Which interface provides single sign-on access for the purpose of administering Data Loss Prevention servers, managing policies, and remediating incidents?
A. Symantec Information Manager
B. Symantec Protection Center
C. Symantec Data Insight
D. Symantec Messaging Gateway
Which two protocols are available by default and recognized by Network Monitor based on their individual signatures? (Select two.)
A. FTP
B. HTTPS
C. IM: AIM
D. SNMP
E. IM: Google Talk
What is the importance of using a CPU in Oracle within the DLP technology?
A. Central Processing Unit - ensures database has enough processing power
B. Command Processor Unit - lays out the commands to process for the database
C. Critical Patch Update - ensures Oracle is securely patched
D. Communications Processing Unit - sends alerts to administrator
Which System Administration page will display a list of the system servers as well as recent error-level and warning-level system events?
A. System > Servers > Events
B. System > Servers > Overview
C. System > Settings > General
D. System > Servers > Alerts
Where are evaluation results stored?
A. Production database
B. Evidence database
C. Reporting database
D. Response database
What is a feature of keyword proximity matching?
A. It will match on whole keywords only.
B. It has a maximum distance between keywords of 99.
C. It only matches on message body.
D. It evaluates each keyword pair independently.
Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to Modified?
A. incidents in which confidential content was removed from an SMTP email
B. incidents in which an SMTP email was changed to include a specified header
C. incidents in which digital rights were applied to SMTP email attachments
D. incidents in which attachments were removed from an SMTP email
How does a Data Loss Prevention administrator verify the health of a Network Monitor server?
A. by checking Incident Queue and Message Wait Time on the System Overview page
B. by verifying the configuration details of the System Settings page
C. by determining whether system alert message emails are generated or received
D. by reviewing the results of the Environment Check Utility (ECU)
Which delimiter is acceptable in Exact Data Matching (EDM) data sources?
A. space
B. semi-colon (;)
C. pipe (|)
D. slash (/)
For greater accuracy, what is the minimum recommended number of columns in a data source for use in an Exact Data Matching (EDM) profile?
A. 2
B. 3
C. 4
D. 5