ST0-237 Symantec Loss Prevention Technical Practice Exam Set 8

Which three database maintenance tasks must be performed outside of Symantec Control Compliance Suite 9.0? (Select three.)


Options are :

  • Purge stale data
  • Shrink the databases
  • Purge evidence
  • Defragment the databases
  • Back up the databases

Answer : Shrink the databases Defragment the databases Back up the databases

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 3

What is the recommended maximum number of agents registered to a manager in Enterprise Security Manager 9.0?


Options are :

  • 4000
  • 2000
  • 1500
  • 400

Answer : 4000

Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to Modified?


Options are :

  • incidents in which attachments were removed from an SMTP email
  • incidents in which an SMTP email was changed to include a specified header
  • incidents in which confidential content was removed from an SMTP email
  • incidents in which digital rights were applied to SMTP email attachments

Answer : incidents in which an SMTP email was changed to include a specified header

Which two fallback options are available for a Network Prevent: Remove HTTP/HTTPS Content response rule? (Select two.)


Options are :

  • Allow content to be posted
  • Block content from being posted
  • Remove content through FlexResponse
  • Determine a secondary site for posts
  • Send to an encryption gateway

Answer : Allow content to be posted Block content from being posted

251-312 Administration of Symantec Backup Exec 12 for Exam Set 4

What is a prerequisite for viewing exported dashboards?


Options are :

  • Cognos
  • Crystal Reports
  • Adobe Flash
  • Java

Answer : Adobe Flash

An organization needs to determine whether anyone other than the CEO is emailing PDF documents that contain the phrase "Revenue Operating Report". What is the most efficient way to write this policy and generate the fewest false positives?


Options are :

  • Two rules with one condition each and one exception rule
  • One rule with two conditions and one exception rule
  • Two rules and one L7 Sender exception
  • One rule without conditions and one exception rule

Answer : One rule with two conditions and one exception rule

When manually installing the Symantec DLP Agent, how can the Data Loss Prevention administrator hide the agent from registering itself in the Windows control panel?


Options are :

  • Select the "ARPSYSTEMCOMPONENT" checkbox in the installation user interface
  • Add ARPSYSTEMCOMPONENT="1" to the installer batch file
  • Select the "Hide from Control Panel" checkbox in the installation user interface
  • Add HIDECONTROLPANEL="YES" to the installer batch file

Answer : Add ARPSYSTEMCOMPONENT="1" to the installer batch file

ST0-135 Symantec Network Access Control 12 Technical Exam Set 6

The following steps have been taken: - Create a CSV file in the supported format - Share the CSV file on the computer where the Symantec Control Compliance Suite 9.0 console has been installed - Configure the CSV settings for the platform from which the CSV file is being imported Which job will be executed?


Options are :

  • Automatic Entitlements Import job
  • Asset Import job
  • Entitlements Import job
  • Evaluation job

Answer : Asset Import job

Which four bv-Control platforms are supported in Symantec Control Compliance Suite 9.0 Standards? (Select four.)


Options are :

  • SQL
  • NetWare
  • Oracle
  • UNIX
  • Exchange
  • Windows

Answer : SQL Oracle UNIX Windows

A user attempts to run Lookup Attributes manually on an incident. On the Incident List page under Incident Actions, the option for Lookup Attributes is missing. Which section in the Plugins.properties file is misconfigured?


Options are :

  • Automatic plugin reload is set to false.
  • Plugin Execution Chain is undefined
  • Attribute Lookup parameters is set to "message".
  • Automatic Lookup is set to false.

Answer : Plugin Execution Chain is undefined

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 3

From which organization are Symantec Control Compliance Suite 9.0 Predefined Standards most commonly derived?


Options are :

  • Center for Internet Security
  • National Security Agency
  • National Institute of Standards and Technology
  • International Organization for Standardization

Answer : Center for Internet Security

What does Symantec Control Compliance Suite 9.0 use to help organize how and where data is collected?


Options are :

  • organizational units
  • domains
  • sites
  • collections

Answer : sites

An administrator has received the system event: "Tablespace is almost full". How should the administrator resolve this issue?


Options are :

  • Create additional data files for the Oracle database
  • Restart the Vontu services
  • Purge incidents from the \Vontu\Protect\incidents folder
  • Restart the Oracle database services

Answer : Create additional data files for the Oracle database

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 1

Which two detection condition types match on all Envelope, Subject, Body, and Attachment components? (Select two.)


Options are :

  • Data Identifier
  • Indexed Document Match
  • Exact Data Match
  • Keyword
  • File Name

Answer : Data Identifier Keyword

Which two benefits does the Policy Module provide? (Select two.)


