Download Administration of Symantec Data Loss Prevention 15.250-438.Pass4Sure.2019-05-01.40q.vcex

Vendor: Symantec
Exam Code: 250-438
Exam Name: Administration of Symantec Data Loss Prevention 15
Date: May 01, 2019
File Size: 173 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “cope to USB device” operation?
  1. Add a “Limit Incident Data Retention” response rule with “retain Original Message” option selected.
  2. Modify the agent config.db to include the file
  3. Modify the “Endpoint_Retain_Files.int” setting in the Endpoint server configuration
  4. Modify the agent configuration and select the option “retain Original Files”
Correct answer: A
Question 2
Under the “System Overview” in the Enforce management console, the status of a Network Monitor detection server is shown as “Running Selected.” The Network Monitor server’s event logs indicate that the packet capture and filereader processes are crashing. 
What is a possible cause for the Network Monitor server being in this state?
  1. There is insufficient disk space on the Network Monitor server.
  2. The Network Monitor server’s certificate is corrupt or missing.
  3. The Network Monitor server’s license file has expired.
  4. The Enforce and Network Monitor servers are running different versions of DLP.
Correct answer: D
Question 3
A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the “User Reporting” privilege enabled, but User Risk reporting is still not working. 
What is the probable reason that the User Risk Summary report is blank?
  1. Only DLP administrators are permitted to access and view data for high risk users.
  2. The Enforce server has insufficient permissions for importing user attributes.
  3. User attribute data must be configured separately from incident data attributed.
  4. User attributes have been incorrectly mapped to Active Directory accounts.
Correct answer: D
Question 4
How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control?
  1. Add “custom_app.exe” to the “Application Whitelist” on all Endpoint servers.
  2. Add “custom_app.exe” Application Monitoring Configuration and de-select all its channel options.
  3. Add “custom_app_.exe” as a filename exception to the Endpoint Prevent policy.
  4. Add “custom_app.exe” to the “Program Exclusion List” in the agent configuration settings.
Correct answer: A
Explanation:
Reference: https://docs.mcafee.com/bundle/data-loss-prevention-11.0.400-product-guide-epolicy-orchestrator/page/GUID-0F81A895-0A46-4FF8-A869-0365D6620185.html
Reference: https://docs.mcafee.com/bundle/data-loss-prevention-11.0.400-product-guide-epolicy-orchestrator/page/GUID-0F81A895-0A46-4FF8-A869-0365D6620185.html
Question 5
A software company wants to protect its source code, including new source code created between scheduled indexing runs. 
Which detection method should the company use to meet this requirement?
  1. Exact Data Matching (EDM)
  2. Described Content Matching (DCM)
  3. Vector Machine Learning (VML)
  4. Indexed Document Matching (IDM)
Correct answer: D
Explanation:
Reference: https://help.symantec.com/cs/DLP15.0/DLP/v100774847_v120691346/Scheduling-remote-indexing?locale=EN_US
Reference: https://help.symantec.com/cs/DLP15.0/DLP/v100774847_v120691346/Scheduling-remote-indexing?locale=EN_US
Question 6
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
  1. To specify Wi-Fi SSID names
  2. To specify an IP address or range
  3. To specify the endpoint server
  4. To specify domain names
  5. To specify network card status (ON/OFF)
Correct answer: BD
Explanation:
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v18349332_v125428396/Setting-the-endpoint-location?locale=EN_US
Reference: https://help.symantec.com/cs/dlp15.1/DLP/v18349332_v125428396/Setting-the-endpoint-location?locale=EN_US
Question 7
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
  1. Exchange
  2. Jiveon
  3. File store
  4. SharePoint
  5. Confluence
Correct answer: CD
Explanation:
Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric-encryption-en.pdf
Reference: https://www.symantec.com/content/dam/symantec/docs/data-sheets/information-centric-encryption-en.pdf
Question 8
Which detection method depends on “training sets”?
  1. Form Recognition
  2. Vector Machine Learning (VML)
  3. Index Document Matching (IDM)
  4. Exact Data Matching (IDM)
Correct answer: B
Explanation:
Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
Reference: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-dlp_machine_learning.WP_en-us.pdf
Question 9
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
  1. Use the built-in Symantec DLP certificate for the Enforce Server, and use the “sslkeytool” utility to create certificates for the detection servers.
  2. Use the built-in Symantec DLP certificate for both the Enforce server and the hosted detection servers.
  3. Set up a Virtual Private Network (VPN) for the Enforce server and the hosted detection servers.
  4. Use the “sslkeytool” utility to create certificates for the Enforce server and the hosted detection servers.
Correct answer: A
Explanation:
Reference: https://www.symantec.com/connect/articles/sslkeytool-utility-and-server-certificates
Reference: https://www.symantec.com/connect/articles/sslkeytool-utility-and-server-certificates
Question 10
Which two detection technology options run on the DLP agent? (Choose two.)
  1. Optical Character Recognition (OCR)
  2. Described Content Matching (DCM)
  3. Directory Group Matching (DGM)
  4. Form Recognition
  5. Indexed Document Matching (IDM)
Correct answer: DE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!