ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 11

Which two conditions can be specified when creating an incident access condition in a role? (Select two.)

A. File types

B. A custom attribute

C. Last modified by

D. File size

E. Policy group


Options are :

  • A,C
  • E,B
  • D,E
  • B,E
  • C,A

Answer : B,E

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 11

Which two recommendations should an organization follow when deploying Endpoint Prevent? (Select two.)

A. Test the agent on a variety of end-user images.

B. Initially enable monitoring of the local file system.

C. Enable monitoring of many destinations and protocols simultaneously.

D. Configure, test, and tune filters.

E. Configure blocking as soon as the agents are deployed.


Options are :

  • B,E
  • E,A
  • C,B
  • A.D
  • D,C

Answer : A.D

Which application or destination is selected for endpoint monitoring by default?


Options are :

  • removable storage
  • local drive
  • email
  • instant messaging

Answer : removable storage

A user has deleted a report template in a user-defined folder.What must the user do to use that report template again?


Options are :

  • Recreate the report template from the predefined report template
  • Select Add in My Reports
  • Find the report template in the Application Server Recycle Bin
  • Recreate the Report Generation job

Answer : Recreate the report template from the predefined report template

251-312 Administration of Symantec Backup Exec 12 for Exam Set 3

Which minimum right is required for a standard user to open the RMS console and use the query related features?


Options are :

  • must be configured as an RMS Console User
  • must be part of the RMS Console Users local group
  • must be part of the RMS Admin Users local group
  • must have a Symantec Control Compliance Suite 9.0 Administrator role

Answer : must be configured as an RMS Console User

When approving an exception, which field requires input from the approver?


Options are :

  • Requestor Email ID
  • Requestor
  • Comments
  • Requestor Group

Answer : Comments

Which three are prerequisites for RMS installation? (Select three.)

A. Internet Information Server

B. Microsoft .NET Framework 2.0

C. Windows Installer 3.1

D. Microsoft SQL Server 2005 Express

E. Crystal Report 2008


Options are :

  • B,C,D
  • E,A,C
  • B,E,A
  • A,C,D
  • C,B,E

Answer : B,C,D

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

An information security officer has detected an unauthorized tool on desktops being used to transmit data with encrypted communications. Which Data Loss Prevention feature can prevent this tool from accessing confidential data?


Options are :

  • Removable storage monitoring
  • Application monitoring
  • Application path filtering
  • Network protocol monitoring

Answer : Application monitoring

Which throttling option is available when creating a Server SharePoint Discover target?


Options are :

  • maximum request per front-end server
  • maximum sites per hour
  • maximum items per minute
  • maximum encountered errors

Answer : maximum items per minute

Which profile contains information to enable the VPN on Demand functionality for the Data Loss Prevention for Tablets solution?


Options are :

  • VPN client profile
  • SCEP profile
  • iOS profile
  • DLP Agent profile

Answer : iOS profile

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 7

When reviewing an SMTP incident snapshot, which reporting feature would a Data Loss Prevention administrator use to quickly find recent incidents with the same subject and sender?


Options are :

  • Incident Correlations
  • Incident Notes
  • Incident History
  • Incident Summary report

Answer : Incident Notes

How are incidents classified in a Network Prevent plus Data Loss Prevention for Tablets hybrid deployment?


Options are :

  • Incidents created by all traffic sources are generically categorized.
  • Classification for all incidents depends on traffic destination.
  • All incidents are classified under the Network category.
  • Incidents are classified specifically based on traffic source.

Answer : Incidents are classified specifically based on traffic source.

Which two components are required for the Symantec Data Loss Prevention for Tablets solution in addition to the Tablet Prevent and Enforce servers? (Select two.)

A. DLP Agent

B. Virtual Private Network Gateway

C. Web Proxy

D. 2010 Exchange Server

E. Mobile Device Management



Options are :

  • C,A
  • B,C
  • E,C
  • E,B
  • A,D

Answer : B,C

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 4

For greater accuracy, what is the minimum recommended number of columns in a data source for use in an Exact Data Matching (EDM) profile?


Options are :

  • 3
  • 4
  • 2
  • 5

Answer : 3

In the Reports > Predefined folder, which two actions can the user perform? (Select two.)

A. Add report templates from CSV files

B. Delete report templates

C. Customize certain report templates

D. Edit the report template properties to add user-defined values

E. Schedule report templates


Options are :

  • B,E
  • A,D
  • B,A
  • C,E
  • C,D

Answer : C,E

A company needs to scan all of its file shares on a weekly basis to make sure sensitive data is being stored correctly. The total volume of data on the file servers is greater than 1 TB. Which approach will allow the company to quickly scan all of this data on a weekly basis?


Options are :

  • run an initial complete scan of all the file shares, then modify the scan target to add date filters and exclude any files created or modified before the initial scan was run
  • run an initial complete scan of all the file shares, then modify the scan target to an incremental scan type
  • run an initial complete scan of all file shares, create a summary report of all incidents created by the scan, then run weekly scans and compare incidents from weekly scans to incidents from the complete scan
  • create a separate scan target for each file share and exclude files accessed before the start of each scan

Answer : run an initial complete scan of all the file shares, then modify the scan target to an incremental scan type

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 9

How does a Data Loss Prevention administrator verify the health of a Network Monitor server?


Options are :

  • by checking Incident Queue and Message Wait Time on the System Overview page
  • by determining whether system alert message emails are generated or received
  • by reviewing the results of the Environment Check Utility (ECU)
  • by verifying the configuration details of the System Settings page

Answer : by checking Incident Queue and Message Wait Time on the System Overview page

A company has SMTP Prevent deployed with email blocking enabled in their confidential data policy. The finance department reports that emails containing sensitive data sent to external business partners are being blocked. The company maintains a list of the external business partner domains. How can a policy be modified so that emails are sent only to authorized recipients?


Options are :

  • add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "All recipients must match" for Match Counting
  • duplicate the confidential data policy, add a rule based on "Sender Matches Pattern", and add the email addresses of all employees in the finance department, select "All senders must match" for Match Counting
  • create a new rule in the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting
  • add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting

Answer : add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "All recipients must match" for Match Counting

Which two remediation actions are available for Network Protect? (Select two.)

A. Copy

B. Move

C. Block

D. Rename

E. Quarantine


Options are :

  • D,B
  • D,C
  • E,B
  • A,E
  • A,C

Answer : A,E

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

Which service is responsible for importing assets via a CSV file?


Options are :

  • Management Services Service
  • Directory Support Service
  • Data Processing Service
  • Application Server Service

Answer : Data Processing Service

Which situation can be monitored by both Network Monitor and Endpoint Prevent?


Options are :

  • An employee uses AIM to send an instant message while off the corporate network.
  • An employee uses a Chrome 2 browser to post confidential data to a newsgroup using http.
  • An employee uses Skype to send an instant message to a friend at a competitor site.
  • An employee uses Internet Explorer 7 to send confidential data from a Gmail account using https.

Answer : An employee uses a Chrome 2 browser to post confidential data to a newsgroup using http.

Which two dates must be selected when creating an exception request? (Select two.)

A. expiration date

B. start date

C. effective date

D. due date

E. evaluation date


Options are :

  • C,D
  • B,E
  • D,A
  • E,D
  • A,C

Answer : A,C

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

With respect to the entitlements workflow, what is the first step that is performed?


Options are :

  • Gather business data
  • Mark control point
  • Import entitlements
  • Assign a data owner

Answer : Mark control point

How can a user monitor compliance to policies?


Options are :

  • via questions
  • via regulations
  • via statements
  • via frameworks

Answer : via statements

Which two policy management actions can result in a reduced number of incidents for a given traffic flow? (Select two.)

A. Adding additional component matching to the rule

B. Adding data owner exceptions

C. Deploying to additional detection servers

D. Increasing condition match count

E. Adding additional severities


Options are :

  • B,D
  • B,A
  • A,E
  • D,C
  • A,B

Answer : B,D

ST0-095 ST0-095 Symantec Technical Foundations Security Exam Set 4

When configuring DLP Agents, what does the File Recovery Area Location setting determine?


Options are :

  • the temporary backup location of blocked files
  • the location of files for redeployment or upgrade of agents
  • the location of files quarantined through Endpoint Discover scans
  • the secure filestore of incidents and data while agents are offline

Answer : the temporary backup location of blocked files

How is a policy applied to Network Discover scans?


Options are :

  • by assigning policy groups to the scan target
  • by assigning policies to the Network Discover Server
  • by choosing the correct policies in the scan target
  • by choosing the correct targets to run the policies

Answer : by assigning policy groups to the scan target

An administrator is applying a newly created agent configuration to a server. Upon inspection, however, none of the new configuration settings are displayed. What is a possible cause of this issue?


Options are :

  • The new agent configuration was saved without applying it to the Endpoint server.
  • The administration access rights restricts access to apply new configurations.
  • The new agent configuration was copied and modified from the default agent configuration.
  • The server that the new agent configuration was applied to needs to be recycled.

Answer : The new agent configuration was saved without applying it to the Endpoint server.

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 1

Which feature enables data extraction with incident data from the Enforce platform based onreport ID?


Options are :

  • CSV Export
  • Data Extraction API
  • Report Save As
  • Reporting API

Answer : Reporting API

How are permissions granted to predefined objects?


Options are :

  • Permissions are granted through Active Directory.
  • Permissions can only be granted to CCS administrators.
  • The administrator must manually add permissions.
  • Permissions are automatically granted when the user is added to a role.

Answer : Permissions are automatically granted when the user is added to a role.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions