ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 8

The administrator recently applied to the substance Endpoint configuration server. After the inspection, the new assembly is open Endpoint server information. What is the possible cause of the new configuration is not to be assigned?


Options are :

  • The system defaults recorded a new configuration
  • server, the new configuration is applied needs to be recycled
  • None
  • The new configuration is saved by applying it to an endpoint server
  • The new configuration is copied and modified from the default configuration

Answer : The new configuration is saved by applying it to an endpoint server

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 9

The company is to secure the contents of all M & A agreements. However, the standard text included in all brochures must be ruled out. How does the company ensure that this standard text has been submitted detection?


Options are :

  • whitelisted.txt to create the file before the corresponding indexed document creation (IDM) profile
  • whitelisted.txt to create the file before creating detailed information about the matching (EDM) profile
  • None
  • create whitelisted.txt after the file creation Vector Machine Learning (CMA) 's profile
  • whitelisted.txt create the file after the creation of an equivalent document indexed (IDM) profile

Answer : whitelisted.txt to create the file before the corresponding indexed document creation (IDM) profile

DLP administrator has configured the network Discover the server can not scan a remote file server. for the operation of the administrator to take to successfully scan a remote file server?


Options are :

  • restart the scan to find
  • Use the full name (FQDN) server
  • None
  • We make sure that the file server is running .NET services
  • make sure the target file server is a Windows 2008 Server

Answer : Use the full name (FQDN) server

What causes most of the data loss prevention violations?


Options are :

  • companies do not have a security policy in order to prevent the loss of confidential data
  • None
  • hackers exploit vulnerabilities and exfiltrate confidential information
  • backups done incorrectly
  • employees inadvertently disclose confidential information

Answer : employees inadvertently disclose confidential information

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

The company needs to remove computers, USB devices, which produce some of the repetitive DLP events. It decides to take Endpoint Lockdown, using Endpoint Prevent, which integrates with the Symantec Endpoint Protection Manager and the Symantec Management Platform. After the incident the further detection of multiple substances, the company determines that the component is missing. What component must be added to remove USB devices while the cases are detected?


Options are :

  • pcAnywhere
  • To monitor Suite
  • workflow solution
  • None
  • Risk Automation Suite

Answer : workflow solution

Automatic rescue operations can be performed for data loss caused by events of confidential information can be found in the Windows shares?


Options are :

  • None
  • Block Message
  • Report User
  • user Cancel
  • quarantine files

Answer : quarantine files

The system administrator to implement policies to prevent the transmission of confidential data to Facebook. Policy source of danger, but allows posted content. for the operation of the administrator take to resolve this problem?


Options are :

  • Enable the default settings
  • Contact ICAP.Allowhosts
  • Contact Get Processing
  • Turn off the Trial mode
  • None

Answer : Turn off the Trial mode

250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 9

What is the minimum number of plexes need for a true mirroring provides redundancy of data?


Options are :

  • One
  • None
  • Three
  • four
  • Two

Answer : Two

Every user can save it is necessary to use a summary of the risk of the user feature?


Options are :

  • tomcat
  • MySQL
  • Active Directory
  • Samba
  • None

Answer : Active Directory

What alternative to the three-tier installation type Symantec Data Loss Prevention?


Options are :

  • Install Oracle Client (SQL * Plus and Database Tools) in three detection servers.
  • Install the Oracle database, the Enforce Server, and authentication server on separate computers.
  • Install the Oracle database and Enforce Server on the same computer, install the detection servers on different computers.
  • None
  • Install the database, the Enforce Server, and the authentication server all on the same computer

Answer : Install Oracle Client (SQL * Plus and Database Tools) in three detection servers.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

Each interface provides access to single sign-on provides Data Loss Prevention servers, insurance management and the rehabilitation of the events?


Options are :

  • Symantec Data Insight
  • None
  • Symantec Protection Center
  • Symantec Information Manager
  • Symantec Messaging Gateway

Answer : Symantec Protection Center

DLP administrator tries to use encryption Insight to detect confidential information in encrypted files, but has been unsuccessful. It is determined that the process was unable to retrieve the appropriate PGP key of the user because using the wrong encryption mode. What is the correct encryption mode that the user key must be used?


Options are :

  • Guarded Mode Switch
  • Customer Mode Switch
  • None
  • Server Mode Switch
  • Client Server Mode Switch

Answer : Server Mode Switch

What is the main difference between the data loss prevention and other security technologies?


Options are :

  • It is designed to provide visibility of the company with the least sensitive data is stored.
  • It is designed to receive content aware approach to security.
  • It quarantine adware before is able to extract confidential information
  • None
  • It determines the owner of the data incoming sensitive information

Answer : It quarantine adware before is able to extract confidential information

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

You will not find a physical device that corresponds to the disc ID records from the disk when one of the subdisks of plex fails. You need to check plex state to solve the problem. What is the status of Plex in this situation?


Options are :

  • None
  • LOOSE
  • inactive
  • UNENABLED
  • NOT THE APPLIANCE

Answer : NOT THE APPLIANCE

You move a set of files VxFS file system to another file system. Once the files have been transferred, to the extent attributes will not be transferred and files and lost during the transfer. What could be the possible cause of this problem?


