An administrator pulls the Services and Operation logs off of a DLP Agent by using the Pull Logs action. What happens to the log files after the administrator performs the Pull Logs action?
A. they are stored directly on the Enforce server
B. they are transferred directly to the Enforce Server and deleted from the DLP Agent
C. they are created on the DLP Agent then pulled down to the Enforce server
D. they are temporarily stored on the DLP Agent's Endpoint server
Which structure records are stored in the private region? (Each correct answer presents part of the solution. Select three.)
A. Disk group configuration
B. Disk and disk group ID
C. File system metadata
D. Disk group kernel log
E. Partition tables
Which command will you run to get the full path name of the file, if you only have the inode number?
A. vxfsstat
B. vxquot
C. vxquota
D. vxlsino
How is data moved to the servers at Symantec when auto-transmission of Supportability Telemetry data is enabled?
A. HTTP POST to Symantec from Agents
B. HTTPS POST to Symantec from Enforce
C. HTTP POST to Symantec from Enforce
D. HTTPS POST to Symantec from Agents
Which product must run on a physical server?
A. Endpoint Prevent
B. Network Monitor
C. Enforce
D. Network Prevent
Which action must be performed immediately after the configuration/modification of Data Processing Service settings?
A. register configuration
B. refresh configuration
C. synchronize configuration
D. update configuration
What is the purpose of the cg.ead endpoint database?
A. to tune and change debugging levels
B. to store two-tier detection information
C. to encrypt communication with the Endpoint server
D. to log and track agent version changes
Which two are categorized as unprocessable components in the traffic report? (Select two.)
A. traffic stream that is corrupted
B. Traffic that contains jpg image
C. Extraction limit that has been exceeded
D. Traffic containing a password protected doc file
E. Packets arriving out of order
An information security officer has detected an unauthorized tool on desktops being used to transmit data with encrypted communications.
Which Data Loss Prevention feature can prevent this tool from accessing confidential data?
A. Removable storage monitoring
B. Network protocol monitoring
C. Application path filtering
D. Application monitoring
Which two dates must be selected when creating an exception request? (Select two.)
A. expiration date
B. start date
C. effective date
D. due date
E. evaluation date