ST0-237 Symantec Loss Prevention Technical Practice Exam Set 9

What needs to be configured in order to collect common fields during a asset import using the default data collector?


Options are :

  • ESM data collector
  • CSV data collector
  • a policy with associated assets
  • Automatic Entitlements Import job

Answer : CSV data collector

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

After an exception has been requested, which three approver actions are valid? (Select three.)


Options are :

  • forward the exception request to an alternate approver
  • deny the exception request
  • delete the exception request
  • request clarification for the exception request
  • set the exception request state to In Review

Answer : deny the exception request request clarification for the exception request set the exception request state to In Review

If Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict?


Options are :

  • Endpoint Discover pauses any scans if resources are needed.
  • Endpoint Prevent pauses detection until any scans complete.
  • Endpoint Prevent queues files until resources are available.
  • Endpoint Discover queues files until resources are available.

Answer : Endpoint Discover pauses any scans if resources are needed.

Where can a Data Loss Prevention administrator configure the throttling option for a DLP Agent?


Options are :

  • Symantec Management Platform
  • Agent Filtering section
  • Discover Target Configuration page
  • Agent Configuration section

Answer : Agent Configuration section

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Which two protocols are available by default and recognized by Network Monitor by their individual signatures? (Select two.)


Options are :

  • HTTPS
  • SNMP
  • TFTP
  • FTP
  • IM: AIM

Answer : FTP IM: AIM

What is the purpose of the cg.ead endpoint database?


Options are :

  • to store two-tier detection information
  • to tune and change debugging levels
  • to encrypt communication with the Endpoint server
  • to log and track agent version changes

Answer : to tune and change debugging levels

Which two currently supported ICAP proxies can Web Prevent work with to inspect, block, and remove HTTPS content? (Select two.)


Options are :

  • Webwasher
  • Squid
  • Ironport S-series
  • Microsoft ISA
  • Bluecoat

Answer : Webwasher Bluecoat

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 5

A business unit is generating a large number of high severity incidents on a Network Prevent credit card policy. What are two likely causes? (Select two.)


Options are :

  • The business unit's employees are copying credit card data to removable drives.
  • The policy is unable to detect corporate security policies with respect to credit cards.
  • The business unit's employees may be unaware of correct credit card handling procedures.
  • A business process within the business unit violates corporate security policies.
  • The business unit's employees are storing credit card data insecurely on a local file share.

Answer : The business unit's employees may be unaware of correct credit card handling procedures. A business process within the business unit violates corporate security policies.

Which Network incident report indicates where employees are most often sending emails in violation of policies?


Options are :

  • Destination Summary
  • Top Recipient Domains
  • Status by Target
  • Location Summary

Answer : Top Recipient Domains

A dashboard can be exported to a folder from which two areas? (Select two.)


Options are :

  • Reporting > Dashboard Templates
  • Home
  • Reporting > My Reports
  • Reporting > My Dashboards
  • Monitor > Jobs

Answer : Home Reporting > My Dashboards

250-405 Administration of Symantec Management Platform Exam Set 2

Which two functions does Data Owner Exception provide? (Select two.)


Options are :

  • Allows individuals to send confidential data to any recipient
  • Prevents individuals from sending confidential data to a group of recipients in the recipient list
  • Allows data owners to send or receive their own data
  • Allows individuals to send confidential data about a family member
  • Prevents confidential data from being sent to the wrong recipient

Answer : Allows data owners to send or receive their own data Prevents confidential data from being sent to the wrong recipient

Which three roles are associated with policy management in Symantec Control Compliance Suite 9.0? (Select three.)


Options are :

  • Policy Requestor
  • Policy Administrator
  • Policy Viewer
  • Policy Approver
  • Policy Reviewer

Answer : Policy Administrator Policy Approver Policy Reviewer

What are two functions of the Enterprise Configuration Service? (Select two.)


Options are :

  • It maintains a list of RMS configured users.
  • It maintains a list of master and slave query engines.
  • It maintains rules for query engine data collection.
  • It maintains a list of registered UNIX targets.
  • It maintains Scope files.

Answer : It maintains a list of master and slave query engines. It maintains rules for query engine data collection.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 5

Who is responsible for approving who has access to which data in an organization?


Options are :

  • the business data owner
  • the chief security officer
  • the owner of the business
  • the information technology officer

Answer : the business data owner

Which information is displayed in the Monitor View?


Options are :

  • Data collections and evaluation results
  • Jobs and reports
  • Jobs and evaluation results
  • Tasks and reports

Answer : Jobs and evaluation results

What should a Data Loss Prevention administrator do when the license file expires?


