Which two locations can Symantec DLP scan and perform Information Centric Encryption (ICE) actions on? (Choose two.)
Which detection method depends on `training sets`?
Which action should a DLP administrator take to secure communications between an on-premises Enforce server and detection servers hosted in the Cloud?
Which option correctly describes the two-tier installation type for Symantec DLP?
Which two detection technology options run on the DLP agent? (Choose two.)
How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a `copy to USB device` operation?