10 tips on How to 250-511 Test Like a Badass [21 to 30]

★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 250-511 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/250-511-dumps.html


Printable of 250-511 practice exam materials and testing bible for Symantec certification for customers, Real Success Guaranteed with Updated 250-511 pdf dumps vce Materials. 100% PASS Administration of Symantec(TM) Data Loss Prevention 11 exam Today!

2016 May 250-511 Study Guide Questions:

Q21. How are agent log files retrieved and stored on the Enforce server?

A. Use the Pull Logs agent task on the Agent Overview page. The agent task automatically stores logs on the Enforce server.

B. Use the Log Collection tool to retrieve the agent's log files from the Endpoint server assigned to the agent. Collected logs are stored on the Enforce server.

C. Use the Log Collection tool to pull the logs directly from the agent. Collected logs are automatically stored on the Enforce server.

D. Use the Pull Logs agent task to retrieve the agent logs. Logs are copied to the Enforce server by using the Log Collection tool.

Answer: D


Q22. A divisional executive requests a report of all incidents generated by a particular region, summarized by department. What must be populated to generate this report?

A. remediation attributes

B. sender correlations

C. status groups

D. custom attributes

Answer: D


Q23. To manually troubleshoot DLP Agent issues, the database and log viewer tools must be executed in which location?

A. in the same location as the dcs.ead file location

B. in the same location as the cg.ead file location

C. in the same location as the ks.ead file location

D. in the same location as the is.ead file location

Answer: C


250-511 pdf exam

Rebirth 250-511 rapidshare:

Q24. A company has SMTP Prevent deployed with email blocking enabled in their confidential data policy. The finance department reports that emails containing sensitive data sent to external business partners are being blocked. The company maintains a list of the external business partner domains. How can a policy be modified so that emails are sent only to authorized recipients?

A. duplicate the confidential data policy, add a rule based on "Sender Matches Pattern", and add the email addresses of all employees in the finance department, select "All senders must match" for Match Counting

B. add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "All recipients must match" for Match Counting

C. create a new rule in the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting

D. add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting

Answer: B


Q25. Which two Symantec Data Loss Prevention components can be deployed in a hosted service provider? (Select two.)

A. Network Prevent (Email)

B. Network Discover

C. Network Prevent (Web)

D. Network Monitor

E. Network Protect

Answer: AC


Q26. Which report helps a compliance officer understand how the company is complying with its data security policies over time?

A. Policy Trend report, summarized by policy, then quarter

B. Policy Trend report, summarized by policy, then severity

C. Policy report, filtered on quarter, and summarized by policy

D. Policy report, filtered on date, and summarized by policy

Answer: A


250-511 free practice questions

Exact 250-511 guidance:

Q27. What is the correct sequence of steps in the Symantec Data Loss Prevention policy lifecycle?

A. design policy, test policy, deploy policy, identify threat, and tune policy

B. identify threat, build policy, deploy policy, test policy, and tune policy

C. design policy, deploy policy, identify threat, test policy, and tune policy

D. identify threat, design policy, build policy, test policy, tune policy, and deploy policy

Answer: D


Q28. How can an administrator validate that once a policy is updated and saved it has been enabled on a specific detection server?

A. check the status of the policy on the policy list page

B. check to see whether the policy was loaded under System > Servers > Alerts

C. check the policy and validate the date and time it was last updated

D. check to see whether the policy was loaded under System > Servers > Events

Answer: D


Q29. What can be used to identify a prioritized exposure score for file shares?

A. Target Trend Report

B. Folder Risk Report

C. Aging Unresolved Incidents Report

D. Executive Summary - Discovery Report

Answer: B


Q30. What are two available options when accessing the Configure Server page of a Network Monitor server to configure protocol filters? (Select two.)

A. HTTPS

B. FTP

C. SMTP

D. ICMP

E. UDP

Answer: BC



see more Administration of Symantec(TM) Data Loss Prevention 11