Term
| How can Discover scans be optimized in the future, once a full scan has been performed? |
|
Definition
| Use an incremental scan to only include previously unscanned or recently changed items |
|
|
Term
| Which two products in the Symantec DLP Suite are required to quarantine confidential files inappropriately on a NAS share? |
|
Definition
| Network Discover and Network Protect |
|
|
Term
| What two types of products are leveraged for Network Prevent Integration? |
|
Definition
| Mail Transfer Agent and Web Proxy Server |
|
|
Term
| How can you exclude specific text from an Indexed Document Matching (IDM) profile? |
|
Definition
| Create a whitelisted.txt file before creating the IDM profile |
|
|
Term
| An organization needs to determine if anyone other than the CEO is e-mailing PDF documents that contain the phrase "Revenue Operating Report". How many rules and exceptions must be created to write this policy with the fewest possible false positives? |
|
Definition
| One rule with two conditions and one user exception |
|
|
Term
| How can you determine if a certain percentage or more of a sensitive document is leaving an organization? |
|
Definition
| Using minimum document exposure |
|
|
Term
| How can you make a policy detect a group of users based on Active Directory group membership? |
|
Definition
| Using "Sender/receiver matches Group based on Directory Server Group". |
|
|
Term
| A company is using an EDM profile that is updated weekly, but customers are added daily. What type of rule will protect the new customers until the profile is updated? |
|
Definition
| A separate rule that uses Data Identifiers |
|
|
Term
| Where does a Data Loss Prevention Administrator recycle the File Reader process on a detection server? |
|
Definition
|
|
Term
| Where can a Data Loss Prevention Administrator view the number of messages per protocol that have been monitored for a given time period? |
|
Definition
|
|
Term
| An administrator has received the system event: "Table space is almost full." How should the administrator resolve the issue? |
|
Definition
| Create additional table space for the Oracle database |
|
|
Term
| Which feature allows the sending of reports, based on groups of incidents associated to individuals, on an automated schedule? |
|
Definition
|
|
Term
| According to Symantec's risk reduction model, which type of detection should be used during the Baseline phase? |
|
Definition
|
|
Term
| According to Symantec's risk reduction model, what is noticed during the notification phase of risk reduction? |
|
Definition
| A significant decrease in the number of incidents |
|
|
Term
| According to Symantec's risk reduction model, what are the four phases, in order? |
|
Definition
| Baseline, Remediation, Notification, Prevention/Protection |
|
|
Term
| When and how is the license for Symantec DLP 11 applied during installation? |
|
Definition
| By uploading the license file when prompted by the installer |
|
|
Term
| How should reports be configured in the system for secure distribution ? |
|
Definition
|
|
Term
| What is the maximum number of port lets can be used in a dashboard? |
|
Definition
|
|
Term
| If the Network Monitor is discarding an increasing number of packets throughout the day, what change should be made to reduce the number of discarded packets? |
|
Definition
| Uncheck unnecessary protocols from the Monitor configuration page |
|
|
Term
| Which feature will allow an incident responder to begin to determine where an attachment has created other violations? |
|
Definition
|
|
Term
| Where can the list of Keyword validators included with a Data Identifier be found? |
|
Definition
| User Interface - Edit Policy > Edit Rule > More Info |
|
|
Term
| When doing a DAR scan, where can you find details such as the total run time of the scan and the number of errors encountered? |
|
Definition
|
|
Term
| What are the two primary benefits of the data owner remediation process? |
|
Definition
| Batch notification for incident remediation, and automated scheduled notification for the owner |
|
|
Term
| Under incident actions, if the lookup attributes option is missing, what section in the Plugins.properties file is misconfigured? |
|
Definition
| Plugin Execution chain is undefined. |
|
|
Term
| In which two ways can the listening port for a detection server be modified? |
|
Definition
| In the Enforce UI under System > Overview, and by editing the Communication.properties file on the detection server |
|
|
Term
What two activities are included in the Remediation phase of Symantec's risk reduction model? |
|
Definition
| Business Unit Interviews and fixing broken business processes |
|
|
Term
| What action must a Data Loss Prevention Analyst take after modifying protocol filters? |
|
Definition
| recycle Vontu services on any Network Monitor using the affected protocols |
|
|
Term
| When will a file be duplicated during an Endpoint Discover scan? |
|
Definition
| When a file is quarantined |
|
|
Term