Options are :

  • The objective of the file system is not a VxFS file system type.
  • None
  • The aim VxFS file system to use a mixed block size
  • There is variation in block size of the source and destination VxFS file system
  • The aim VxFS file system does not have enough free space to the extent properties.

Answer : The objective of the file system is not a VxFS file system type.

The company must implement a data owner in exceptional cases in order to avoid workers to send or receive your personal information. By the underlying technology should the company use?


Options are :

  • Indexed Document Matching (IDM)
  • Exact matching data (EDM)
  • Vector Machine Learning (CMA)
  • None
  • Described content matching (DCM)

Answer : Exact matching data (EDM)

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 7

In any cases appear in the Network Incident list report, when the network to prevent the effect of the filter is set to Modified?


Options are :

  • None
  • caused by the SMTP e-mail was changed to include one or more SMTP headers
  • caused by digital rights applied SMTP confidential information in an email that contains file attachments
  • due to the confidential appendices removed SMTP e-mail
  • caused by confidential content was removed from the body SMTP e-mail

Answer : caused by the SMTP e-mail was changed to include one or more SMTP headers

Every invalid auto-answer option would be a system administrator to choose the email block?


Options are :

  • The process of confidential e-mail re-routed to a specific mailing list
  • Add metadata to E-mail headers confidential e-mail
  • Edit the body of e-mail messages containing confidential information
  • Edit the message subject, or to add certain RFC-2822 headers
  • None

Answer : Edit the message subject, or to add certain RFC-2822 headers

Which option should be used to optimize the network share to scan the surrounding area?


Options are :

  • Set access for data prefetching to reduce the authentication delay
  • Deletes antivirus scanning to the network share on the server detection
  • Use the incremental scanning contains only previously scanned items
  • None
  • Make sure that the target file system is defragmented regularly

Answer : Set access for data prefetching to reduce the authentication delay

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

You have encapsulated a disc swap partitions and mirrors created under VxVM control. Which files / etc is allowed to edit the Root Disk is encapsulated?


Options are :

  • None
  • vfstab and root disk
  • mnttab and file system
  • vfstab and file system
  • volboot and file system

Answer : vfstab and file system

Incident response has defined a number of cases are caused by the same user activity by copying sensitive data to USB devices. By the action should Incident Response team will take to fix this problem so only one case per is not detected?


Options are :

  • Change the 'Endpoint targets' will be monitored
  • None
  • Create separate policies of different detection methods
  • Connects to a number of conditions combined into a single rule
  • Change the display / ignore configuration of the filters

Answer : Connects to a number of conditions combined into a single rule

What is the default, limited number of subdisks that can be attached to a single plex?


Options are :

  • 4096
  • 2048
  • None
  • Unlimited
  • 1024

Answer : 4096

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

When attaching a file system on which mode to set policy to deal with I / O errors mounted file system?


Options are :

  • minicache
  • disable
  • CIO
  • IOError
  • None

Answer : IOError

Every two operating systems are supported Symantec Data Loss Prevention 12 servers? (Choose two.)


Options are :

  • Windows 2003 Enterprise Edition 64-bit
  • Red Hat Linux Enterprise 5 64-bit
  • Windows 2008 Server 32-bit
  • Red Hat Linux 6 Enterprise 64-bit
  • Windows 2008 R2 Enterprise Edition 64-bit

Answer : Red Hat Linux Enterprise 5 64-bit Windows 2008 R2 Enterprise Edition 64-bit

What is the recommended maximum number of substances registered manager of Enterprise Security Manager 9.0?


Options are :

  • None
  • 1500
  • 2000
  • 4000
  • 400

Answer : 4000

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

The organization shall determine whether anyone other than the CEO's e-mail PDF documents that contain the phrase "Revenue Operating Report". What is the most efficient way to write this policy and will have the least false positives?


Options are :

  • One rule and the two conditions, one exception to the rule
  • Two rules, each on one condition and one exception to the rule
  • One rule unconditionally and with one exception to the rule
  • The two rules and one exception L7 Sender
  • None

Answer : One rule and the two conditions, one exception to the rule

Three of which are in force Reconciliation Rule titles Symantec to enforce Suite 9.0? (Choose three.)


Options are :

  • pre rule
  • Remove rule
  • Change rules
  • update rule
  • Add rule

Answer : pre rule update rule Add rule

Which two tasks are performed in the Symantec Management Platform? (Choose two.)


Options are :

  • The change log levels to be monitored
  • Restart Agents
  • To collect the logs Force
  • Change Endpoint Agent log levels
  • Collect Monitor logs

Answer : Restart Agents Change Endpoint Agent log levels

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

The administrator has received system event "table space is almost full." How the system administrator to resolve this problem?


Options are :

  • None
  • Creating more files in the Oracle database
  • Purge events from \ Vontu \ protect \ folder incidents
  • Start Vontu services
  • Start the Oracle database services

Answer : Creating more files in the Oracle database

What are two ways to match the event to provide information about the text? (Choose two.)


Options are :

  • XML export
  • CSV export
  • E-mail Notification
  • Reporting API
  • syslog notification

Answer : XML export Reporting API

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions