An incident responder needs to change the status of an incident to 'Escalate and Notify'. Which two places in the user interface can this Smart Response rule be invoked? (Select two.)
A. Policy page
B. Incident List
C. Incident Snapshot
D. Incident Summary
E. Response Rules page
Which server encrypts the message when using a Modify SMTP Message response rule?
A. Encryption Gateway
B. SMTP Prevent server
C. Network Monitor server
D. Enforce server
What is the most efficient method for designing filters to remove unwanted traffic?
A. policy-based exceptions
B. IP-based filtering per protocol
C. L7 filtering per protocol
D. sampling per protocol
How many dashboards can be viewed simultaneously on the home page?
A. 1
B. 2
C. 4
D. 8
What is the correct sequence of steps in the Symantec Data Loss Prevention policy lifecycle?
A. Design policy, test policy, deploy policy, identify threat, and tune policy
B. Identify threat, build policy, deploy policy, test policy, and tune policy
C. Design policy, deploy policy, identify threat, test policy, and tune policy
D. Identify threat, design policy, build policy, test policy, tune policy, and deploy policy
Which three supported scopes can be used for a Windows File asset type? (Select three.)
A. Windows domain
B. Windows group
C. Windows machine
D. Windows directory
E. Windows site
Which three bv-Control for Windows services may be checked when troubleshooting agentless data collection? (Select three.)
A. bvProcessManager
B. Data Processing Service
C. Directory Support Service
D. BindView Query Engine
E. Enterprise Configuration Service
Which response rule condition allows a policy manager to configure an Automated Response rule to execute while a user is travelling?
A. Endpoint Location
B. Endpoint Device
C. Protocol or Endpoint Monitoring
D. Sender/User Matches Pattern
Which feature moves confidential data to a secure location when scanning endpoint targets?
A. Network Protect Quarantine
B. Network Discover Remediation
C. Endpoint Quarantine
D. Endpoint Prevent Block
An administrator is attempting to uninstall a version 11.6 DLP Agent, but the uninstall password fails to remove the agent. The group who set the initial password is unavailable. Which two options are available to address the password issue? (Select two.)
A. manually uninstall the agent by stopping the EDPA and WDP services, then remove all related program files
B. upgrade the agent to version 12 with a newly generated UninstallPasswordKey
C. reboot and login to Safe Mode and use Add / Remove Programs to uninstall the Agent
D. contact Symantec Support to obtain the Clean Agent tool
E. use Regedit.exe and delete the related Endpoint registry entries