Filters
Question type

Study Flashcards

Which option correctly describes the two-tier installation type for Symantec DLP?


A) Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.
B) Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.
C) Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.
D) Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

An administrator recently investigated the debug logs for Symantec Messaging Gateway 10.5 and resolved an issue. A few days later the administrator discovers that the disk storage is filling up quickly. What is the likely cause?


A) logging severity is set to All
B) local log level is set to Debug
C) logging severity is set to Informational
D) remote syslog server is down

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Which two technologies should an organization utilize for integration with the Network Prevent products? (choose two.)


A) Network Tap
B) Network Firewall
C) Proxy Server
D) Mail Transfer Agent
E) Encryption Appliance

F) B) and C)
G) C) and D)

Correct Answer

verifed

verified

Which two instant messaging networks are supported in Symantec Messaging Gateway 10.5? (Select two.)


A) Facebook Chat
B) Yahoo!
C) Skype
D) MSN Messenger
E) ICQ

F) All of the above
G) B) and D)

Correct Answer

verifed

verified

Where does an administrator specify how often a report is run?


A) Reports -> Schedule
B) Reports -> Create a Reports
C) Reports -> Favorite Reports
D) Reports -> Schedule Reports

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the Symantec recommended order for stopping Symantec DLP services on a Windows Enforce server?


A) Vontu Notifier, Vontu Incident Persister, Vontu Update, Vontu Manager, Vontu Monitor Controller
B) Vontu Update, Vontu Notifier, Vontu Manager, Vontu Incident Persister, Vontu Monitor Controller
C) Vontu Incident Persister, Vontu Update, Vontu Notifier, Vontu Monitor Controller, Vontu Manager.
D) Vontu Monitor Controller, Vontu Incident Persister, Vontu Manager, Vontu Notifier, Vontu Update.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Which directory data source function must be enabled to help prevent a directory harvest attack?


A) Active Directory connector
B) Dynamic Data Sourcing
C) LDAP authentication
D) Recipient validation

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which two detection technology options run on the DLP agent? (Choose two.)


A) Optical Character Recognition (OCR)
B) Described Content Matching (DCM)
C) Directory Group Matching (DGM)
D) Form Recognition
E) Indexed Document Matching (IDM)

F) A) and D)
G) A) and B)

Correct Answer

verifed

verified

A company needs to secure the content of all Mergers and Acquisitions Agreements However, the standard text included in all company literature needs to be excluded. How should the company ensure that this standard text is excluded from detection?


A) Create a Whitelisted.txt file after creating the Vector Machine Learning (VML) profile. Create a Whitelisted.txt file after creating the Vector Machine Learning (VML) profile.
B) Create a Whitelisted.txt file after creating the Exact Data Matching (EDM) profile file after creating the Exact Data Matching (EDM) profile
C) Create a Whitelisted.txt file before creating the Indexed Document Matching (IDM) profile file before creating the Indexed Document Matching (IDM) profile
D) Create a Whitelisted.txt file before creating the Exact Data Matching (EDM) profile file before creating the Exact Data Matching (EDM) profile

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

An organization is receiving spam because of small targeted attacks from unknown senders. Which Symantec Messaging Gateway 10.5 feature should help slow down these types of attacks?


A) Global Bad Senders list
B) directory harvest attack prevention
C) Global reputation analysis
D) Connection classification

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco's role has the "User Reporting" privilege enabled, but User Risk reporting is still not working. What is the probable reason that the User Risk Summary report is blank?


A) Only DLP administrators are permitted to access and view data for high risk users.
B) The Enforce server has insufficient permissions for importing user attributes.
C) User attribute data must be configured separately from incident data attributes.
D) User attributes have been incorrectly mapped to Active Directory accounts.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Which listener accepts messages from the Brightmail Engine for carrying out actions based on the rendered verdicts?


A) Inbound
B) Conduit
C) MTE
D) MTA

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is the source of information used to populate the Global Good and Global Bad senders list?


A) Multiple DNS-based IP reputation services
B) Proprietary feed from MessageLabs
C) Reputation data from the Symantec Global Intelligence Network
D) Global reputation data from Symantec Protection Center

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What detection method utilizes Data Identifiers?


A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Directory Group Matching (DGM)
D) Exact Data Matching (EDM)

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

What is required before attempting installation of the Symantec Messaging Gateway 10.5 appliance?


A) console access to the appliance
B) DVD-ROM drive listed on hardware compatibility list
C) valid license file
D) machine account created in Active Directory

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which Symantec Messaging Gateway 10.5 feature improves responsiveness to new spam threats and increases overall antispam effectiveness?


A) rapid release definitions
B) Fastpass
C) microupdates
D) real time updates

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Having received a targeted attack from a spoofed email domain, a company wants to take advantage of DKIM validation for inbound mail. The messaging administrator has enabled sender authentication and DKIM validation and now needs to configure a content filtering policy to quarantine any messages that fail. Which condition should be met for the content filtering policy to fire?


A) The envelope sender email address contains "dkim=fail".
B) The message header contains "dkim=fail".
C) The file metadata MIME type is "dkim=fail".
D) The text in the subject, body, or attachments contains "dkim=fail".

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

An employee reports that a message sent to a customer was never received by the customer. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know where that message has gone. Which section of the Message Audit log detail page will provide this information?


A) Message data
B) Actions taken
C) Intended recipients
D) Authenticated username

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Which command line interface (CLI) command displays the update.log to check the progress of a software update of Symantec Messaging Gateway 10.5?


A) tail
B) watchlog
C) update.pl
D) version -l

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which two tasks can an end-user perform while logged in to the Control Center when authentication and address resolution are enabled? (Select two.)


A) configure personal suspect spam scoring
B) configure personal Good and Bad Sender lists
C) configure personal language preferences
D) configure personal content filtering policies
E) configure personal email digest preferences

F) B) and C)
G) C) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 138

Related Exams

Show Answer