The log files used to verify that a custom application is being properly monitored are located in which directory?
Answer : B
Which three statements apply to communication between the Enforce Server and detection servers? (Select three.)
Answer : ACD
When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?
Answer : A
Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?
Answer : C
An administrator needs to manually add a new resource type to a running cluster.
What should the administrator do after installing the agent software on each Veritas Cluster
Server (VCS) node?
Answer : B
What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?
Answer : C
What are two operating systems supported by Veritas Cluster Server? (Select two.)
Answer : B,E
Which two recommendations should an organization follow when deploying Endpoint
Prevent? (Select two.)
Answer : A,D
Which relational database management system (RDBMS) does Symantec Data Loss
Prevention 9.0 support?
Answer : D
During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read- only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)
Answer : B,E
Which three describe an effective data loss prevention (DLP) program? (Select three.)
Answer : A,D,E
Which service group attribute enables specifying preferred nodes for failover?
Answer : A
Which three are valid Scanned Content filter types for the Discover File System target?
(Select three.)
Answer : A,B,E
By default, which port does the Enforce Server use to connect to all detection servers?
Answer : D
Which product lets an incident responder see who has access to confidential files on a public file share?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us