Term
A policy implemented to block sensitive information from being posted to Facebook generates incidents but allows the content to be posted. What should be done to resolve this issue?
Definition
Turn off trial mode
Term
An Endpoint Prevent Notify response rule is defined in Korean, English, and Chinese (in that order). Which pop-up language will a user in the Japanese Windows locale user see?
Definition
Korean
Term
Which four currently supported ICAP proxies can Web Prevent work with to inspect and block content?
Definition
Bluecoat, McAfee, Cisco Ironport/Scan Safe, and Websense
Term
Which functionality must a Mail Transfer Agent (MTA) have in order to integrate with an E-mail Prevent Server?
Definition
The MTA is strict ESMTP compliant
Term
An approved endpoint device has been added as an exception to a policy that blocks the transfer of sensitive data. Data transfers to this approved device is still being blocked, how may this be resolved?
Definition
Verify that the proper device ID or class has been entered
Term
Which True Match detection method can be evaluated at the agent level?
Definition
Described Content Matching (DCM)
Term
An Endpoint Prevent customer has a department with a high turn over rate. How should a Data Loss Prevention administrator write a policy that applies only to that department?
Definition
Create a user group for the department and associate it to the policy
Supporting users have an ad free experience!