A policy template called Customer Credit Card Numbers is being imported into the system. What is the default result for this action?
A. the policy template will be listed under US Regulatory Enforcement Templates and be available
B. the policy template will be enabled by default
C. the policy template will be available after logging off and on to Enforce
D. the policy template will be listed under Imported Templates
While performing a VxVM operation, you discover that the disk group configuration has become corrupt. You want to check the changes in the VxVM configuration data and automatically record any configuration changes that occur. What would you do in this situation?
A. Use the vxconfigd daemon to monitor changes to the VxVM configuration.
B. Use the vxrelocd daemon to monitor monitors changes to the VxVM configuration.
C. Use the vxconfigbackupd daemon to monitors changes to the VxVM configuration.
D. Use vxdctl daemon to monitors changes to the VxVM configuration.
A DLP administrator has determined that a Network Discover server is unable to scan a remote file server. Which action should the administrator take to successfully scan the remote file server?
A. restart the discover scan
B. verify that the target file server is a Windows 2008 server
C. use the fully qualified name (FQDN) of the server
D. verify that the file server has .NET services running
Which two options are available when selecting an incident for deletion? (Select two.)
A. Delete the incident completely
B. Delete the original message and retain the incident
C. Delete the incident and retain the original message
D. Delete the incident and export incident details to .CSV file
E. Delete all attachments or files and export incident to .XML file
Which version of Oracle does Symantec Data Loss Prevention version 12.0 require for new installations or upgrading from 11.x to 12.0?
A. 10.2.0.1
B. 10.2.0.4
C. 11.2.0.2
D. 11.2.0.3
While performing a disk group joins operation, you get an error "VxVM vxdg ERROR V-5-1-2866 object:
Record already exists in disk group." You want to resolve this error.
How should you resolve this error?
A. Change the object name in the disk group.
B. Change the object name to same as disk group.
C. Import a disk group and rename it.
D. Delete the disk group and recreate it with another name.
Which command will you run to get the full path name of the file, if you only have the inode number?
A. vxfsstat
B. vxquot
C. vxquota
D. vxlsino
Which two Symantec Control Compliance Suite 9.0 roles are valid for exception management? (Select two.)
A. Exception Administrator
B. Exception Approver
C. Exception Auditor
D. Exception Owner
E. Exception Requestor
After installing several new DLP Agents, the Data Loss Prevention administrator discovers that none of the endpoint agents are appearing on the Agent Overview page. After refreshing the page several times, and determining that the equipment is powered on and connected to the network, the Agent Overview page still fails to display the new agents.
What is a possible cause for this issue?
A. The DLP Agents need to be added manually through the Symantec Management Platform.
B. The DLP Agents were installed with the incorrect Endpoint server IP address.
C. The assigned Endpoint server needs to be recycled in order to detect the new DLP Agents.
D. The Endpoint Location is set to "Manually" instead of "Automatically" in the Enforce user interface.
On which protocols does Symantec Data Loss Prevention use port-based protocol recognition?
A. Secure tunnelling protocols
B. User-defined IP protocols
C. User-configured TCP protocols
D. System-defined UDP and TCP protocols
Which step can be excluded from the install and configuration process for a valid Mobile Device Management solution that is used for Symantec Data Loss Prevention for Tablets?
A. configure VPN and SCEP profiles
B. target profiles and deliver them to the devices
C. configure the VPN profile for tamper-proofing
D. set up backup and load-balancing VPN connections
Which profile contains information to enable the VPN on Demand functionality for the Data Loss Prevention for Tablets solution?
A. DLP Agent profile
B. SCEP profile
C. iOS profile
D. VPN client profile
Which feature enables data extraction with incident data from the Enforce platform based on report ID?
A. Data Extraction API
B. CSV Export
C. Reporting API
D. Report Save As
You execute the command ps ef | grep vxatd. What is the expected output of this command?
A. The command verifies the Fully Qualified Host Name.
B. The command verifies the status of Symantec Authentication service.
C. The command verifies the status of Root Broker.
D. The command verifies the status of Authentication Broker.
Which three are available Export Formats for Symantec Control Compliance Suite 9.0 reports? (Select three.)
A. Comma Separated Values (CSV)
B. Adobe Reader (PDF)
C. Crystal Reports (RPT)
D. Rich Text
E. Microsoft Access (MDB)