1.
Which installation type requires the most additional memory on the Enforce Server?
2.
The data loss prevention team needs to scan file shares that are located in Atlanta, Los Angeles, and Brazil. What is the most effective plan for identifying confidential and sensitive information on these files shares?
3.
Which detection server requires two physical network ports?
4.
Which feature should an incident responder use to begin to determine where an attachment has created other violations?
5.
Where can an incident responder find the policy rules and/or exceptions that were in effect when a particular incident was detected?
6.
Which report type is used to export incidents using a Web archive?
7.
Which feature allows a user to export incidents in HTML format?
8.
On which protocols does Symantec Data Loss Prevention 10.5 use port-based protocol recognition?
9.
A client needs to create a custom role with a condition that limits a user to incidents generated by a single policy group. Which tab is used to configure this function?
10.
When resolving incidents, Symantec recommends that an incident responder completes which action?