♥♥ 2017 NEW RECOMMEND ♥♥
Free VCE & PDF File for Symantec 250-511 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
250-511 Product Description:
Exam Number/Code: 250-511 vce
Exam name: Administration of Symantec(TM) Data Loss Prevention 11
n questions with full explanations
Certification: Symantec Certification
Last updated on Global synchronizing
Exam Code: 250-511 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Administration of Symantec(TM) Data Loss Prevention 11
Certification Provider: Symantec
Free Today! Guaranteed Training- Pass 250-511 Exam.
2016 May 250-511 Study Guide Questions:
Q61. If Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict?
A. Endpoint Discover queues files until resources are available.
B. Endpoint Discover pauses any scans if resources are needed.
C. Endpoint Prevent pauses detection until any scans complete.
D. Endpoint Prevent queues files until resources are available.
Q62. Which two components can perform a scan of a workstation? (Select two.)
A. Endpoint Server
B. DLP Agent
C. Network Prevent
D. Enforce Server E.
Q63. A company needs to scan all of its file shares on a weekly basis to make sure sensitive data is being stored correctly. The total volume of data on the file servers is greater than 1 TB. Which approach will allow the company to quickly scan all of this data on a weekly basis?
A. run an initial complete scan of all the file shares, then modify the scan target to add date filters and exclude any files created or modified before the initial scan was run
B. run an initial complete scan of all the file shares, then modify the scan target to an incremental scan type
C. create a separate scan target for each file share and exclude files accessed before the start of each scan
D. run an initial complete scan of all file shares, create a summary report of all incidents created by the scan, then run weekly scans and compare incidents from weekly scans to incidents from the complete scan
Far out 200-101:
Q64. How can an administrator validate that once a policy is updated and saved it has been enabled on a specific detection server?
A. check the status of the policy on the policy list page
B. check to see whether the policy was loaded under System > Servers > Alerts
C. check the policy and validate the date and time it was last updated
D. check to see whether the policy was loaded under System > Servers > Events
Q65. An administrator has received the system event: "Tablespace is almost full". How should the administrator resolve this issue?
A. restart the Oracle database services
B. create additional data files for the Oracle database
C. restart the Vontu services
D. purge incidents from the "\Vontu\Protecftincidents" folder
Q66. Which two are examples of confidential data? (Select two.)
A. manufacturing plant locations
B. historical press releases
C. customer first names
D. CAD drawings
E. employee health information
Certified oxford word list 101-200:
Q67. To manually troubleshoot DLP Agent issues, the database and log viewer tools must be executed in which location?
A. in the same location as the dcs.ead file location
B. in the same location as the cg.ead file location
C. in the same location as the ks.ead file location
D. in the same location as the is.ead file location
Q68. Which two database versions does Symantec Data Loss Prevention 11 support for incident and policy storage? (Select two.)
A. Oracle 10g version 10.2.0.4
B. IBM DB2 version 8.2
C. SQL Server 2008 R2 version 10.50.1753
D. Oracle 11g version 11.2
E. Oracle 9i version 18.104.22.168
Q69. Which two functions does Data Owner Exception provide? (Select two.)
A. allows data owners to send or receive their own data
B. prevents confidential data from being sent to the wrong recipient
C. allows individuals to send confidential data about a family member
D. allows individuals to send confidential data to any recipient
E. prevents individuals from sending confidential data to a group of recipients in the recipient list
Q70. Which two protocols are available by default and recognized by Network Monitor by their individual signatures? (Select two.)
C. IM: AIM
see more Administration of Symantec(TM) Data Loss Prevention 11