A) Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.
B) Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.
C) Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.
D) Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.
Correct Answer
verified
Multiple Choice
A) logging severity is set to All
B) local log level is set to Debug
C) logging severity is set to Informational
D) remote syslog server is down
Correct Answer
verified
Multiple Choice
A) Network Tap
B) Network Firewall
C) Proxy Server
D) Mail Transfer Agent
E) Encryption Appliance
Correct Answer
verified
Multiple Choice
A) Facebook Chat
B) Yahoo!
C) Skype
D) MSN Messenger
E) ICQ
Correct Answer
verified
Multiple Choice
A) Reports -> Schedule
B) Reports -> Create a Reports
C) Reports -> Favorite Reports
D) Reports -> Schedule Reports
Correct Answer
verified
Multiple Choice
A) Vontu Notifier, Vontu Incident Persister, Vontu Update, Vontu Manager, Vontu Monitor Controller
B) Vontu Update, Vontu Notifier, Vontu Manager, Vontu Incident Persister, Vontu Monitor Controller
C) Vontu Incident Persister, Vontu Update, Vontu Notifier, Vontu Monitor Controller, Vontu Manager.
D) Vontu Monitor Controller, Vontu Incident Persister, Vontu Manager, Vontu Notifier, Vontu Update.
Correct Answer
verified
Multiple Choice
A) Active Directory connector
B) Dynamic Data Sourcing
C) LDAP authentication
D) Recipient validation
Correct Answer
verified
Multiple Choice
A) Optical Character Recognition (OCR)
B) Described Content Matching (DCM)
C) Directory Group Matching (DGM)
D) Form Recognition
E) Indexed Document Matching (IDM)
Correct Answer
verified
Multiple Choice
A) Create a Whitelisted.txt file after creating the Vector Machine Learning (VML) profile. Create a Whitelisted.txt file after creating the Vector Machine Learning (VML) profile.
B) Create a Whitelisted.txt file after creating the Exact Data Matching (EDM) profile file after creating the Exact Data Matching (EDM) profile
C) Create a Whitelisted.txt file before creating the Indexed Document Matching (IDM) profile file before creating the Indexed Document Matching (IDM) profile
D) Create a Whitelisted.txt file before creating the Exact Data Matching (EDM) profile file before creating the Exact Data Matching (EDM) profile
Correct Answer
verified
Multiple Choice
A) Global Bad Senders list
B) directory harvest attack prevention
C) Global reputation analysis
D) Connection classification
Correct Answer
verified
Multiple Choice
A) Only DLP administrators are permitted to access and view data for high risk users.
B) The Enforce server has insufficient permissions for importing user attributes.
C) User attribute data must be configured separately from incident data attributes.
D) User attributes have been incorrectly mapped to Active Directory accounts.
Correct Answer
verified
Multiple Choice
A) Inbound
B) Conduit
C) MTE
D) MTA
Correct Answer
verified
Multiple Choice
A) Multiple DNS-based IP reputation services
B) Proprietary feed from MessageLabs
C) Reputation data from the Symantec Global Intelligence Network
D) Global reputation data from Symantec Protection Center
Correct Answer
verified
Multiple Choice
A) Indexed Document Matching (IDM)
B) Described Content Matching (DCM)
C) Directory Group Matching (DGM)
D) Exact Data Matching (EDM)
Correct Answer
verified
Multiple Choice
A) console access to the appliance
B) DVD-ROM drive listed on hardware compatibility list
C) valid license file
D) machine account created in Active Directory
Correct Answer
verified
Multiple Choice
A) rapid release definitions
B) Fastpass
C) microupdates
D) real time updates
Correct Answer
verified
Multiple Choice
A) The envelope sender email address contains "dkim=fail".
B) The message header contains "dkim=fail".
C) The file metadata MIME type is "dkim=fail".
D) The text in the subject, body, or attachments contains "dkim=fail".
Correct Answer
verified
Multiple Choice
A) Message data
B) Actions taken
C) Intended recipients
D) Authenticated username
Correct Answer
verified
Multiple Choice
A) tail
B) watchlog
C) update.pl
D) version -l
Correct Answer
verified
Multiple Choice
A) configure personal suspect spam scoring
B) configure personal Good and Bad Sender lists
C) configure personal language preferences
D) configure personal content filtering policies
E) configure personal email digest preferences
Correct Answer
verified
Showing 61 - 80 of 138
Related Exams