A software company wants to protect its source code, including new source code created between scheduled indexing runs.
Which detection method should the company use to meet this requirement?
Which two (2) detection servers are available as virtual appliances? (Choose two.)
Where in the Enforce management console can a DLP administrator change the “UI.NO_SCAN.int” setting to disable the “Inspecting data” pop-up?
A DLP administrator needs to remove an agent its associated events from an Endpoint server.
Which Agent Task should the administrator perform to disable the agent’s visibility in the Enforce management console?
Which two DLP products support the new Optical Character Recognition (OCR) engine in Symantec DLP 15.0? (Choose two.)
Which detection method depends on “training sets”?
Which statement accurately describes where Optical Character Recognition (OCR) components must be installed?
A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display.
What are the processes missing from the Server Detail page display?
What is one difference between Exact Data Matching (EDM) and Exact Match Data Identifiers (EMDI)?
Why would an administrator set the Similarity Threshold to zero when testing and tuning a Vector Machine Learning (VML) profile?
A DLP administrator is attempting to add a new Network Discover detection server from the Enforce management console. However, the only available options are Network Monitor and Endpoint servers.
What should the administrator do to make the Network Discover option available?
What are three features that are available for Network Discover File System High-Speed Discover (FS-HSD) scans but are NOT available for Network Discover (regular or legacy) File System scans?
Which two Network Discover/Cloud Storage targets apply Information Centric Encryption as policy response rules?
Which option correctly describes the two-tier installation type for Symantec DLP?
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
A DLP administrator is checking the System Overview in the Enforce management console, and all of the detection servers are showing as “unknown”. The Vontu services are up and running on the detection servers. Thousands of .IDC files are building up in the Incidents directory on the detection servers. There is good network connectivity between the detection servers and the Enforce server when testing with the telnet command.
How should the administrator bring the detection servers to a running state in the Enforce management console?
Which two (2) DLP products support Optical Character Recognition (OCR)? (Choose two.)
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Where should an administrator set the debug levels for an Endpoint Agent?
Which option correctly describes the two-tier installation type for Symantec DLP?
Which two technologies should an organization utilize for integration with the Network Prevent products? (choose two.)
A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display.
What are the processes missing from the Server Detail page display?
A DLP administrator determines that the \SymantecDLP\Protect\Incidents folder on the Enforce server contains. BAD files dated today, while other. IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD files.
What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files?
Which action is available for use in both Smart Response and Automated Response rules?
Which network Prevent action takes place when the network Incident list shows the message is “Modified”?
How do Cloud Detection Service and the Enforce server communicate with each other?
An organization wants to restrict employees to copy files only a specific set of USB thumb drives owned by the organization.
Which detection method should the organization use to meet this requirement?
A DLP administrator is testing Network Prevent for Web functionality. When the administrator posts a small test file to a cloud storage website, no new incidents are reported.
What should the administrator do to allow incidents to be generated against this file?
Which statement accurately describes where Optical Character Recognition (OCR) On-Premises DLP Core components must be installed?
A DLP administrator is preparing to install Symantec DLP and has been asked to use an Oracle database provided by the Database Administration team.
Which SQL *Plus command should the administrator utilize to determine if the database is using a supported version of Oracle?