Administration of Symantec Data Loss Prevention 12 v6.0 (250-513)

Page:    1 / 20   
Total 300 questions

Refer to the exhibit.
An administrator needs to implement a Mobile Email Monitor solution to inspect corporate emails on mobile devices. Where should the administrator place the web proxy?

  • A. 1
  • B. 2
  • C. 3
  • D. 4


Answer : B

An administrator needs to deploy a Symantec Data Loss Prevention solution that will monitor network traffic. Which traffic type is excluded from inspection when using the default configuration?

  • A. HTTP-get
  • B. NNTP
  • C. FTP-put
  • D. HTTP-post


Answer : A

Which incidents appear in the Network Incident List report when the Network Prevent
Action filter is set to Modified?

  • A. incidents in which confidential content was removed from the body of an SMTP email
  • B. incidents in which an SMTP email was changed to include one or more SMTP headers
  • C. incidents in which digital rights were applied to SMTP email attachments containing confidential information
  • D. incidents in which confidential attachments were removed from an SMTP email


Answer : B

Which server encrypts the message when using a Modify SMTP Message response rule?

  • A. Encryption Gateway
  • B. SMTP Prevent server
  • C. Network Monitor server
  • D. Enforce server


Answer : C

You are responsible for administering the Storage Foundation for Sybase server. You want to remove a mounted volume. What should you do first to ensure you are able to remove the mounted volume?

  • A. Remove the snapshot from the associated volume.
  • B. Recursively remove all plexes and subdisks.
  • C. Disassociate the snapshot from the associated volume.
  • D. Unmount the file system.


Answer : B

You need to provide storage space for database application, including permanent data, temporary space, and activity log data. You need to ensure that the storage space that you provide offers data protection against disk failures. Which storage techniques will you use?
(Each correct answer presents part of the solution. Select two.)

  • A. Concatenated
  • B. RAID-0
  • C. RAID-1
  • D. RAID-5
  • E. RAID-1+0


Answer : C,D

An administrator implements a policy to block confidential data from being posted to
Facebook. The policy generates incidents but allows the content to be posted.
Which action should the administrator take to resolve this issue?

  • A. turn off Trial mode
  • B. turn on default settings
  • C. enable Get Processing
  • D. enable ICAP.Allowhosts


Answer : A

You are working on a Storage Foundation 5.0 server named Srv1 that has a disk group named vol1. You install another Storage Foundation 5.0 server named Srv2. You want to successfully move the disk group from Srv1 to Srv2. To initiate the movement, you stop all volumes in the disk group, and deport and move all disks to Srv2.
What should you do next?

  • A. Start the volumes in the disk group.
  • B. Format the disk group.
  • C. Recognize the disks using VxVM.
  • D. Create a new disk group.


Answer : C

A file system encounters an error during VxVM operations. The error "VxVM vxio
WARMINIG V-5-0-144 Double failure condition detected on RAID-5 volume" is displayed in the file system. How should you resolve this error?

  • A. By correcting the hardware failure and recovering the volume using the vxrecover command.
  • B. By checking the underlying hardware to recover the desired path.
  • C. By creating a new log plex and attaching it with the volume to restore RAID-5 logging to a RAID-5 volume.
  • D. By rebooting the computer.


Answer : A

While you are working on Storage Foundation for DB2, you want to convert the DB2 containers by executing the qio_convertdbfiles u command.
What will be the outcome of the command?

  • A. It converts regular files to Quick I/O files.
  • B. It changes the Quick I/O files back to regular files.
  • C. It reports the concurrent fragmentation levels for database files listed in the mkqui.dat file.
  • D. It reports the defragment level for the Quick I/O files.


Answer : B

You have collected performance data from an e-commerce Oracle database using the vxstat command. You are creating a similar e-commerce Oracle database to serve as a backend for an e-commerce website. You also want to ensure optimal Online Transaction
Processing (OLTP) throughput by balancing the I/O across as many disks as possible.
What should you do?

  • A. Create the database on a file system on a mirrored volume using all available disks.
  • B. Create the database on 2 separate file systems on a striped volume using all available disks.
  • C. Create the database on a file system on a striped volume using all available disks.
  • D. Create the database on a file system on a RAID-5 volume using all available disks.


Answer : C

A DLP administrator needs to have the Email Prevent Server return inspected emails to the same MTA from which it receives the message. In which mode should the Email Prevent server be configured?

  • A. forward
  • B. reflect
  • C. mirror
  • D. trial


Answer : B

You are writing the change documents for a procedure to relay a volume.
In which two cases is it necessary to specify a target plex for the "vxassist relayout" operation? (Each correct answer presents part of the solution. Select two.)

  • A. When a concatenated layout is being relaid to a mirror-stripe layout.
  • B. When the volume affected has plexes of differing layouts.
  • C. When a mirrored volume is being converted to RAID-5.
  • D. When a RAID-5 volume is being relaid as a mirrored volume.
  • E. When a volume with multiple mirrors is being relaid with only two plexes.


Answer : B,C

You need to increase the size of an existing volume to 10 gigabytes. You also want to exclude storages on the controller c1 from being allocated. To meet the required goal, you execute the following command, but when executed, the command fails. vxassist -g mydg1 growto vol1 10g \use_storage=noneof("Controller"="c1")
What could be the possible cause for the failure?

  • A. You cannot exclude the c1 controller.
  • B. The size specified is smaller than the current size of the volume.
  • C. The growto parameter needs to be replaced by growby parameter.
  • D. The growto parameter needs to be replaced by maxby parameter.


Answer : B

The VxVM operation fails while importing a disk group and you get an error message
"VxVM vxdg ERROR V-5-1-2907 diskgroup: Disk group does not exist"
How will you solve this problem?

  • A. Export a disk group from another host.
  • B. Export a disk group from the current host and import the disk group to another host.
  • C. If the disk group already exists on the exported host, import it to the current host.
  • D. Restore the configuration for the disk group from the backup.


Answer : C

Page:    1 / 20   
Total 300 questions