Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
Correct Answer:
A
Reference: https://www.symantec.com/connect/articles/sslkeytool-utility-and-server-certificates
What is the correct configuration for “BoxMonitor.Channels” that will allow the server to start as a Network Monitor server?
Correct Answer:
C
Reference: https://support.symantec.com/en_US/article.TECH218980.html
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Correct Answer:
B
Reference: https://help.symantec.com/cs/dlp15.0/DLP/v16110606_v120691346/Modifying-the-Network-Discover-Cloud-Storage-Discover-Server-configuration?locale=EN_US
An organization wants to restrict employees to copy files only a specific set of USB thumb drives owned by the organization.
Which detection method should the organization use to meet this requirement?
Correct Answer:
D
A DLP administrator has enabled and successfully tested custom attribute lookups for incident data based on the Active Directory LDAP plugin. The Chief Information Security Officer (CISO) has attempted to generate a User Risk Summary report, but the report is empty. The DLP administrator confirms the Cisco’s role has the “User Reporting” privilege enabled, but User Risk reporting is still not working.
What is the probable reason that the User Risk Summary report is blank?
Correct Answer:
D