What is the function of the Remote Indexer?
A. to create Exact Data Matching (EDM) profiles on a remote server
B. to create Index Document Matching (IDM) profiles and Exact Data Matching (EDM) profiles on a remote server
C. to create Index Document Matching (IDM) profiles on a remote server
D. to create policy templates on a remote server
正解:A
質問 2:
What are two valid CSV collector settings? (Select two.)
A. File(s) Path
B. Job Poll Interval
C. Command Threads
D. Hostname
E. Search Pattern
正解:A,E
質問 3:
What needs to be configured in order to collect common fields during a asset import using the default data collector?
A. a policy with associated assets
B. CSV data collector
C. ESM data collector
D. Automatic Entitlements Import job
正解:B
質問 4:
The business data owner is unavailable.
Who can approve the entitlements in his absence?
A. IT administrator
B. Any user with the approver role
C. Alternate data owner
D. Alternate approver
正解:D
質問 5:
Which three database maintenance tasks must be performed outside of Symantec Control Compliance Suite 9.0? (Select three.)
A. Purge evidence
B. Back up the databases
C. Purge stale data
D. Shrink the databases
E. Defragment the databases
正解:B,D,E
質問 6:
Which two functions of the communications architecture ensure that the system will automatically recover if a network connectivity failure occurs between the detection servers and the Enforce Server?
A. detection server autonomous monitoring
B. detection server alert archiving
C. detection server incident queuing
D. Enforce Server offline alert notification
E. Oracle database backup
正解:A,C
質問 7:
The Scheduled Reporting Database Synchronization job requires which component be installed?
A. Crystal Report 2008
B. Integration Services
C. SSL
D. ADAM
正解:B
質問 8:
When configuring DLP Agents, what does the File Recovery Area Location setting determine?
A. the secure filestore of incidents and data while agents are offline
B. the location of files for redeployment or upgrade of agents
C. the temporary backup location of blocked files
D. the location of files quarantined through Endpoint Discover scans
正解:C
質問 9:
A policy author is creating a policy using a Data Identifier (DI) and needs to add keywords to help eliminate false positives. The policy author needs to avoid duplicates with the Keyword validators included with the DI.
Where can the policy author find the list of validators?
A. User Interface - Manage > Response Rules
B. Symantec Data Loss Prevention Install Guide
C. User Interface - Edit Policy > Edit Rule > More Info
D. Symantec Data Loss Prevention Administration Guide
正解:C
Hagiwara -
250-512独学者はぜひ参考にしたい内容だなって実感しました。これ250-512一冊をしっかりやり込めば合格できると思います。しっかりしています。