Passit4sure.250-513.300 Questions

Number : 250-513 Passing Score : 800 Time Limit : 120 min File Version : 5.0

http://www.gratisexam.com/

250-513

Administration of Symantec Data Loss Prevention 12

Added Explanations and Exhibits most of the questions.

Created Questions into Sections, now we can learn by Sections with this help.

I have changed answers of Q2, Q11, Q31, Q44, Q59 and Q87.

I have corrected few questions and now score will be 95% above Guaranteed.

Many new questions are added, Good for review go ahead and pass the exam now. Exam A

QUESTION 1 When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a Quick I/O file will return "Cannot open file ".

How should you resolve this error?

A. Ensure that the is ufs file system. B. Mount the file system without "nosuid" mount option. C. Unmount and mount the file system. D. Reconfigure the Quick I/O.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 2 You have installed Storage Foundation 5.0 Standard server with a number of hosts. You want to centrally monitor and manage the hosts. You also want to generate reports for the hosts and the storage resources that the hosts consume. What should you do?

A. Install the Veritas Quick I/O option on Storage Foundation 5.0 server. B. Install Veritas Storage Foundation Management Server on Storage Foundation 5.0 server. C. Install Veritas Storage Foundation Management Host on Storage Foundation 5.0 server. D. Upgrade Storage Foundation 5.0 Standard to Storage Foundation 5.0 Enterprise.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 3 After installing Veritas Volume Manager for your large number of volumes, you will configure the volumes as per your requirement. But you find the performance is very slow. You need to reconfigure the volumes to achieve significant improvement in performance when there are multiple I/O streams.

What should you do?

A. Use Mirroring B. Use Striping C. Use Mirroring and Striping D. Use RAID-5

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 4 You are auditing a current storage environment that is utilizing storage tiering. Based on the collected information from the audit, you want to define a policy to take into account that enterprise accounting, security, and regulatory compliance for specific set of files. Which policy factor should you use for the above scenario?

A. Availability B. Business considerations C. Expected access patterns D. Load Balancing

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 5 Which product can replace a confidential document residing on a share with a marker file explaining why the document was removed?

A. Network Discover B. Network Protect C. Mobile Prevent D. Endpoint Discover

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 6 Which command will you use to determine the operating mode of vxconfigd?

http://www.gratisexam.com/

A. vxdctl enable B. vxdctl mode C. vxmode D. ps ef |grep vxconfig

Correct Answer: B Section: (none) Explanation

Explanation/Reference: satisfy.

QUESTION 7 Which structures are parts of the Cross-platform Data Sharing (CDS) format?

A. An -reserved area B. A directory area C. A private region D. A public region E. A Bad Block Relocation Area

Correct Answer: ACD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 8 While replacing a disk containing a plex's subdisk, you discover that the contents of the plex are out-of- date with respect to the volume.

What will be the state of the plex?

A. CLEAN B. RECOVER C. DISABLED D. EMPTY

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 9 Which two components can perform a scan of a workstation? (Select two.)

A. Endpoint Server B. DLP Agent C. Network Prevent D. Enforce Server E. Discover Server

Correct Answer: BE Section: (none) Explanation

Explanation/Reference: well selected options.

QUESTION 10 You need to create a new mirrored-striped volume. You type the following command: vxassist -g diskgroup -P storagepool make strpvol 2g \ layout=mirror-stripe ncols=8 mirror=controller options

Which type of volume will be created?

A. A new 2GB mirrored-stripe volume with 8 columns that will have 2 mirrors on separate controllers. B. A new 2GB mirrored-stripe volume with 8 columns that will have all mirrors on separate controllers. C. A new 2GB mirrored-stripe volume with 8 columns that will have 2 mirrors on same controller. D. A new 2GB mirrored-stripe volume with 8 columns that will have mirrors on the same controller.

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 11 While accessing a node in the Dynamic Multipathing (DMP) database you get an error "VxVM vxdmp NOTICE V-5-0-111 disabled dmpnode dmpnode_device_number".

How will you resolve this error? (Each correct answer presents part of the solution. Select two.)

A. Enable the appropriate controllers to allow at least one path under this DMP node. B. Check the underlying hardware to recover the desired path. C. If possible correct the hardware failures Then, recover the volume using the vxrecover command. D. Replace the hardware because there may be a problem with host-bus adapter.

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 12 How many free partitions do you need to encapsulate a boot disk?

A. 1 B. 2 C. 3 D. 4

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 13 Which user store is essential for using the user risk summary feature?

A. Tomcat B. Active Directory C. MySQL D. Samba

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 14 You have planned to implement Storage Foundation Basic in pre-production environment. You identify a server that has the following configuration: Operating System: SUSE Enterprise Server 9 with SP3. Number of CPUs: 4. Memory: 1 Gigabyte. Disk SpacE. 40 GB with 25 GB free. When you begin the installation, it fails with an error.

What could be a probable cause? A. You have exceeded the maximum number of VxVM volumes. B. You need to upgrade the operating system to SUSE Linux Enterprise Server 10. C. You have exceeded the maximum CPUs in the server. D. You need to increase the memory in the system.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: right choice of answer.

QUESTION 15 When you are mounting a file system, which mode sets the policy for handling I/O errors on mounted file system?

A. disable B. ioerror C. cio D. minicache

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 16 In which two ways can the default listener port for a detection server be modified? (Select two.)

A. through the Enforce user interface under System > Overview B. by editing the Communication.properties file on a detection server C. through the Enforce user interface under Manage > Policies D. by editing the MonitorController.properties file on a detection server E. by editing the model.notification.port file on a detection server

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 17 While working under Veritas Volume Manager, you want to put a disk under the Veritas Volume Manager control. You execute the command vxdiskadd c0t1d0. What is the result of this command?

A. The command puts first disk under VxVM control on the first controller. B. The command initializes second disk on the first controller. C. The command encapsulates the second disk on the first controller. D. The command checks for the disks can be encapsulated.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 18 What is the correct traffic flow for the Symantec Data Loss Prevention for Mobile Prevent?

A. mobile device (iOS) > VPN > Mobile Prevent Server > Web proxy > Enforce Server > final destination B. mobile device (iOS) > VPN > Web proxy > Mobile Prevent Server > final destination C. mobile device (iOS) > VPN > Web proxy > Mobile Prevent Server > Enforce Server > final destination D. mobile device (iOS) > VPN > Mobile Prevent Server > Web proxy > final destination

Correct Answer: B Section: (none) Explanation

Explanation/Reference: appropriate answer.

QUESTION 19 You are administering the Storage Foundation 5.0 environment in your organization. There is one particular file system that continually shows a high level of fragmentation. What should you do to prevent fragmentation?

A. Use the df command regularly to monitor free space. B. Schedule regular defragmentation runs using the cron command. C. Set the initial_extent_size tunable VxFS I/O parameter. D. Allocate the space available in the file system that best fits the data.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 20 Which detection server requires two physical network interface cards?

A. Network Protect B. Network Discover C. Endpoint Discover D. Network Monitor

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 21 Which option describes the three-tier installation type for Symantec Data Loss Prevention?

A. Install the database, the Enforce Server, and a detection server all on the same computer. B. Install the Oracle database and the Enforce Server on the same computer, then install detection servers on separate computers. C. Install the Oracle Client (SQL*Plus and Database Utilities) on three detection servers. D. Install the Oracle database, the Enforce Server, and a detection server on separate computers.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: correct answer.

QUESTION 22 Which interface provides single sign-on access for the purpose of administering Data Loss Prevention servers, managing policies, and remediating incidents?

A. Symantec Information Manager B. Symantec Protection Center C. Symantec Data Insight D. Symantec Messaging Gateway

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 23 You want to shrink the volume named payvol to 20 MB and resize the VxFS file system automatically. The volume is in the disk group named hrdg. The volume must be resized on the defined disk group.

What should you do?

A. Use vxassist to shrink the volume first, and then shrink the file system. B. Use vxassist to shrink the file system first, and then shrink the volume. C. Use vxresize to shrink the file system first, and then shrink the volume. D. Use vxresize to resize the volume containing the filesystem.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 24 Identify the sequence in which VxVM performs a relayout on a "target" volume.

1. An extent of the target volume is restructured. 2. Data stored in an extent of the target volume is moved to the scratchpad volume. 3. A temporary subdisk is allocated to stage data in the volume undergoing relayout. 4. Data stored in the scratchpad volume is moved to an extent of the target volume.

A. 4,3,1,2 B. 3,2,1,4 C. 1,2,3,4 D. 2,4,1,3

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 25 Which two operating systems are supported for Symantec Data Loss Prevention 12 servers? (Select two.)

A. Windows 2003 Enterprise Edition 64-bit B. Red Hat Linux 5 Enterprise 64-bit C. Windows 2008 Server 32-bit D. Red Hat Linux 6 Enterprise 64-bit E. Windows 2008 R2 Enterprise Edition 64-bit

Correct Answer: BE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 26 You administer storage for an application "myapp" on server QA1, with a file system dedicated to code and configuration data for that myapp. Part of the testing discipline is to return myapp's file system to a known initial state prior to each test activity, and to run a series of tests beginning with the same initial state. The traditional approach to preparing for each test involves restoring the file system from a backup image prior to each test, which imposes an hour's delay between the end of one test run and the beginning of the next.

A typical testing session lasts only two to three hours, the hour of restore delay between tests reduces the availability of the server for testing by about 30%.

What kind of Storage Foundation mechanism would work best to reduce the delay required between tests?

A. Third-mirror breakoff snapshots are the best fit. B. Space-optimized instant snapshots are the best fit. C. File system snapshots are the best fit. D. Storage checkpoints are the best fit.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 27 Which is the correct installation sequence?

A. Enforce > Oracle > detection server > Solution pack B. Oracle > Enforce > Solution pack > detection server C. Oracle > Enforce > detection server > Solution pack D. Enforce > Oracle > Solution pack > detection server

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 28 What is the correct ratio between sub volumes and a volume that will be used as a disk drive?

A. 1:2 B. 2:1 C. 1:0 D. 1:1 E. 0:1

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 29 You are auditing a current storage environment that is not utilizing storage tiering. The information gained from the audit is to be used in a new storage tiering design that will have 4 tiers (Tiers 1-4). You need to determine the location for archive data which needs to be accessible but is not used heavily.

Where should you store this data?

A. Tier 1: High-end storage arrays with fast, reliable network connections. B. Tier 2: High-end arrays, but performance is not a priority. C. Tier 3: Mid-range to low-end storage arrays with fast, reliable network connections. D. Tier 4: low-cost media, such as tape, with little consideration given to performance.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 30 A company needs to secure the content of all Mergers and Acquisitions Agreements. However, the standard text included in all company literature needs to be excluded. How should the company ensure that this standard text is excluded from detection?

A. create a whitelisted.txt file after creating the Vector Machine Learning (VML) profile B. create a whitelisted.txt file before creating the Exact Data Matching (EDM) profile C. create a whitelisted.txt file after creating the Indexed Document Matching (IDM) profile D. create a whitelisted.txt file before creating the Indexed Document Matching (IDM) profile

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 31 You are using the Symantec Storage Foundation Web GUI to manage a tiered storage environment. The Storage Foundation Web GUI provides a mechanism that allows an improved level of data management over mechanisms.

What is this mechanism?

A. Hierarchical Storage Management B. Data management API C. Information Lifecycle Management D. File level data management

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 32 A policy template called Customer Credit Card Numbers is being imported into the system. What is the default result for this action?

A. the policy template will be listed under US Regulatory Enforcement Templates and be available B. the policy template will be enabled by default C. the policy template will be available after logging off and on to Enforce D. the policy template will be listed under Imported Templates

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 33 A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. Which underlying technology should the company use?

A. Vector Machine Learning (VML) B. Described Content Matching (DCM) C. Indexed Document Matching (IDM) D. Exact Data Matching (EDM)

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 34 An incident responder needs to change the status of an incident to 'Escalate and Notify'. Which two places in the user interface can this Smart Response rule be invoked? (Select two.)

A. Policy page B. Incident List C. Incident Snapshot D. Incident Summary E. Response Rules page

Correct Answer: BC Section: (none) Explanation

Explanation/Reference: appropriate selection.

QUESTION 35 Which action is available for use in Smart Response rules and Automated Response rules?

A. modify SMTP message B. block email message C. limit incident data retention D. post log to a syslog server

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 36 You are attempting to install Storage Foundation 5.0 on a server that has SUSE Linux Enterprise Server 9.0 installed on it. When you initiate the installation, it fails. You must ensure that installing Storage Foundation 5.0 has minimum impact on the server. What should you do to install Storage Foundation 5.0 on the server?

A. Change the operating system to Solaris 9. B. Change the operating system to Red Hat Fedora 4. C. Upgrade the existing operating system to SUSE Linux Enterprise Server 10.0. D. Upgrade the existing operating system with SP 3.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 37 Which response rule action will be ignored when using an Exact Data Matching (EDM) policy?

A. Network Prevent: Remove HTTP/HTTPS Content B. All: Send Email Notification C. Network Protect: Copy File D. Endpoint Prevent: Notify

Correct Answer: D Section: (none) Explanation

Explanation/Reference: correct answer.

QUESTION 38 Which automated response action can be performed for data loss incidents caused by confidential data found on Windows shares?

A. Block Message B. Quarantine File C. User Cancel D. Notify User

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 39 You have just started a relayout job on a large volume, and your work is interrupted by an unrelated server outage. Site policy requires that the relayout should be completed or rolled back within its scheduled window. You want to stop the relayout and roll back the incomplete changes so that the VxVM configuration is left stable till the relayout can be rescheduled. What would you do to perform this task?

A. You cannot undo a relayout operation until it completes. B. You can reverse the volume to its original layout by using "vxrelayout reverse" C. You can stop the process running the vxrelayout task; VxVM will automatically clean up after the relayout. D. You can stop the relayout job with vxtask abort, and then reverse the volume to its original layout by using vxrelayout.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: answer is right.

QUESTION 40 You administer storage for multiple hosts supporting a large OLTP application. Host Mkt operates both within the secure intranet, and host Store operates in a DMZ environment. Store stages detailed transaction logs on a volume named s_detail in a disk group named s_data. You need to deliver large batches of transaction data history from host Store to host Mkt for market analysis, and to receive the results of that analysis, as part of a weekly routine.

To deliver sales history to the marketing host, what sequence of actions must you carry out? Place the following actions in order.

1. Use vxdg to deport the snapshot volume's disk group from host Store. 2. Use vxdg to import the snapshot volume into host Mkt. 3. Use vxsnap to create a snapshot of s_detail on s_data. 4. Use the vxsnap command to enable FastResync on s_detail. 5. Use vxdg to split the snapshot volume away from s_data, into a separate disk group.

A. 4,2,5,3,1 B. 5,4,1,2,3 C. 4,5,2,1,3 D. 5,2,4,1,3

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 41 When deploying Network Monitor, an administrator needs to implement monitoring of port-based protocols. Which protocol is supported by Network Monitor?

A. secure tunneling B. IP C. TCP D. UDP

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 42 You want to install the Veritas Enterprise Administrator to manage the Veritas Storage Foundation 5.0 server installed. Before installing the Veritas Enterprise Administrator, you need to know the installation procedure. Given the following installation procedures:

1. Start the Veritas Enterprise Administrator Server on the system to be administered. 2. Start the Veritas Enterprise Administrator Client. 3. Install the Veritas Volume Manager on the system to be administered. 4. Install the Veritas Enterprise Administrator server and client on the system to be administered.

What is the correct order of steps that you need to follow?

A. 3,4,1,2 B. 3,2,1,4 C. 2,3,4,1 D. 2,1,4,3

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 43 Which two protocols are available by default and recognized by Network Monitor based on their individual signatures? (Select two.)

A. FTP B. HTTPS C. IM: AIM D. SNMP E. IM: Google Talk

Correct Answer: AC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 44 You are monitoring the storage environment in the Datacenter. You want to track changes to files and directories. These files and directories are used by backup utilities and replication programs. In which location will you find the log that tracks these changes to the files and directories?

A. /mount_point/ lost+found/vxfs/changelog B. /mount_point/ lost+found/vxvm/logs/changelog C. /mount_point/ lost+found/vxsf/logs/changlog D. /mount_point/lost+found/changelog

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 45 Refer to the exhibit.

An administrator needs to implement a Mobile Email Monitor solution to inspect corporate emails on mobile devices. Where should the administrator place the web proxy?

A. 1 B. 2 C. 3 D. 4

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 46 An administrator needs to deploy a Symantec Data Loss Prevention solution that will monitor network traffic. Which traffic type is excluded from inspection when using the default configuration?

A. HTTP-get B. NNTP C. FTP-put D. HTTP-post

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 47 Which incidents appear in the Network Incident List report when the Network Prevent Action filter is set to Modified?

A. incidents in which confidential content was removed from the body of an SMTP email B. incidents in which an SMTP email was changed to include one or more SMTP headers C. incidents in which digital rights were applied to SMTP email attachments containing confidential information D. incidents in which confidential attachments were removed from an SMTP email

Correct Answer: B Section: (none) Explanation

Explanation/Reference: nicely done.

QUESTION 48 Which server encrypts the message when using a Modify SMTP Message response rule?

A. Encryption Gateway B. SMTP Prevent server C. Network Monitor server D. Enforce server

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 49 You are responsible for administering the Storage Foundation for Sybase server. You want to remove a mounted volume. What should you do first to ensure you are able to remove the mounted volume?

A. Remove the snapshot from the associated volume. B. Recursively remove all plexes and subdisks. C. Disassociate the snapshot from the associated volume. D. Unmount the file system.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 50 You need to provide storage space for database application, including permanent data, temporary space, and activity log data. You need to ensure that the storage space that you provide offers data protection against disk failures. Which storage techniques will you use? (Each correct answer presents part of the solution. Select two.)

A. Concatenated B. RAID-0 C. RAID-1 D. RAID-5 E. RAID-1+0

Correct Answer: CD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 51 An administrator implements a policy to block confidential data from being posted to Facebook. The policy generates incidents but allows the content to be posted. Which action should the administrator take to resolve this issue?

A. turn off Trial mode B. turn on default settings C. enable Get Processing D. enable ICAP.Allowhosts

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 52 You are working on a Storage Foundation 5.0 server named Srv1 that has a disk group named vol1. You install another Storage Foundation 5.0 server named Srv2. You want to successfully move the disk group from Srv1 to Srv2. To initiate the movement, you stop all volumes in the disk group, and deport and move all disks to Srv2.

What should you do next?

A. Start the volumes in the disk group. B. Format the disk group. C. Recognize the disks using VxVM. D. Create a new disk group.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 53 A file system encounters an error during VxVM operations. The error "VxVM vxio WARMINIG V-5- 0-144 Double failure condition detected on RAID-5 volume" is displayed in the file system. How should you resolve this error?

A. By correcting the hardware failure and recovering the volume using the vxrecover command. B. By checking the underlying hardware to recover the desired path. C. By creating a new log plex and attaching it with the volume to restore RAID-5 logging to a RAID-5 volume. D. By rebooting the computer.

Correct Answer: A Section: (none) Explanation Explanation/Reference: fully agreed with the answer.

QUESTION 54 While you are working on Storage Foundation for DB2, you want to convert the DB2 containers by executing the qio_convertdbfiles u command. What will be the outcome of the command?

A. It converts regular files to Quick I/O files. B. It changes the Quick I/O files back to regular files. C. It reports the concurrent fragmentation levels for database files listed in the mkqui.dat file. D. It reports the defragment level for the Quick I/O files.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 55 You have collected performance data from an e-commerce Oracle database using the vxstat command. You are creating a similar e-commerce Oracle database to serve as a backend for an e-commerce website. You also want to ensure optimal Online Transaction Processing (OLTP) throughput by balancing the I/O across as many disks as possible. What should you do?

A. Create the database on a file system on a mirrored volume using all available disks. B. Create the database on 2 separate file systems on a striped volume using all available disks. C. Create the database on a file system on a striped volume using all available disks. D. Create the database on a file system on a RAID-5 volume using all available disks.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 56 A DLP administrator needs to have the Email Prevent Server return inspected emails to the same MTA from which it receives the message. In which mode should the Email Prevent server be configured?

http://www.gratisexam.com/

A. forward B. reflect C. mirror D. trial

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 57 You are writing the change documents for a procedure to relay a volume. In which two cases is it necessary to specify a target plex for the "vxassist relayout" operation? (Each correct answer presents part of the solution. Select two.)

A. When a concatenated layout is being relaid to a mirror-stripe layout. B. When the volume affected has plexes of differing layouts. C. When a mirrored volume is being converted to RAID-5. D. When a RAID-5 volume is being relaid as a mirrored volume. E. When a volume with multiple mirrors is being relaid with only two plexes.

Correct Answer: BC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 58 You need to increase the size of an existing volume to 10 gigabytes. You also want to exclude storages on the controller c1 from being allocated. To meet the required goal, you execute the following command, but when executed, the command fails. vxassist -g mydg1 growto vol1 10g \use_storage='noneof("Controller"="c1")'

What could be the possible cause for the failure?

A. You cannot exclude the c1 controller. B. The size specified is smaller than the current size of the volume. C. The growto parameter needs to be replaced by growby parameter. D. The growto parameter needs to be replaced by maxby parameter.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: updated answer.

QUESTION 59 The VxVM operation fails while importing a disk group and you get an error message "VxVM vxdg ERROR V-5-1-2907 diskgroup: Disk group does not exist"

How will you solve this problem?

A. Export a disk group from another host. B. Export a disk group from the current host and import the disk group to another host. C. If the disk group already exists on the exported host, import it to the current host. D. Restore the configuration for the disk group from the backup.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 60 Which valid automated response option should an administrator choose for Email Prevent?

A. modify the message subject or add specific RFC-2822 headers B. add metadata to email headers of confidential email C. modify the body of email messages containing confidential data D. process confidential email re-routed to a specified email list

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 61 When working on Storage Foundation 5.0 on HP-UX, you are unable to log in to Veritas Enterprise Administrator. You have converted shadow passwords with long passwords. After converting to shadow password with long password, the users are unable to log into Veritas Enterprise Administrator. You check and ensure that the users are part of the vrtsadm group. Error" V-39-53247-3 Error while connecting to Server. The user name or password is incorrect. Please retype your user name and password, and try connecting to the server again." You want to ensure all users who are part of the vrtsadm group are able to log on to the Veritas Enterprise Administrator.

What should you do?

A. Change the Shadow password. B. Apply appropriate patch to Veritas Enterprise Administrator. C. Retype the username and password. D. Restart the Volume Manager.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 62 How should an administrator apply a policy to Network Discover scans?

A. assign the policy group to the scan target B. choose the correct policy in the scan target C. assign the policy to the Network Discover Server D. choose the correct scan target in the policy destination

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 63 A DLP administrator needs to modify a Network Discover scan that has started.

How should the administrator ignore files larger than 20 MB for the remaining shares?

A. pause the scan, edit the scan target filters to ignore files greater than 20 MB, resume the scan B. modify the server settings for the Discover server running the scan, adjust the maxfilesize.level setting to greater than 20 MB, restart the Discover server C. stop the Vontu Monitor Controller Service, go to Manage > Discover Scanning > Discover Targets, set a new filter, restart the service D. create a new scan with updated file size filters and start the scan

Correct Answer: A Section: (none) Explanation

Explanation/Reference: satisfy.

QUESTION 64 Refer to the exhibit.

An administrator needs to implement the use of a scanner, but is unfamiliar with the general, high-level process associated with scanners. Which action occurs in step 3?

A. the scanner reviews and confirms configuration parameters B. the scanner connects to target and reads the content and metadata C. the scanner process is started by a user or scheduled event D. the scanner packages filtered content and posts the data to Discover server

Correct Answer: B Section: (none) Explanation

Explanation/Reference: happy with it.

QUESTION 65 A DLP administrator is attempting to use Encryption Insight to detect confidential information in encrypted files but has been unsuccessful. It is determined that the process was unable to retrieve the appropriate PGP key because the user key was using the incorrect encryption mode. What is the correct encryption mode that must be used by the user key?

A. Client Key Mode B. Server Key Mode C. Client Server Key Mode D. Guarded Key Mode

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 66 You are the administrator for the Veritas Volume Manger. You notice that the size of the disk group's configuration database in its private region is nearly full. You want to ensure that you do not loose any data from the disk group and are able to preserve the volume state. What should you do?

A. Try to grow the private region B. Spilt the disk groups C. Move the disk group D. Join the disk groups

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 67 You need to create a volume for the HR department. You need to mount a file system with a high demand for I/O throughput. You are aware that spanning the volume across multiple disks will increase the I/O performance. Which risk should you be aware of when spanning the volume across multiple disks?

A. Write throughput degradation B. Single disk failure causes volume failure C. Requirement for disk redundancy D. Poor I/O performance

Correct Answer: B Section: (none) Explanation

Explanation/Reference: valid answer.

QUESTION 68 While performing a VxVM operation, you discover that the disk group configuration has become corrupt. You want to check the changes in the VxVM configuration data and automatically record any configuration changes that occur. What would you do in this situation?

A. Use the vxconfigd daemon to monitor changes to the VxVM configuration. B. Use the vxrelocd daemon to monitor monitors changes to the VxVM configuration. C. Use the vxconfigbackupd daemon to monitors changes to the VxVM configuration. D. Use vxdctl daemon to monitors changes to the VxVM configuration.

Correct Answer: C Section: (none) Explanation Explanation/Reference: great.

QUESTION 69 A DLP administrator has determined that a Network Discover server is unable to scan a remote file server. Which action should the administrator take to successfully scan the remote file server?

A. restart the discover scan B. verify that the target file server is a Windows 2008 server C. use the fully qualified name (FQDN) of the server D. verify that the file server has .NET services running

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 70 An administrator is applying a newly created agent configuration to an Endpoint server. Upon inspection, the new configuration is unassigned in the Endpoint Server Details. What is a possible cause for the new configuration failing to be assigned?

A. the system default settings were saved to the new agent configuration B. the server that the new agent configuration was applied to needs to be recycled C. the new agent configuration was saved without applying it to the Endpoint server D. the new agent configuration was copied and modified from the default agent configuration

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 71 You are planning to install Storage Foundation 5.0 server. You need at least 70% percent of physical I/O operations to be read operations.

What type of volume should you choose to ensure that you have optimum performance improvement?

A. RAID-5 B. Mirrored C. Striped D. Concatenated-striped

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 72 An information security officer has detected an unauthorized tool on desktops being used to transmit data with encrypted communications.

Which Symantec Data Loss Prevention feature should the information security officer use to prevent this tool from accessing confidential data? A. removable storage monitoring B. network protocol monitoring C. application path filtering D. application monitoring

Correct Answer: D Section: (none) Explanation

Explanation/Reference: good answer.

QUESTION 73 ou have gathered file I/O performance data from an Oracle Enterprise database. The database is using one filesystem on a striped volume. You want to use the performance data to adjust the system configuration to ensure efficient use of system resources. Which specific activity should you should perform to adjust the system configuration?

A. All I/O activity B. File I/O activity C. Volume I/O activity D. Raw disk I/O activity

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 74 A DLP administrator is writing one policy to block sensitive data from being copied to removable media. The administrator is applying two response rules to the policy: 'Endpoint Prevent: Notify' and 'Endpoint Prevent: Block'.

Why are some copies blocked while others are only notified?

A. there are different conditions for the different response actions B. the monitor and ignore filters are defined incorrectly C. the DLP administrator needs to fine tune the throttling options D. the Directory Group Matching (DGM) profile has users in different groups

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 75 You are creating a volume and need the storage allocated in:

1. Concatenated disks 2. Form columns 3. Form mirrors You want to specify the space allocation across multiple volumes. What should you do?

A. Use the b storage attribute in the vxassist command. B. Use -g diskgroup storage attribute in the vxassist command. C. Use the -o ordered storage attribute in the vxassist command. D. Use -P storagepool storage attribute in the vxassist command.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 76 An incident response team has determined that multiple incidents are resulting from the same user action of copying sensitive data to USB devices.

Which action should the incident response team take to fix this issue so only one incident per action is detected?

A. create separate policies for the different detection methods B. combine multiple conditions into one compound rule C. change which 'Endpoint Destinations' are monitored D. change the monitor/ignore filters in the agent configuration

Correct Answer: B Section: (none) Explanation

Explanation/Reference: correct answer.

QUESTION 77 You need to create a traditional third-mirror breakoff snapshot in disk group "testdg" on a volume named "testvol". You've used the vxassist command to start the creation of the snapshot, synchronizing in the background.

How do you determine whether the snapshot is ready?

A. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "ACTIVE". B. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT". C. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPDONE". D. Use "vxprint -g testdg testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 78 Which option should be used to optimize the performance of a network share Discover scan?

A. ensure that the target file system is defragmented regularly B. use an incremental scan to only include previously unscanned items C. configure credential prefetching to reduce delay in authentication D. disable antivirus scanning for network shares on the detection server Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

Topic 2, Volume B

QUESTION 79 You are responsible for managing Veritas Enterprise Administrator. You are in the process of creating a new disk group. You first initialize an unitialized disk and then create a new disk group using the disk you initialized. You want to ensure that this disk is mounted when you boot the system.

What should you do next?

A. Mount the volume B. Create a new volume on the disk C. Add the disk to the disk group D. Verify the disk name in the Object Tree

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 80 What is the most efficient method for designing filters to remove unwanted traffic?

A. policy-based exceptions B. IP-based filtering per protocol C. L7 filtering per protocol D. sampling per protocol

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 81 An administrator running a company's first Discover scan needs to minimize network load. The duration of the scan is unimportant. Which method should the administrator use to run the Discover scan?

A. ignore smaller than B. ignore larger than C. throttling D. date last accessed

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 82 You have just installed Storage Foundation 5.0 with Veritas Volume Manager and . You want to ensure that you are able to successfully install Veritas FlashSnap Agent for Symmetrix 5.0 on Storage Foundation server.

What should you do to ensure you meet the required goal?

A. Install Veritas Volume Replicator. B. Install Veritas Cluster File System. C. Install . D. Install Veritas Quick I/O.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 83 A network administrator needs to be notified if someone attempts to tamper with or shut down the VPN connection on an iPad or iPhone. Which product should the administrator use to configure the notification alert?

A. Mobile Email Monitor B. Mobile Device Management C. Network Prevent D. Mobile Prevent

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 84 You are auditing a current storage environment that is utilizing storage tiering. You will use the information gained from the audit in setting up policies for this tiered storage environment. When assigning the policy, you want to take into account applications that run concurrently that compete for I/O resources when data is placed on separate storage devices with separate access paths. Which policy factor should you use for the above scenario?

A. Availability B. Business considerations C. Expected access patterns D. Load Balancing

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 85 Which command attempts to find the name of the drive in the private region and to match it to a disk media record that is missing a disk access record?

A. vxdisk B. vxdctl C. vxreattach D. vxrecover

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 86 You have created a set of volumes within a disk group. What is the size of a volume that displays a length of 20480 in a vxprint output, on a Solaris system?

A. 10 megabytes B. 15 megabytes C. 20 megabytes D. 25 megabytes

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 87 You are responsible for managing two Storage Foundation 5.0 servers, Srv1 and Srv2. You want to permanently move a disk group from Srv1 to Srv2. However, the Srv2 already has a disk group with the same name. You need to move the disk group without making modifications to the data on the disks. You also need to ensure that the disk group import is permanent on Srv2. What should you do?

A. Unmirror and unencapsulate the disk group. B. Import the disk group and rename it on Srv2. C. Import the disk group on Srv2 as is. D. Rename the disk group during deport operation.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 88 What is the correct configuration for BoxMonitor.Channels that will allow the server to start as a Network Monitor server?

A. Packet Capture, Span Port B. Packet Capture, Network Monitor C. Packet Capture, Network Tap D. Packet Capture, Copy Rule

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 89 Refer to the exhibit.

An administrator is testing the DLP installation by placing .EML files into the drop folder, but has been unsuccessful in generating any incidents. The administrator is checking the Advanced Server Settings page to see if it can help diagnose the issue. What could be causing this problem?

A. BoxMonitor.IncidentWriter setting needs to be set to Test B. BoxMonitor.FileReader needs to be set to default C. BoxMonitor.IncidentWriterMemory is set too high D. BoxMonitor.Channels contains an incompatible entry

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 90 You are administering a Storage Foundation 5.0 server. You need to create a new mirrored-striped volume using the command line. What should you do?

A. Mirror several concatenated plexes. B. Stripe several underlying mirror volumes. C. Concatenate several underlying mirror volumes. D. Mirror several striped data plexes.

Correct Answer: D Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 91 An administrator needs to remove an agent and its associated events from a specific Endpoint Server. Which Agent Task does the administrator need to perform to disable its visibility in the Enforce UI?

A. delete action from the Agent Summary page B. disable action from Symantec Management Console C. change Endpoint Server action from the Agent Overview page D. delete action from the Agent Health dashboard

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 92 Which two are the advantages of the Logical PITCs?

A. The PITC is available for use instantaneously. B. Potentially less storage space is required. C. The PITC is dependent on the original. D. The PITC is an actual physical copy of the data. E. The PITC requires the same amount of storage space as the original.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: answer is right.

QUESTION 93 You have installed site awareness licenses on all hosts in the remote mirror configuration. You want the volume to be automatically mirrored across sites when it is created and you specify the allsites=on attribute with the vxassist command.

Which read policy do you need to set to accomplish this task?

A. Siteread policy B. Round robin policy C. Prefer policy D. Select policy

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 94 You are administering the Volume Manager in Cluster environment in the datacenter showing a type of write failure on a slave node. You are not able to view the write failure occurred to other nodes in the cluster.

What will be the cluster behavior under the local disk detach policy? (Each correct answer presents part of the solution.) (Select two.)

A. I/O is stopped for the node that first saw the failure. B. Application using the volume is also notified about the failure. C. Cluster Management software moves the application to a live node. D. Slave node continues to perform I/O operation from and to the volume.

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 95 An administrator pulls the Services and Operation logs off of a DLP Agent by using the Pull Logs action. What happens to the log files after the administrator performs the Pull Logs action?

A. they are stored directly on the Enforce server B. they are transferred directly to the Enforce Server and deleted from the DLP Agent C. they are created on the DLP Agent then pulled down to the Enforce server D. they are temporarily stored on the DLP Agent's Endpoint server

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 96 You are administering the Veritas Volume Manager. While working on the Veritas Volume Manager, you execute the vxprint hvt command. What will be the outcome of the command?

A. Command will list the stopped volume and its plexes information. B. Command will list the free Plexes information. C. Command will display the general information for all sub disks. D. Command will display the volume information.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 97 A company needs to disable USB devices on computers that are generating a number of recurring DLP incidents. It decides to implement Endpoint Lockdown using Endpoint Prevent, which integrates with Symantec Endpoint Protection Manager and Symantec Management Platform. After incidents are still detected from several agents, the company determines that a component is missing.

Which component needs to be added to disable the USB devices once incidents are detected?

A. Control Compliance Suite B. Workflow Solution C. pcAnywhere D. Risk Automation Suite Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 98 You have installed the Storage Foundation for Sybase. You want to temporarily suspend all write operations to all databases. What should you do?

A. Use the Quick I/O feature. B. Use the Concurrent I/O feature. C. Use the Quiesce feature. D. Use the Cached Quick I/O feature.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 99 A compliance officer needs to understand how the company is complying with its data security policies over time. Which report should the compliance officer generate to obtain the compliance information?

A. Policy Trend report, summarized by policy, then quarter B. Policy Trend report, summarized by policy, then severity C. Policy report, filtered on quarter, and summarized by policy D. Policy report, filtered on date, and summarized by policy

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 100 You have installed all the features for Storage Foundation for DB2. On the VxFS file system, you execute a command /opt/VRTS/bin/qiomkfile -s 500m /db01/dbfile. What will be the outcome of this command?

A. The command will resize a Quick I/O file to 500 MB. B. The command will terminate without providing any result. C. The command will create a concurrent I/O capable file. D. The command will create a 500 MB Quick I/O capable file.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 101 A divisional executive requests a report of all incidents generated by a particular region, summarized by department. What must be populated to generate this report? A. remediation attributes B. sender correlations C. status groups D. custom attributes

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 102 In the administration of a large storage environment, you learn that files not only have differing usages at the times they are created, but that many type of files have individual life cycles. User files do not have a defined lifecycle. You want DST capabilities to manage these files. How does DST help address this issue?

A. DST does not have a mechanism designed to address this issue. B. You can use DST to dynamically relocate files to reduce costs. C. You can use DST to archives files to another file server. D. You can use DST to remove unused files from the file system and speed access to remaining files.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: correct answer.

QUESTION 103 A divisional executive requests a report of all incidents generated by a particular region and summarized by department. Which incident information must be populated to generate this report?

A. remediation attributes B. custom attributes C. sender correlations D. status groups

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 104 While working with Veritas Storage Foundation for Oracle, you execute the command set #vxtunefs -s -o qui_cache_enable=1 /db01.

What will be the output of this command?

A. It will make the Cached Quick I/O system setting persistent across reboots. B. It will enable the Cached Quick I/O. C. It will determine the current caching state of the file system. D. It will create the Cached Quick I/O.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 105 What should an incident responder select to remediate multiple incidents simultaneously?

A. Smart Response on the Incident Snapshot page B. Automated Response on an Incident List report C. Smart Response on an Incident List report D. Automated Response on the Incident Snapshot page

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 106 You are assessing a volume configuration in an attempt to improve its performance. You notice that the redo logs are on VxVM RAID-5 volume with user tablespaces and data files. You want to ensure that redo logs are stored as the best practices and guidelines.

What should you do?

A. Do nothing because this is the optimal volume layout for redo logs. B. Convert the RAID-5 layout to a striped and mirrored volume. C. Put the redo logs on a separate file system from the user tablespaces and datafiles created on a striped and mirrored volume. D. Put the redo logs on a separate RAID-5 volume from the user tablespaces and datafiles.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 107 You are managing Storage Foundation 5.0 server in your organization. When working on Veritas Enterprise Administrator Server, you are prompted with an error message "VxVM Provider initialization warninG. vxinstall has not been run." What should you do to resolve this problem?

A. Install Volume Manager. B. Configure Volume Manager and Initialize. C. Restart the Veritas Enterprise Administrator. D. Reconfigure Veritas Enterprise Administrator.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 108 Which two options are available when selecting an incident for deletion? (Select two.)

http://www.gratisexam.com/

A. delete the incident completely B. delete the original message and retain the incident C. delete the incident and retain the original message D. delete the incident and export incident details to .CSV file E. delete all attachments or files and export incident to .XML file

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 109 A DLP administrator is creating a role that contains an incident access condition that restricts users from viewing specific incidents.

Which two conditions can the administrator specify when creating the incident access condition in a role? (Select two.)

A. file type B. custom attribute C. recipient D. file size E. policy group

Correct Answer: BE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 110 An Oracle Enterprise database is having I/O performance issues. You need to determine the exact location of a data block on a disk that is a hot spot slowing down I/O performance. Which feature of Storage Foundation 5.0 for Oracle will you use to perform this task?

A. Veritas Extension for Oracle Disk Manager B. Veritas Storage Checkpoint feature C. Veritas Database FlashSnap feature D. Veritas Storage Mapping feature

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 111 An incident responder is viewing a discover incident snapshot and needs to determine which information to provide to the next level responder. Which information would be most useful in assisting the next level responder with data clean-up?

A. Incident Details: Message Body content B. Custom Attributes: Most Active User from Data Insight C. Incident Details: File Owner metadata D. Access Information: File Permissions

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 112 What is the most efficient policy so that incidents are generated only when a specific user under investigation sends encrypted files?

A. a policy that has one condition B. a policy that has one exception C. a policy that has two conditions D. a policy that has two exceptions

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 113 While administrating the Veritas Volume Manager for Veritas Storage Foundation, you have accidentally destroyed the disk group. You now need to recover the destroyed disk group. You are sure that disk group have not been modified or reused before recovering the disk group. What step do you need to perform to recover the destroyed disk groups?

A. Use the vxdg import command to import the disk group with the disk group id. B. Use vxdarestore command to restore the disk group. C. Use vxrecover disk group command to recover the disk group. D. Use vxconfigrstore to recover the disk group.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: answer is up to date.

QUESTION 114 Which two locations can the administrator verify a newly created policy was loaded on a detection server? (Select two.)

A. System > Servers > Overview B. System > Servers > Server Detail C. Manage > Policies > Policy List D. System > Servers > Overview > Configure Server E. System > Servers > Events Correct Answer: BE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 115 While working on the Storage Foundation 5.0 server, you execute the following commanD. fsckptadm n create sat_8pm /mnt0

What is the expected outcome of this command?

A. This command will create a nodata storage checkpoint. B. This command will create a removable storage checkpoint. C. This command will convert the storage checkpoint to the nodata storage checkpoint. D. This command will create a storage checkpoint, but not the nodata storage checkpoint.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 116 You have large number of mirrored volumes, and the resynchronization process on mirrored volumes will take lot of time. You want to address enable Dirty Region Logging (DRL) and find out the cause why it takes a long time for resynchronization. You want to check the status of DRL logging to see if it is already enabled.

How will you accomplish this task?

A. Use the vxprint command with the F%drllogging $DCOVOL option B. Use the vxprint command with the F%drllogging $DRLVOL option C. Use the vxprint command with the F%dcologging $DCOVOL option D. Use the vxprint command with the F%drllogging $$DCONAME option

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 117 How should an administrator export all policies from a test environment to a production environment?

A. choose the option to 'export all' on the Manage > Policies > Policies List page B. export one policy template at a time C. navigate to System > Settings > Export and select 'All' D. locate the 'policy' folder under 'SymantecDLP' and copy all of the .XML files

Correct Answer: B Section: (none) Explanation

Explanation/Reference: right. QUESTION 118 You are working on Veritas Storage Foundation for Oracle RAC and want to create a disk group on the shared disks. You execute the command vxdctl -c mode on a node. What will be the output of this command?

A. The command will display whether the node is a master or slave. B. The command will change the node from master to slave. C. The command will change the node from slave to master. D. The command will create a disk group on the shared disk.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 119 Refer to the exhibit.

Symantec Data Loss Prevention's four phases of risk reduction model provides a blueprint for identifying and remediating key risk areas without disrupting legitimate business activity. According to this model, which activity should occur during the baseline phase?

A. monitor incidents and tune the policy to reduce false positives B. define and build the incident response team C. establish business metrics and begin sending reports to business unit stakeholders D. test policies to ensure that blocking actions minimize business process disruptions

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 120 The chief information security officer (CISO) is responsible for overall risk reduction and develops high-level initiatives to respond to security risk trends. Which report will be useful to the CISO?

A. all high severity incidents that have occurred during the last week B. all dismissed incidents violating a specific policy marked as false positive C. all incidents from the previous month summarized by business units and policy D. all new incidents that have been generated by a specific business unit during the last week

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 121 Refer to the exhibit. Symantec Data Loss Prevention's four phases of risk reduction model provides a blueprint for identifying and remediating key risk areas without disrupting legitimate business activity. What occurs during the notification phase?

A. Notification helps define confidential information and assign appropriate levels of protection to it using classifications. B. On-Screen Pop-ups compare existing company information protection polices to best practices. C. Notification helps develop a plan for integrating appropriate data security practices. D. Automated sender notification educates employees in real-time about company policy violations.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 122 You place six physical disks under Volume Manager control to create 10GB of volume. You want to use this volume as an archive directory. You need to create a volume that will store three copies of the archived data. Which command will you use to create a volume with three plexes?

A. vxassist make archivevol 30g layout=stripe-mirror nmirror=3 B. vxassist make archivevol 30g layout=stripe-mirror ncolumn=3 C. vxassist make archivevol 10g layout=stripe-mirror nmirror=3 D. vxassist make archivevol 10g layout=stripe-mirror ncolumn=3

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 123 A system administrator has a large amount of data that is not being accessed on the company's storage devices. This excess amount of data is causing slow access to the active data. You want to set up automatic relocation of data so that data expires as per its defined age.

What should you do?

A. Use the Data Movement Service (DMS) to set the threshold for automatic relocation of data. B. Use the Quality of Storage Service (QoSS) to set the threshold for automatic relocation of data. C. Use the Virtual Data Aging Service (VDAS) to set the threshold automatic relocation of data. D. Use the Intelligent Volume Service (IVS) to set the threshold for automatic relocation of data.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 124 You are the administrator for the Veritas Storage Foundation. Using Veritas Volume Manager, you want to migrate an internal boot disk to a SAN boot disk. Given the following steps: 1. Add the target SAN disk to the boot disk group. 2. Create a mirror of the root disk on the target disk. 3. Verify that the Hardware Compatibility List for the target SAN disk being supported for SAN booting. 4. Boot from the mirror disk to verify that the system is bootable.

What are the sequential steps you need to follow to accomplish this?

A. 4,1,2,3 B. 3,1,4,2 C. 4,2,1,3 D. 2,3,1,4

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 125 Which structure records are stored in the private region?(Each correct answer presents part of the solution. Select three.)

A. Disk group configuration B. Disk and disk group ID C. File system metadata D. Disk group kernel log E. Partition tables Correct Answer: ABD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 126 How should an administrator determine which Database version is running?

A. run the command select database version from database; B. right click on database folder and select version C. run the command select * from v$version; D. look in add/remove programs for the database program

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 127 Which version of Oracle does Symantec Data Loss Prevention version 12.0 require for new installations or upgrading from 11.x to 12.0?

A. 10.2.0.1 B. 10.2.0.4 C. 11.2.0.2 D. 11.2.0.3

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 128 You are required to change a volume named vol1 in disk group mydg1 from a RAID-5 volume layout to a mirror-stripe (RAID 0+1) volume layout. You want to follow the correct procedure to change the volume layout. Which sequence of commands would you follow to achieve this goal?

A. vxassist -g mydg1 relayout vol1 layout=stripe-mirror vxassist -g mydg1 convert vol1 layout=mirror- stripe B. vxassist -g mydg1 relayout vol1 layout=mirror-stripe C. vxassist -g mydg1 convert vol1 layout=stripe-mirror vxassist -g mydg1 relayout vol1 layout=mirror- stripe D. vxassist -g mydg1 convert vol1 layout=mirror-stripe

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 129 While deporting a disk group under the VxVM control, the disk group fails. What could be the possible reason for the disk group failure?

