What is the default fallback option for the Endpoint Prevent Encrypt response rule?
A. Block
B. User Cancel
C. Encrypt
D. Notify
Which two components can perform a file system scan of a workstation? (Choose two.)
A. Endpoint Server
B. DLP Agent
C. Network Prevent for Web Server
D. Discover Server
E. Enforce Server
A DLP administrator has added several approved endpoint devices as exceptions to an Endpoint Prevent policy that blocks the transfer of sensitive data. However, data transfers to these devices are still being blocked. What is the first action an administrator should take to enable data transfers to the approved endpoint devices?
A. Disable and re-enable the Endpoint Prevent policy to activate the changes
B. Double-check that the correct device ID or class has been entered for each device
C. Verify Application File Access Control (AFAC) is configured to monitor the specific application
D. Edit the exception rule to ensure that the "Match On" option is set to "Attachments"
Which two detection technology options run on the DLP agent? (Choose two.)
A. Optical Character Recognition (OCR)
B. Described Content Matching (DCM)
C. Directory Group Matching (DGM)
D. Form Recognition
E. Indexed Document Matching (IDM)
Which option correctly describes the two-tier installation type for Symantec DLP?
A. Install the Oracle database on the host, and install the Enforce server and a detection server on a second host.
B. Install the Oracle database on a local physical host, and install the Enforce server and detection servers on virtual hosts in the Cloud.
C. Install the Oracle database and a detection server in the same host, and install the Enforce server on a second host.
D. Install the Oracle database and Enforce server on the same host, and install detection servers on separate hosts.
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
A. Use the built-in Symantec DLP certificate for the Enforce Server, and use the "sslkeytool" utility to create certificates for the detection servers.
B. Use the built-in Symantec DLP certificate for both the Enforce server and the hosted detection servers.
C. Set up a Virtual Private Network (VPN) for the Enforce server and the hosted detection servers.
D. Use the "sslkeytool" utility to create certificates for the Enforce server and the hosted detection servers.
Which detection method depends on "training sets"?
A. Form Recognition
B. Vector Machine Learning (VML)
C. Index Document Matching (IDM)
D. Exact Data Matching (EDM)
Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
A. Exchange
B. Jiveon
C. File store
D. SharePoint
E. Confluence
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
A. Network Discover
B. Cloud Service for Email
C. Endpoint Prevent
D. Network Protect
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
A. Network Protect Storage Discover
B. Network Discover/Cloud Storage Discover
C. Network Prevent/Cloud Detection Service
D. Network Protect/Cloud Detection Service
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-438 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.