| When implementing Network Monitor in an Enterprise environment, which should be implemented first, outbound or inbound traffic? |
|
Definition
|
|
Term
| Which Data Loss Prevention feature can prevent an unauthorized tool from accessing confidential data? |
|
Definition
|
|
Term
| Define a Symantec DLP three tier installation. |
|
Definition
| The Oracle Database, Enforce server, and a detection server all installed on separate machines. |
|
|
Term
| Which detection server has the ability to block FTP upload requests? |
|
Definition
|
|
Term
| For greater accuracy, what is the minimum recommended number of columns in a data source for use in an EDM profile? |
|
Definition
|
|
Term
| Which Symantec DLP product can replace a confidential document with a marker file explaining why the document was removed? |
|
Definition
|
|
Term
| Which detection method is used for fingerprinting and protecting unstructured data, such as merger and acquisition documents? |
|
Definition
|
|
Term
| What two methods are available to notify users when SMTP e-mails are blocked by SMTP Prevent? |
|
Definition
| MTA generated delivery status notification and Symantec Response Rule generated notification |
|
|
Term
| When installing an Endpoint Server, at what point does it register with the Enforce Server? |
|
Definition
| After adding the server from within the Enforce interface |
|
|
Term
| What are the five steps, in order, of the Symantec Data Loss Prevention policy lifecycle? |
|
Definition
| identify threat, build policy, test policy, tune policy, deploy policy |
|
|
Term
| When should Network Discover Scanners be used? |
|
Definition
| To scan data repositories that require special access methods to be readable |
|
|
Term
| Name two ways of collecting log information from Enforce Servers. |
|
Definition
| Use the log collection and configuration tool, and navigate manually to the log directory of the Enforce Server installation |
|
|
Term
| Which two conditions can be specified when creating an incident access condition in a role? |
|
Definition
| A custom attribute, and a policy group |
|
|
Term
| If a scanner fails to return results upon completion of the scan process. Which file should be removed to eliminate previous scan issues? |
|
Definition
|
|
Term
| How do you retrieve Agent logs from the Enforce Server? |
|
Definition
| Use the pull logs agent task |
|
|
Term
| How are logs copied to the Enforce Server? |
|
Definition
| Using the Log Collection tool |
|
|
Term
| When adding an application for Application Monitoring, which field provides the option to verify the information that has been entered? |
|
Definition
|
|
Term
| When an administrator manually indexes an Exact Data Match profile through the GUI, which log file should be checked for error messages? |
|
Definition
|
|
Term
| Which response rule condition allows a policy manager to configure an Automated Response rule to execute while a user is traveling? |
|
Definition
|
|
Term
| What can cause an increase in DLP agent footprint? |
|
Definition
|
|
Term
| Which incidents will appear when the Network Prevent Action is set to Modified? |
|
Definition
| Incidents in which an SMTP/HTTP incident was changed |
|
|
Term
| If Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict? |
|
Definition
| Endpoint Discover pauses any scans if resources are needed. |
|
|
Term
| Will the agent status remain green an the Agents Events page while the machine is shut down? |
|
Definition
|
|
Term
| What can be used to identify a prioritized exposure score for file shares? |
|
Definition
|
|
Term
| What should be used to exclude all messages sent to a specific domain across all policies? |
|
Definition
|
|
Term
| Which file needs to be edited to increase the log level for the Vontu Monitor service? |
|
Definition
| \\Vontu\Protect\config\VontuMonitor.conf |
|
|
Term
| What is the benefit of using Flex Response for Network Discover? |
|
Definition
| Customizable incident remediation actions can be manually executed |
|
|
Term
| What is the function of the Remote Indexer? |
|
Definition
| To create EDM profiles on a remote server |
|
|
Term
| Which setting allows a user to stop the file reader process from the user interface? |
|
Definition
|
|
Term
| Which incident severity level should be set as the default? |
|
Definition
| The lowest level the policy writer wants to assign |
|
|
Term
| Which product enables an incident responder to identify who has access to a confidential files on a public share? |
|
Definition
|
|
Term
| Which two requirements must be met in order to successfully use Network Monitor on a Windows based Detection Server? |
|
Definition
| WinPCAP must be installed on the system and there must be two network interfaces must be available |
|
|
Term
| Which report will allow you view the risk for users? |
|
Definition
|
|
Term
| What should be used to detect existing source code information for a customer? |
|
Definition
|
|
Term
| Which two database versions are supported by Symantec DLP 11? |
|
Definition
| Oracle 10g and Oracle 11g |
|
|
Term
| Which Vontu service is responsible for starting and controlling the user interface? |
|
Definition
|
|
Term
| Where can a Data Loss Prevention administrator configure the throttling option for a DLP agent? |
|
Definition
| Agent Configuration Section |
|
|
Term
| Which product must run on a physical server? |
|
Definition
|
|
Term
| How does a Data Loss Prevention administrator verify the health of a Network Monitor server? |
|
Definition
| By checking Incident Queue and Message Wait Time on the System Overview page |
|
|
Term
| What is the default result when importing a policy template? |
|
Definition
| The template will be listed under Imported Templates |
|
|
Term
| Which command line utility will generate custom authentication keys to improve the security of the data that is transmitted between the Enforce server and detection servers? |
|
Definition
|
|
Term
| Which two options can an incident responder select when deleting incidents? |
|
Definition
| Delete the incident completely or delete the original message and retain the incident |
|
|
Term
| In which two places in the user interface are Smart Response rules invoked? |
|
Definition
| incident list reports, Incident Snapshot reports |
|
|
Term
| Which three file types should be excluded from initial scans according to Symantec best practices? |
|
Definition
|
|
Term
| Which two components can perform a scan of a workstation? |
|
Definition
| DLP Agents and a Discover Server |
|
|
Term
| How can an administrator validate that once a policy is updated and saved it has been enabled on a specific detection server? |
|
Definition
| Check to see whether the policy was loaded under System > Servers > Events |
|
|
Term
| If a Discover Scanner is unable to communicate back to the Discover Server, where will the files be stored? |
|
Definition
| Scanner's outgoing folder |
|
|
Term
| Which two remediation actions are available for Network Protect? |
|
Definition
|
|
Term
| Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target? |
|
Definition
|
|
Term
| A Data Loss Prevention administrator notices that several errors occurred during a Network Discover scan. Which report can the administrator use to determine exactly which errors occured and when? |
|
Definition
| Full Activity report for that particular scan |
|
|
Term
| What must a policy manager do when working with Exact Data Matching indexes if the source data schema changes? |
|
Definition
| Create a new data profile |
|
|
Term
| Which two policy management actions can result in a reduced number of incidents for a given traffic flow? |
|
Definition
| Adding data owner exceptions, increasing condition match counts |
|
|
Term
| What will allow keyword pairs to be evaluated independently? |
|
Definition
| Keyword Proximity Matching |
|
|
Term
| What must be configured on a user's role in order for incident history to be included in a report? |
|
Definition
|
|
Term
| If DLP is configured to use Active Directory Authentication, how should the user log into the interface in the sysadmin role? |
|
Definition
|
|
Term
| Which product includes support for the Citrix Xenapp virtualization platform? |
|
Definition
|
|
Term
| Where should the Network Discover server be placed in a corporate network architecture? |
|
Definition
| Inside the corporate network |
|
|
Term
| Which DLP Agent task is unique to the Symantec Management Platform and is unavailable through the Enforce console? |
|
Definition
|
|
Term
| If you want to have a report of all incidents generated by a particular region, summarized by department,what must be populated? |
|
Definition
|
|
Term
| What will allow someone to see how a company is complying with policies over time? |
|
Definition
| Policy trend report, summarized by policy, then by quarter |
|
|
Term
| Which Network incident report shows where employees are most often sending e-mails in violation of policies? |
|
Definition
|
|
Term
| When reviewing an SMTP incident snapshot, which reporting feature would a Data Loss Prevention administrator use to quickly find recent incidents with the same subject and sender? |
|
Definition
|
|
Term
| When deploying the Symantec DLP 12 solution to multiple servers, which mix of Operating Systems is supported? |
|
Definition
| Any mix of supported Linux and Windows Operating Systems is allowed. 32 bit servers are no longer supported as of the 12.0 release |
|
|
Term
| How is a policy applied to Network Discover scans? |
|
Definition
| by assigning policy groups to the scan target |
|
|
Term
| On which protocols does Symantec DLP 11 use port-based protocol recognition? |
|
Definition
| user-defined TCP protocols |
|
|
Term
| Which Oracle utility can be run from the Enforce server to test connectivity between Enforce and the Oracle database? |
|
Definition
|
|
Term
| Which software components need to be deployed in order to use native Sharepoint scanning available in Symantec DLP 11? |
|
Definition
| Network Discover DLP Solution installed on a Share Point WFE (Web Front End) server |
|
|
Term
