1.
What are two benefits of using Symantec's Sen/ice Delivery Methodology? (Select two.)
2.
A client engagement call has a number of defined and important goals. What is associated with the Symantec Data Loss Prevention Customer Engagement Planning Call?
3.
If an Enforce sen/er is configured to use Active Directory (AD) authentication for logins, which statement is true?
4.
When performing a three-tier installation method, what is the correct sequence of installation steps?
5.
According to Symantec best practices, which Exclude filter contains more file types that should be excluded in early scans?
6.
Which critical engagement meeting ensures all stake holders have the same expectations of the goals and deliverables of the project?
7.
Endpoint agents CANNOT monitor data copies to what?
8.
During the six phases of Data Loss Prevention Risk Reduction, where does Prevention/Protection fit?
9.
An administrator has correctly deployed Network Monitor, confirmed that the SPAN port is configured correctly (there is traffic), enabled the correct Network Interface Card on the Network Monitor detection server to monitor traffic, and enabled a policy. They see incidents showing up in Enforce for all protocols that they enabled except for SMTP. What is probably the cause?
10.
The DLP Technical Questionnaire spreadsheet has several questions in BOLD. In this case BOLD indicates what about the questions?