Which Network incident report indicates where employees are most often sending emails in violation of policies?
A. Location Summary
B. Status by Target
C. Top Recipient Domains
D. Destination Summary
Which three supported scopes can be used for a Windows File asset type? (Select three.)
A. Windows domain
B. Windows group
C. Windows machine
D. Windows directory
E. Windows site
After installing several new DLP Agents, the Data Loss Prevention administrator discovers that none of the endpoint agents are appearing on the Agent Overview page. After refreshing the page several times, and determining that the equipment is powered on and connected to the network, the Agent Overview page still fails to display the new agents.
What is a possible cause for this issue?
A. The DLP Agents need to be added manually through the Symantec Management Platform.
B. The DLP Agents were installed with the incorrect Endpoint server IP address.
C. The assigned Endpoint server needs to be recycled in order to detect the new DLP Agents.
D. The Endpoint Location is set to "Manually" instead of "Automatically" in the Enforce user interface.
What is the purpose of the cg.ead endpoint database?
A. to tune and change debugging levels
B. to store two-tier detection information
C. to encrypt communication with the Endpoint server
D. to log and track agent version changes
When planning a Symantec Control Compliance Suite 9.0 deployment, the site concept plays an important role.
What should be the first step when planning the site concept?
A. identify the number of servers in scope
B. analyze a diagram of the network
C. identify the operating systems in scope
D. analyze a diagram of the Active Directory structure
What is required to assign permissions to the asset system?
A. user/group
B. role
C. role and user/group
D. group
What is the correct sequence of steps in the Symantec Data Loss Prevention policy lifecycle?
A. Design policy, test policy, deploy policy, identify threat, and tune policy
B. Identify threat, build policy, deploy policy, test policy, and tune policy
C. Design policy, deploy policy, identify threat, test policy, and tune policy
D. Identify threat, design policy, build policy, test policy, tune policy, and deploy policy
Communications between Symantec Control Compliance Suite 9.0 (CCS 9.0) components rely on a signed digital certificate.
What is the root certificate authority in the CCS 9.0 environment?
A. Microsoft Certificate Authority Server
B. Certificate Management Console Server
C. CCS Management Service
D. Application Server
What should a Data Loss Prevention administrator do when the license file expires?
A. enter a new license key to update the license file
B. reference a new license file on the System Settings page
C. overwrite the expired license key
D. enter a new license file on the Advanced Settings page
A user receives this error message in the Symantec event log:
An error occurred while attempting to run a scheduled job; Reason for failure: Password doesn't exist for username.
The Symantec Control Compliance Suite 9.0 is configured to store the user credentials for job runs.
Where must the user supply the correct credentials?
A. Home > User Preferences
B. Monitor > Jobs
C. Settings > General
D. Settings > Secure Configuration
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ST0-237 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.