| Which application or destination is selected for endpoint monitoring by default? |
|
Definition
|
|
Term
| What should a Data Loss Prevention administrator do when the license file expires? |
|
Definition
| Reference a new file on the System Settings page |
|
|
Term
| Which command line diagnostic tool will give the Data Loss Prevention administrator the OS versions for all detection servers? |
|
Definition
| Environment Check Utility |
|
|
Term
| Which feature enables data extraction with incident data from the Enforce Platform based on report ID? |
|
Definition
|
|
Term
| Which Network Monitor Operating System can handle a minimum of 500Mbps of outbound network traffic with native packet capture? |
|
Definition
|
|
Term
| Which server encrypts the message when using a Modify SMTP Message response rule? |
|
Definition
|
|
Term
| To which file system folder does PAcket Capture write reconstructed SMTP messages? |
|
Definition
|
|
Term
| Which tool is provided by default to edit a database on an endpoint? |
|
Definition
|
|
Term
| What is the purpose of the cg.ead endpoint database? |
|
Definition
| To tune and change debugging levels |
|
|
Term
| Why would all of the processes be missing from the Server Detail display? |
|
Definition
| The Advanced Process Control setting on the System Settings page has been deselected |
|
|
Term
| Which Symantec Data Loss Prevention components can be deployed in a hosted service provider? |
|
Definition
| Network Prevent for web and e-mail |
|
|
Term
| Which two detection condition types match on all Envelope, Subject, Body, and Attachments components? |
|
Definition
| Keyword and Data Identifier |
|
|
Term
| In addition to creating an Automated Response Rule, what action must a policy manager take for the rule to execute? |
|
Definition
| Add the response rule to the appropriate policy |
|
|
Term
| Which Detection Server requires two physical network interface cards? |
|
Definition
|
|
Term
| When configuring endpoint agents, what does the File Recovery Area location setting determine? |
|
Definition
| The temporary backup location of blocked files |
|
|
Term
| According to Symantec's four phases of risk reduction model, what should occur during the baselining phase? |
|
Definition
| Monitor incidents and tune the policy to reduce false positives |
|
|
Term
| What does Network Monitor use to identify SMTP network traffic going to a non standard port? |
|
Definition
|
|
Term
| A client needs to create a custom role that limits a user to incidents generated by a single policy group. Which role configuration tab is used to configure this function? |
|
Definition
|
|
Term
| Which feature moves confidential data to a secure location when scanning endpoint targets? |
|
Definition
|
|
Term
| Which two functions does Data Owner Exception provide? |
|
Definition
| Allows data owners to send and receive their own data, prevents confidential from being sent to the wrong recipient |
|
|
Term
| When manually installing an endpoint agent, how can you hide the agent from registering itself in the Windows Control Panel? |
|
Definition
| add ARPSYSTEMCOMPONENT="1" to the installer batch file |
|
|
Term
| Which Symantec Data Loss Prevention service should be started first on the Enforce Server? |
|
Definition
|
|
Term
| What is the correct utility for generating new certificates used for securing communication between the Enforce and detection servers? |
|
Definition
|
|
Term
| Which file on the endpoint machine stores messages that are temporarily cached when using two-tier policies such as IDM and EDM? |
|
Definition
|
|
Term
| A policy implemented to block sensitive information from being posted to Facebook generates incidents but allows the content to be posted. What should be done to resolve this issue? |
|
Definition
|
|
Term
| An Endpoint Prevent Notify response rule is defined in Korean, English, and Chinese (in that order). Which pop-up language will a user in the Japanese Windows locale user see? |
|
Definition
|
|
Term
| Which four currently supported ICAP proxies can Web Prevent work with to inspect and block content? |
|
Definition
| Bluecoat, McAfee, Cisco Ironport/Scan Safe, and Websense |
|
|
Term
| Which functionality must a Mail Transfer Agent (MTA) have in order to integrate with an E-mail Prevent Server? |
|
Definition
| The MTA is strict ESMTP compliant |
|
|
Term
| An approved endpoint device has been added as an exception to a policy that blocks the transfer of sensitive data. Data transfers to this approved device is still being blocked, how may this be resolved? |
|
Definition
| Verify that the proper device ID or class has been entered |
|
|
Term
| Which True Match detection method can be evaluated at the agent level? |
|
Definition
| Described Content Matching (DCM) |
|
|
Term
| An Endpoint Prevent customer has a department with a high turn over rate. How should a Data Loss Prevention administrator write a policy that applies only to that department? |
|
Definition
| Create a user group for the department and associate it to the policy |
|
|