Options are :

  • determines coverage gaps for multiple, overlapped regulatory, industry-specific, or best practices frameworks
  • integrates the policy compliance process with existing asset management systems
  • identifies problems within policies or internal controls and prevents policy compliance failure or data breach
  • lowers the cost of policy creation and maintenance and measures policy knowledge and retention
  • defines, reviews, and disseminates written policies to end users as mapped to specific measurable controls

Answer : determines coverage gaps for multiple, overlapped regulatory, industry-specific, or best practices frameworks defines, reviews, and disseminates written policies to end users as mapped to specific measurable controls

Data can be collected using which two data collectors in Symantec Control Compliance Suite 9.0? (Select two.)


Options are :

  • XML
  • CSV
  • ODBC
  • ESM
  • AS400

Answer : CSV ESM

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 2

What is the process of assigning meta information to an asset?


Options are :

  • Dynamic asset grouping
  • CSV Import
  • Implementing Reconciliation Rules
  • Tagging

Answer : Tagging

The business data owner is unavailable. Who can approve the entitlements in his absence?


Options are :

  • IT administrator
  • Alternate approver
  • Any user with the approver role
  • Alternate data owner

Answer : Alternate approver

A DLP Agent is connected to the corporate network through VPN. The administrator sees a Warning icon associated with the agent on the Agent Overview page of the Enforce user interface. The administrator determines the warning is related to a failure to update Active Directory group membership. What should the administrator do?


Options are :

  • Reinstall the DLP Agent
  • Refresh the Active Directory services
  • Restart the Endpoint server services
  • Restart the DLP Agent

Answer : Restart the DLP Agent

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 6

Which functionality must a Mail Transfer Agent (MTA) have to integrate with an Email Prevent Server?


Options are :

  • The MTA is strict ESMTP compliant.
  • The MTA is ICAP compliant.
  • The MTA filters spam.
  • The MTA supports TLS.

Answer : The MTA is strict ESMTP compliant.

What does Network Monitor use to identify SMTP network traffic going to a nonstandard port?


Options are :

  • string matching
  • regular expressions
  • protocol signature
  • port range

Answer : protocol signature

Which use case would be solved by using a "Sender/User matches Group based on Directory Server Group" as a detection rule?


Options are :

  • Generate an incident based on the business unit custom attribute
  • Resolve the business unit custom attribute using the LDAP lookup plugin
  • Allow login to Enforce based on Active Directory (AD) group membership
  • Detect a group of users based on Active Directory (AD) group membership

Answer : Detect a group of users based on Active Directory (AD) group membership

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

Which two collector types can be used to import assets into the Symantec Control Compliance Suite 9.0 asset system? (Select two.)


Options are :

  • Default
  • CSV
  • XML
  • DPS
  • Domain

Answer : Default CSV

An Endpoint Prevent: Notify response rule is defined in Korean, English, and Chinese (in that order). Which pop-up language will a Japanese Windows locale user see?


Options are :

  • Chinese
  • Japanese
  • English
  • Korean

Answer : Korean

What is a feature of keyword proximity matching?


Options are :

  • It only matches on message body.
  • It will match on whole keywords only
  • It evaluates each keyword pair independently.
  • It has a maximum distance between keywords of 99.

Answer : It evaluates each keyword pair independently.

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 3

A Data Loss Prevention administrator notices that several errors occurred during a Network Discover scan. Which report can the administrator use to determine exactly which errors occurred and when?


Options are :

  • Discover Incident report sorted by target name and scan
  • Full Statistics report for that particular scan
  • Full Activity report for that particular scan
  • Server Event report from Server Overview

Answer : Full Activity report for that particular scan

What is required to assign permissions to the asset system?


Options are :

  • user/group
  • role and user/group
  • group
  • role

Answer : role and user/group

Which step is recommended before scheduling any dashboard job?


Options are :

  • Back up the reporting database
  • Preview the dashboard
  • Run the Scheduled Reporting Database Purge job
  • Run the Scheduled Reporting Database Synchronization job

Answer : Run the Scheduled Reporting Database Synchronization job

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 5

What is the maximum number of port lets that can be used in a dashboard?


Options are :

  • 6
  • 10
  • 8
  • 4

Answer : 6

Which two types of information are available on a scan listing on the Discover Targets page? (Select two.)


Options are :

  • User who initiated the scan
  • File structure and location
  • Number of errors encountered
  • Number of items changed since the previous scan
  • Run time for each scan

Answer : Number of errors encountered Run time for each scan

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions