Download Administration of Symantec Data Loss Prevention 15.250-438.ActualTests.2019-04-26.34q.vcex

Vendor: Symantec
Exam Code: 250-438
Exam Name: Administration of Symantec Data Loss Prevention 15
Date: Apr 26, 2019
File Size: 319 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control?
  1. Add “custom_app.exe” to the “Application Whitelist” on all Endpoint servers.
  2. Add “custom_app.exe” Application Monitoring Configuration and de-select all its channel options.
  3. Add “custom_app_.exe” as a filename exception to the Endpoint Prevent policy.
  4. Add “custom_app.exe” to the “Program Exclusion List” in the agent configuration settings.
Correct answer: A
Explanation:
Reference: https://docs.mcafee.com/bundle/data-loss-prevention-11.0.400-product-guide-epolicy-orchestrator/page/GUID-0F81A895-0A46-4FF8-A869-0365D6620185.html
Reference: https://docs.mcafee.com/bundle/data-loss-prevention-11.0.400-product-guide-epolicy-orchestrator/page/GUID-0F81A895-0A46-4FF8-A869-0365D6620185.html
Question 2
A software company wants to protect its source code, including new source code created between scheduled indexing runs. 
Which detection method should the company use to meet this requirement?
  1. Exact Data Matching (EDM)
  2. Described Content Matching (DCM)
  3. Vector Machine Learning (VML)
  4. Indexed Document Matching (IDM)
Correct answer: D
Explanation:
Reference: https://help.symantec.com/cs/DLP15.0/DLP/v100774847_v120691346/Scheduling-remote-indexing?locale=EN_US
Reference: https://help.symantec.com/cs/DLP15.0/DLP/v100774847_v120691346/Scheduling-remote-indexing?locale=EN_US
Question 3
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
  1. To specify Wi-Fi SSID names
  2. To specify an IP address or range
  3. To specify the endpoint server
  4. To specify domain names
  5. To specify network card status (ON/OFF)
Correct answer: BD
Explanation:
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v18349332_v125428396/Setting-the-endpoint-location?locale=EN_US
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v18349332_v125428396/Setting-the-endpoint-location?locale=EN_US
Question 4
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
  1. Network Protect Storage Discover
  2. Network Discover/Cloud Storage Discover
  3. Network Prevent/Cloud Detection Service
  4. Network Protect/Cloud Detection Service
Correct answer: B
Explanation:
Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-Network-Discover-Cloud-Storage-Discover-Server-configuration?locale=EN_US
Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-Network-Discover-Cloud-Storage-Discover-Server-configuration?locale=EN_US
Question 5
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed? 
  1. Network Discover
  2. Cloud Service for Email
  3. Endpoint Prevent
  4. Network Protect
Correct answer: D
Explanation:
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network-Protect-for-file-shares?locale=EN_US
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v15600645_v125428396/Configuring-Network-Protect-for-file-shares?locale=EN_US
Question 6
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
  1. Exchange
  2. Jiveon
  3. File store
  4. SharePoint
  5. Confluence
Correct answer: CD
Explanation:
Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric-encryption-en.pdf
Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric-encryption-en.pdf
Question 7
Which detection method depends on “training sets”?
  1. Form Recognition
  2. Vector Machine Learning (VML)
  3. Index Document Matching (IDM)
  4. Exact Data Matching (IDM)
Correct answer: B
Explanation:
Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
Question 8
What is the default fallback option for the Endpoint Prevent Encrypt response rule?
  1. Block
  2. User Cancel
  3. Encrypt
  4. Notify
Correct answer: D
Question 9
Which two components can perform a file system scan of a workstation? (Choose two.)
  1. Endpoint Server
  2. DLP Agent
  3. Network Prevent for Web Server
  4. Discover Server
  5. Enforce Server
Correct answer: BD
Question 10
Which channel does Endpoint Prevent protect using Device Control? 
  1. Bluetooth
  2. USB storage
  3. CD/DVD
  4. Network card
Correct answer: B
Explanation:
Reference: https://support.symantec.com/en_US/article.HOWTO80865.html#v36651044
Reference: https://support.symantec.com/en_US/article.HOWTO80865.html#v36651044
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!