Which product can replace a confidential document residing on a public share with a
Marker File explaining why the document was removed?
Answer : B
Which script moves client software to a remote UNIX client from a UNIX master server?
Answer : B
A backup is configured with a 10 minute checkpoint interval. The third checkpoint interval expires in the middle of transferring the file images.zip. The backup fails 7 minutes later, after transferring images.zip and three additional files.
Where does the backup resume?
Answer : C
Which two are used to change the status of a disk pool? (Select two.)
Answer : B,E
Why should Network Monitor be configured to filter out low-threat traffic?
Answer : B
Which three are valid Scanned Content filter types for the Discover File System target?
(Select three.)
Answer : A,B,E
Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover apply filters to?
Answer : B
Where can an incident responder find the policy rules and/or exceptions that were in effect when a particular incident was detected?
Answer : D
Which detection method includes keyword rules?
Answer : C
A Symantec NetBackup 7.5 administrator needs to use client-side deduplication to reduce network traffic.
What is the minimum version level requirement for clients that deduplicate their own data?
Answer : D
Which type of rule do incident responders use to remediate an incident?
Answer : D
Which two statements accurately describe a user archive operation in Symantec
NetBackup 7.5? (Select two.)
Answer : D,E
An administrator needs to protect multiple clients that contain multiple data volumes to removable media.
Which policy setting in Symantec NetBackup 7.5 will perform the backup the fastest?
Answer : B
The configuration parameters MIN_GB_SIZE_PER_DUPLICATION_JOB and
IMAGE_EXTENDED_RETRY_PERIOD_IN_HOURS are part of the configuration for which feature?
Answer : C