Want to pass your Administration of Symantec Data Loss Prevention 15 250-438 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?
A. Exact Data Matching (EDM)
B. Described Content Matching (DCM)
C. Vector Machine Learning (VML)
D. Indexed Document Matching (IDM)
Which two actions are available for a "Network Prevent: Remove HTTP/HTTPS content" response rule when the content is unable to be removed? (Choose two.)
A. Allow the content to be posted
B. Remove the content through FlexResponse
C. Block the content before posting
D. Encrypt the content before posting
E. Redirect the content to an alternative destination
A DLP administrator has performed a test deployment of the DLP 15.0 Endpoint agent and now wants to uninstall the agent. However, the administrator no longer remembers the uninstall password. What should the administrator do to work around the password problem?
A. Apply a new global agent uninstall password in the Enforce management console.
B. Manually delete all the Endpoint agent files from the test computer and install a new agent package.
C. Replace the PGPsdk.dll file on the agent's assigned Endpoint server with a copy from a different Endpoint server
D. Use the UninstallPwdGenerator to create an UninstallPasswordKey.