Certbus > Symantec > Symantec Certified Security program > ST0-237 > ST0-237 Online Practice Questions and Answers

ST0-237 Online Practice Questions and Answers

Questions 4

A policy template called Customer Credit Card Numbers is being imported into the system. What is the default result for this action?

A. the policy template will be listed under US Regulatory Enforcement Templates and be available

B. the policy template will be enabled by default

C. the policy template will be available after logging off and on to Enforce

D. the policy template will be listed under Imported Templates

Browse 237 Q&As
Questions 5

While performing a VxVM operation, you discover that the disk group configuration has become corrupt. You want to check the changes in the VxVM configuration data and automatically record any configuration changes that occur. What would you do in this situation?

A. Use the vxconfigd daemon to monitor changes to the VxVM configuration.

B. Use the vxrelocd daemon to monitor monitors changes to the VxVM configuration.

C. Use the vxconfigbackupd daemon to monitors changes to the VxVM configuration.

D. Use vxdctl daemon to monitors changes to the VxVM configuration.

Browse 237 Q&As
Questions 6

A DLP administrator has determined that a Network Discover server is unable to scan a remote file server. Which action should the administrator take to successfully scan the remote file server?

A. restart the discover scan

B. verify that the target file server is a Windows 2008 server

C. use the fully qualified name (FQDN) of the server

D. verify that the file server has .NET services running

Browse 237 Q&As
Questions 7

Which two options are available when selecting an incident for deletion? (Select two.)

A. Delete the incident completely

B. Delete the original message and retain the incident

C. Delete the incident and retain the original message

D. Delete the incident and export incident details to .CSV file

E. Delete all attachments or files and export incident to .XML file

Browse 237 Q&As
Questions 8

Which version of Oracle does Symantec Data Loss Prevention version 12.0 require for new installations or upgrading from 11.x to 12.0?

A. 10.2.0.1

B. 10.2.0.4

C. 11.2.0.2

D. 11.2.0.3

Browse 237 Q&As
Questions 9

While performing a disk group joins operation, you get an error "VxVM vxdg ERROR V-5-1-2866 object:

Record already exists in disk group." You want to resolve this error.

How should you resolve this error?

A. Change the object name in the disk group.

B. Change the object name to same as disk group.

C. Import a disk group and rename it.

D. Delete the disk group and recreate it with another name.

Browse 237 Q&As
Questions 10

Which command will you run to get the full path name of the file, if you only have the inode number?

A. vxfsstat

B. vxquot

C. vxquota

D. vxlsino

Browse 237 Q&As
Questions 11

Which two Symantec Control Compliance Suite 9.0 roles are valid for exception management? (Select two.)

A. Exception Administrator

B. Exception Approver

C. Exception Auditor

D. Exception Owner

E. Exception Requestor

Browse 237 Q&As
Questions 12

After installing several new DLP Agents, the Data Loss Prevention administrator discovers that none of the endpoint agents are appearing on the Agent Overview page. After refreshing the page several times, and determining that the equipment is powered on and connected to the network, the Agent Overview page still fails to display the new agents.

What is a possible cause for this issue?

A. The DLP Agents need to be added manually through the Symantec Management Platform.

B. The DLP Agents were installed with the incorrect Endpoint server IP address.

C. The assigned Endpoint server needs to be recycled in order to detect the new DLP Agents.

D. The Endpoint Location is set to "Manually" instead of "Automatically" in the Enforce user interface.

Browse 237 Q&As
Questions 13

On which protocols does Symantec Data Loss Prevention use port-based protocol recognition?

A. Secure tunnelling protocols

B. User-defined IP protocols

C. User-configured TCP protocols

D. System-defined UDP and TCP protocols

Browse 237 Q&As
Questions 14

Which step can be excluded from the install and configuration process for a valid Mobile Device Management solution that is used for Symantec Data Loss Prevention for Tablets?

A. configure VPN and SCEP profiles

B. target profiles and deliver them to the devices

C. configure the VPN profile for tamper-proofing

D. set up backup and load-balancing VPN connections

Browse 237 Q&As
Questions 15

Which profile contains information to enable the VPN on Demand functionality for the Data Loss Prevention for Tablets solution?

A. DLP Agent profile

B. SCEP profile

C. iOS profile

D. VPN client profile

Browse 237 Q&As
Questions 16

Which feature enables data extraction with incident data from the Enforce platform based on report ID?

A. Data Extraction API

B. CSV Export

C. Reporting API

D. Report Save As

Browse 237 Q&As
Questions 17

You execute the command ps ef | grep vxatd. What is the expected output of this command?

A. The command verifies the Fully Qualified Host Name.

B. The command verifies the status of Symantec Authentication service.

C. The command verifies the status of Root Broker.

D. The command verifies the status of Authentication Broker.

Browse 237 Q&As
Questions 18

Which three are available Export Formats for Symantec Control Compliance Suite 9.0 reports? (Select three.)

A. Comma Separated Values (CSV)

B. Adobe Reader (PDF)

C. Crystal Reports (RPT)

D. Rich Text

E. Microsoft Access (MDB)

Browse 237 Q&As
Exam Code: ST0-237
Exam Name: Symantec Data Loss Prevention 12 Technical Assessment
Last Update: May 01, 2024
Questions: 237 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99