Symantec Data Loss Prevention 9.0
Questions, Answers, Braindumps (ST0-075)
to www.exams.ws and www.4exam.com But there’s
no need to have it from both of them, only questions
from only one are sufficient I think. Here is my contribution.
Which service on the Enforce Server controls all communications
to and from the detection servers?
A. Monitor Controller
D. File Reader
QUESTION NO: 2
A policy manager wants to apply policies only to certain
employees with a specific classification level. Which
True Match detection method can help accomplish this?
A. Directory Group Matching (DGM)
B. Exact Data Matching (EDM)
C. Described Content Matching (DCM)
D. Indexed Document Matching (IDM)
QUESTION NO: 3
Which component of Microsoft Outlook Personal Folder
(.pst) files does Network Discover apply filters to?
A. individual emails in the .pst file
B. the entire .pst file
C. attachments in the .pst file
D. folders in the .pst file
QUESTION NO: 4
Which product locates exposed confidential data by scanning
a range of enterprise data repositories?
A. Network Prevent
B. Network Discover
C. Network Protect
D. Network Monitor
QUESTION NO: 5
Which three statements apply to communication between
the Enforce Server and detection servers? (Select three.)
A. By default, the Enforce Server and the detection
servers communicate over port 8100.
B. Port 3389 must be open between the Enforce Server
and the detection servers.
C. The same port number must be used for all detection
D. The servers can be configured to use any port higher
E. IPSec must be configured on the Enforce Server and
the detection servers.
QUESTION NO: 6
What must a system administrator do for Network Monitor
filter configuration changes to take effect?
A. recycle VontuManager and VontuMonitorController services
B. recycle PacketCapture process on the Network Monitor
C. recycle VontuNotifier service to propagate changes
to Network Monitor
D. recycle Network Monitor server from the Server Detail
QUESTION NO: 7
Why do companies deploy data loss prevention solutions?
A. to protect their perimeters from external threats
B. to help protect their brands and reputations
C. to prevent employee access to undesirable websites
D. to encrypt sensitive data to ensure secure transmission
E. to reduce the likelihood of data breaches and related
QUESTION NO: 8
What are three benefits that data loss prevention solutions
provide that other security technologies or tools do
not? (Select three.)
A. give visibility into where sensitive data is stored
B. give insight into capacity planning for sensitive
C. identify who has access to sensitive data
D. indicate where sensitive data is being sent
E. measure encryption strength for sensitive data
QUESTION NO: 9
Which three are examples of confidential data? (Select
A. national ID numbers
B. published press releases
C. health information
D. CAD drawings
E. manufacturing plant locations
QUESTION NO: 10
When resolving or dismissing incidents, Symantec recommends
that an incident responder completes which action?
A. add comments
B. delete incidents
C. set severity
D. export incidents
QUESTION NO: 11
Which three describe an effective data loss prevention
(DLP) program? (Select three.)
A. DLP is a company-wide initiative.
B. DLP is primarily driven by Information Security.
C. DLP is primarily driven by the Incident Response
D. Employee participation is important.
E. Business stakeholders are held accountable for risk
QUESTION NO: 12
Which two products are required for quarantining confidential
files residing inappropriately on a public file share?
A. Network Discover
B. Endpoint Discover
C. Network Monitor
D. Network Prevent
E. Network Protect
QUESTION NO: 13
Which product can replace a confidential document residing
on a public share with a Marker File explaining why
the document was removed?
A. Network Prevent
B. Network Protect
C. Network Monitor
D. Network Discover
QUESTION NO: 14
When should blocking of network transmissions and quarantining
of exposed confidential files begin?
A. within three months of deploying the system
B. as soon as the baseline risk snapshot has been established
C. before enabling auto notifications
D. after policies have been tuned for several months
QUESTION NO: 15
Where does an incident responder find the exact matches
that triggered an incident?
A. Dashboard report
B. Incident Snapshot
C. Incident List
D. System Events report
QUESTION NO: 16
Under which high-level node in the left navigation panel
can administrators find the System Events report?
C. System Health