Exam 4: Administration of Symantec ProxySG 6.7
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
The Symantec Messaging Gateway 10.5 appliance will be deployed with the following topology: Internet Default Gateway (10.10.10.1) <--> Email Gateway (10.10.10.11) <--> Symantec Messaging Gateway (10.10.10.21) <--> Internal Mail Server (10.10.10.31) Which IP address should be specified in the Mail Filtering - Non-local Mail Delivery page of the site setup wizard?
(Multiple Choice)
4.7/5
(37)
What detection technology supports partial contents matching?
(Multiple Choice)
4.9/5
(34)
Which two Infrastructure-as-a-Service providers are supported for hosting Cloud Prevent for Office 365? (Choose two.)
(Multiple Choice)
4.8/5
(37)
Which two factors are common sources of data leakage where the main actor is well-meaning insider? (Choose two.)
(Multiple Choice)
4.9/5
(43)
An employee reports that a message sent to a customer was rejected. The employee provides sufficient information for the administrator to find the message using the Message Audit log. The employee wants to know why that message was blocked. Which section of the Message Audit Log detail page would provide this information?
(Multiple Choice)
4.8/5
(39)
What detection technology supports partial contents matching?
(Multiple Choice)
4.7/5
(44)
What will trigger a spam policy by default in Symantec Messaging Gateway 10.5?
(Multiple Choice)
4.9/5
(28)
What is the default fallback option for the Endpoint Prevent Encrypt response rule?
(Multiple Choice)
4.9/5
(38)
A customer receives large amounts of non-spam mail from thousands of different users, which consumes significant resources on Symantec Messaging Gateway 10.5. Which feature should be enabled to improve system performance while minimizing the risk of false positives?
(Multiple Choice)
4.9/5
(40)
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
(Multiple Choice)
4.7/5
(40)
What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?
(Multiple Choice)
4.9/5
(33)
A compliance officer needs to understand how the company is complying with its data security policies over time. Which report should be compliance officer generate to obtain the compliance information?
(Multiple Choice)
4.8/5
(43)
Symantec Messaging Gateway 10.5 includes a policy-based encryption feature. How is this new feature licensed?
(Multiple Choice)
4.9/5
(35)
A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?
(Multiple Choice)
4.9/5
(31)
Where in the Enforce management console can a DLP administrator change the "UI.NO_SCAN.int" setting to disable the "Inspecting data" pop-up?
(Multiple Choice)
4.9/5
(47)
A DLP administrator has performed a test deployment of the DLP 15.0 Endpoint agent and now wants to uninstall the agent. However, the administrator no longer remembers the uninstall password. What should the administrator do to work around the password problem?
(Multiple Choice)
4.9/5
(40)
A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. What detection method should the company use?
(Multiple Choice)
4.8/5
(41)
What is an advantage of Symantec Content Encryption over TLS encryption?
(Multiple Choice)
4.8/5
(39)
Which detection server is available from Symantec as a hardware appliance?
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 138
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)