Options are :

  • reference a new license file on the System Settings page
  • enter a new license key to update the license file
  • enter a new license file on the Advanced Settings page
  • overwrite the expired license key

Answer : reference a new license file on the System Settings page

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

Which report helps a compliance officer understand how the company is complying with its data security policies over time?


Options are :

  • Policy Trend report, summarized by policy, then quarter
  • Policy report, filtered on quarter, and summarized by policy
  • Policy report, filtered on date, and summarized by policy
  • Policy Trend report, summarized by policy, then severity

Answer : Policy Trend report, summarized by policy, then quarter

Which user action can be performed on a read-only policy in the Symantec Control Compliance Suite 9.0 web portal?


Options are :

  • Request Exception
  • Request Clarification
  • Decline
  • Accept

Answer : Request Clarification

The amount of discarded packets for a Network Monitor server is increasing throughout the day. Which Network Monitor configuration changes should be implemented to reduce the number of packets that are discarded?


Options are :

  • Implement filtering in the policies that are applied to the Network Monitor.
  • Implement Layer-7 filtering in the local Network Monitor configuration.
  • Uncheck protocols from the Monitor configuration page that are unnecessary.
  • Ensure that the traffic handled by Network Monitor is kept at 10,000 messages per second.

Answer : Uncheck protocols from the Monitor configuration page that are unnecessary.

250-254 Administration of Symantec Cluster Server 6.1UN Exam Set 8

What are two valid CSV collector settings? (Select two.)


Options are :

  • Job Poll Interval
  • Command Threads
  • Search Pattern
  • File(s) Path
  • Hostname

Answer : Search Pattern File(s) Path

What is required in order to support encrypted communications between the information server and an Oracle database server?


Options are :

  • Secure Socket Layer (SSL)
  • Oracle client
  • Public Key Infrastructure (PKI)
  • tnsnames.ora file

Answer : Oracle client

After installing several new DLP Agents, the Data Loss Prevention administrator discovers that none of the endpoint agents are appearing on the Agent Overview page. After refreshing the page several times, and determining that the equipment is powered on and connected to the network, the Agent Overview page still fails to display the new agents. What is a possible cause for this issue?


Options are :

  • The assigned Endpoint server needs to be recycled in order to detect the new DLP Agents.
  • The DLP Agents were installed with the incorrect Endpoint server IP address.
  • The DLP Agents need to be added manually through the Symantec Management Platform.
  • The Endpoint Location is set to "Manually" instead of "Automatically" in the Enforce user interface

Answer : The DLP Agents were installed with the incorrect Endpoint server IP address.

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 10

Which three supported scopes can be used for a Windows File asset type? (Select three.)


Options are :

  • Windows site
  • Windows domain
  • Windows machine
  • Windows directory
  • Windows group

Answer : Windows domain Windows machine Windows directory

Which information is required to configure an Enterprise Security Manager (ESM) data collector in Symantec Control Compliance Suite 9.0? (Select two.)


Options are :

  • ESM manager
  • ESM user
  • ESM agent
  • ESM console user
  • ESM console

Answer : ESM manager ESM user

Which two options can incident responders select when deleting incidents? (Select two.)


Options are :

  • Delete the incident completely
  • Delete the original message and retain the incident
  • Delete all attachments or files and log the incident
  • Delete the incident and export incident details to .csv file
  • Delete the incident and retain the violating attachments or files

Answer : Delete the incident completely Delete the original message and retain the incident

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 5

Which action must be performed immediately after the configuration/modification of Data Processing Service settings?


Options are :

  • update configuration
  • register configuration
  • synchronize configuration
  • refresh configuration

Answer : synchronize configuration

In which two places in the user interface are Smart Response rules invoked? (Select two.)


Options are :

  • Response Rules page
  • Incident Snapshot reports
  • Policy page
  • Incident List reports
  • Incident Summary reports

Answer : Incident Snapshot reports Incident List reports

Communications between Symantec Control Compliance Suite 9.0 (CCS 9.0) components rely on a signed digital certificate. What is the root certificate authority in the CCS 9.0 environment?


Options are :

  • Application Server
  • Microsoft Certificate Authority Server
  • CCS Management Service
  • Certificate Management Console Server

Answer : CCS Management Service

250-253 Administration of Veritas Cluster Server 6.0 Exam Set 6

Which two Symantec Data Loss Prevention components can be deployed in a hosted service provider? (Select two.)


Options are :

  • Network Monitor
  • Network Prevent (Email)
  • Network Prevent (Web)
  • Network Protect
  • Network Discover

Answer : Network Prevent (Email) Network Prevent (Web)

What should be used to exclude emails going to any email address in the partner.com domain across all policies?


Options are :

  • IP filter
  • Sender/User Matches pattern
  • L7 filter
  • Content filter

Answer : L7 filter

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions