250-510 Question Answers

Page 1

Questions And Answers PDF

Symantec 250-510 Administration of SymantecTM Data Loss Prevention 10.5 BETA

Version: DEMO

http://www.TestWarrior.com/250-510-practice-exam.html

FOR 250-510 Candidates: We offer Two Products:  1st - We have Practice Tests Software with Actual Exam Questions  2nd - Questions and Answers in PDF Format. Try a Free DEMO of these Exam Products via below Link:

http://www.TestWarrior.com/250-510-practice-exam.html

TestWarrior.com

1


Questions And Answers PDF

Question 1. Which two products can be run on virtual servers? (Select two.) A. Endpoint Discover B. Endpoint Prevent C. Network Monitor D. Enforce E. Network Prevent

Aoswern DE Question 2. How is the incident count for a new system managed in order to avoid overwhelming the incident response team? A. Match count thresholds are set. B. More than one policy is enabled. C. Many incident responders are allowed access to the system. D. Incidents are auto-fltered to hide false positves.

Aoswern A Question 3. Which response rule acton will be ignored when using an Exact Data Matching (EDM) policy? A. Endpoint: Notfy B. Network: Block HTTP/HTTPS C. Protect: Quarantne File D. Network: Remove HTTP/HTTPS Content

Aoswern A Question 4. Which two recommendatons should an organizaton follow when deploying Endpoint Prevent? (Select two.) A. test the agent on a variety of end-user images B. initally enable monitoring of the local fle system C. enable monitoring of many destnatons and protocols simultaneously D. confguree teste and tune flters E. confgure blocking as soon as the agents are deployed

Aoswern AD

TestWarrior.com

2


Questions And Answers PDF

Question 5. Which plug-in can connect to Microsof Actve Directory (AD)? A. CSV Lookup B. Live LDAP Lookup C. Actve Directory Integraton Lookup D. Directory Server Lookup

Aoswern B Question 6. Which informaton is recommended to be included in an Exact Data Matching (EDM) data source? A. date felds B. numeric felds with fewer than fve digits C. column names in the frst row D. countrye statee or province names

Aoswern C Question 7. What are two valid reasons for adding notes to incidents? (Select two.) A. to provide incident detail to policy violators B. to allow the next responder to more quickly prioritze incidents for review C. to allow the next responder to more quickly understand the incident history D. to provide detail when closing an incident E. to provide incident detail for report fltering

Aoswern CD Question 8. What must be running on a Linux Enforce server to enable the Symantec Data Loss Preventon user interface? A. selinux B. iptables C. xwindows D. ssh

Aoswern B Question 9.

TestWarrior.com

3


Questions And Answers PDF

Which fle on the endpoint machine stores messages that are temporarily cached when using twoter policies such as IDM or EDM? A. is.ead B. tds.ead C. ks.ead D. cg.ead

Aoswern B Question 10. Which detecton server setng enables detectng text within markup language tags? A. ContentExtracton.MarkupAsText B. ContentExtracton.EnableMetaData C. Detecton.EncodingguessingEnabled D. Lexer.Validate

Aoswern A Question 11. What are two benefts that data loss preventon solutons provide? (Select two.) A. provides accurate measurement of encrypted outgoing email B. gives insight into capacity planning for sensitve data C. identfes who has access to sensitve data D. indicates where sensitve data is being sent E. measures encrypton strength for sensitve data

Aoswern CD Question 12. What are two examples of confdental data? (Select two.) A. manufacturing plant locatons B. published press releases C. stock performance history D. CAD drawings E. employee health informaton

Aoswern DE Question 13. Which two statements describe an efectve data loss preventon (DLP) program? (Select two.)

TestWarrior.com

4


Questions And Answers PDF

A. DLP is best implemented as a departmental initatve. B. DLP is primarily driven by the network team. C. An incident response team is rarely required. D. Employee educaton is important. E. Business stakeholders are held accountable for risk reducton.

Aoswern DE Question 14. Which two products are required for quarantning confdental fles residing inappropriately on a public fle share? (Select two.) A. Network Discover B. Endpoint Discover C. Network Monitor D. Network Prevent E. Network Protect

Aoswern AE Question 15. Which product can replace a confdental document residing on a share with a marker fle explaining why the document was removed? A. Network Discover B. Network Protect C. Endpoint Prevent D. Endpoint Discover

Aoswern B

TestWarrior.com

5


Questions And Answers PDF

Thank You for Trying Our Product Visit Our Site to Purchase the Full Set of Actual 250-510 Exam Questions With Answers.

http://www.TestWarrior.com/250-510-practice-exam.html We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Download Free Product Demo From:

Download Free Product Demo from: http://www.TestWarrior.com/250-510-practice-exam.html

Check Out Our Customer Testimonials

TestWarrior.com

6


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.