Question 6 of 66

Which detection server is available from Symantec as a hardware appliance?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 66

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitored by Application File Access Control?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 66

Refer to the exhibit. What activity should occur during the baseline phase, according to the risk reduction model?
Exam 250-587: Question 8 - Image 1
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 66

How should a DLP administrator change a policy that it retains the original file when an endpoint incident has detected a “copy to USB device” operation?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 66

Which two (2) of the following automated response rule types could be successfully executed by a policy who’s only detection rule is an Exact Data Matching (EDM) rule? (Choose two.)
Answer

Suggested Answer

The suggested answer is A, B.

Community Votes

No votes yet

Join the discussion to cast yours