A. An access to the disk group is disabled. B. The disk group contains volumes that are in use. C. The file system is unmounted. D. The database is unmounted.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 130 A user is unable to log in as sysadmin. The Data Loss Prevention system is configured to use Active Directory authentication. The user is a member of two roles: sysadmin and remediator. How should the user log in to the user interface in the sysadmin role?

A. sysadmin\username@domain B. sysadmin\username C. domain\username D. username\sysadmin

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 131 When attempting to log in as administrator to the UI, the administrator receives a login error:

Invalid Username/Password or Disabled Account

The DBA verifies the account is enabled. The information provided for the environment only includes the DLP protect database username and password as well as a username and password called Sys Admin \Admin.

How should the administrator change the built-in 'Administrator' password?

A. log in to the Enforce UI as the Sys Admin account and go to System > Login Management > DLP Users and reset the administrator password B. extract the administrator password from the DatabasePassword.properties file C. update the PasswordEnforcement.properties file with a new administrator password D. use the AdminPasswordReset utility to update the password

Correct Answer: D Section: (none) Explanation

Explanation/Reference: good tricky question and answer.

QUESTION 132 Consider a situation where you run the vxdmpadm start restore command and encounter an error message "VxVM vxdmpadm ERROR V-5-1-3243 The VxVM restore daemon is already running"

How will you solve this error?

A. Stop vxdmpadm and restart vxdmpadm. B. Stop vxdmpadm and start vxdarestore. C. Stop vxdmpadm and reboot the system. D. Restart the all the VxVM daemons.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 133 When you attempt to start the RAID-5 volume, you are prompted with an error message "VxVM ERROR V- 5-1-1237 Volume r5vol is not startable; some subdisks are unusable and the parity is stale." You want to remove this error and start the RAID-5 volume. How will you ensure that you do not encounter this error again?

A. Use a single RAID-5 log plex in RAID-5 volumes. B. Change the subdisks. C. Use two or more RAID-5 log plexes in RAID-5 volumes. D. Reattach the subdisks.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 134 While troubleshooting the Storage Foundation 5.0 environment in your organization, you discover that a disk group is disabled. You need to run the vxconfigrestore command to restore the disk group.

In this situation, which switch will you use to perform a precommit analysis of the state of the disk group configuration?

A. Use the l switch B. Use the -d switch C. Use the -c switch D. Use the -p switch

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 135 An administrator is attempting to add a new detection server to the Enforce UI. However, the administrator only has the ability to add Network Monitor and Endpoint servers. The option to add a Discover server is missing. What does the administrator need to do to add an additional server type?

A. log in as Sys Admin/Server Administrator role B. update the software license file C. restart the Vontu Monitor service D. restart Vontu Monitor Controller service

Correct Answer: B Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 136 You have designed a tiered storage environment using ISP volumes. You have also created the disk group that will be used to hold the tiered volumes. You now want to apply the appropriate tags to the disks. What should you do?

A. Use the vxdiskadm settag command with the cost option to apply appropriate tags to the disks. B. Use the vxdisk settag command with the cost option to apply appropriate tags to the disks. C. Use the vxpool settag command with the cost option to apply appropriate tags to the disks. D. Use the vxtemplate settag command with the cost option to apply appropriate tags to the disks.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 137 A DLP administrator needs to decide if using Symantec Management Console (SMC) will provide additional functionality over the built-in Agent Actions that can be performed via Agents > Overview > Summary Reports.

What are two of the Agent Actions that can be performed with SMC that are unable to be used with the built-in Agent Actions? (Select two.)

A. Set Under Investigation B. Get Agent Configuration C. Toggle Print Screen D. Set Log Level E. Gather Endpoint detection server logs

Correct Answer: BC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 138 You need to create a storage checkpoint that contains file system metadata and data blocks. You want to ensure that the storage checkpoint that you create can be mounted, accessed, and written in Veritas File System. The storage checkpoint that you create must represent an image of the active file system.

Which type of storage checkpoint should you create to meet this goal?

A. Create removable storage checkpoint. B. Create non-mountable storage checkpoint. C. Create data storage checkpoint. D. Create nodata storage checkpoint.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: well answer. QUESTION 139 You are administering the Storage Foundation 5.0 environment in your organization. Some of the volumes are showing sluggish performance. Tuning the file change using vxtunefs can correct the problem.

What are File Change Log tunable parameters for vxtunefs? (Each correct answer presents part of the solution.)(Select two.)

A. fcl_keeptime B. fcl_minalloc C. fcl_winterval D. set E. clear

Correct Answer: AC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 140 You have to recommend appropriate virtual storage configurations for use by specific classes of applications, based on the details of each application's I/O requirements.

Your application generates large volumes of temporary data. The RAID configuration for temporary space should aim to maximize I/O throughput. You also need to ensure that there is no unnecessary space overhead. Which RAID layout should you use?

A. RAID-0 B. RAID-1 C. RAID-1+0 D. RAID-5

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 141 You are planning a relayout for a 10GB RAID-5 volume with a RAID-5 log to a stripe-mirror configuration. Dirty-region logging is indicated by the volume's size.

How would your plan to address the logs?

A. Remove the RAID-5 log and create a DRL prior to the relayout operation. B. The RAID-5 log should be removed prior to the relayout and after the relayout completes, the DRL should be created separately. C. Relayout will remove log plexes from the volume, but the DRL must be created after relayout is complete. D. Use the "convertlogs" option of vxassist to cause the relayout job to convert the log plexes.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 142 Ten test agents are being deployed that use an uninstall password required to uninstall the DLP Agent. The agents deploy and install correctly. Upon testing to remove the Agent, the uninstall password fails to work. The deployment team used 'Symantec' for the UninstallPasswordKey. Why does the uninstall fail when using the same password?

A. uninstall passwords are restricted from containing the word 'Symantec' B. the UninstallPwdKeyGenerator must be used to create an UninstallPasswordKey C. the PGPsdk.dll file was missing when the key was created D. the uninstall agent password needs to match the uninstall password key

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 143 An administrator is attempting to uninstall a version 11.6 DLP Agent, but the uninstall password fails to remove the agent. The group who set the initial password is unavailable. Which two options are available to address the password issue? (Select two.)

A. manually uninstall the agent by stopping the EDPA and WDP services, then remove all related program files B. upgrade the agent to version 12 with a newly generated UninstallPasswordKey C. reboot and login to Safe Mode and use Add / Remove Programs to uninstall the Agent D. contact Symantec Support to obtain the Clean Agent tool E. use Regedit.exe and delete the related Endpoint registry entries

Correct Answer: BD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 144 A Network Monitor server has been installed and the networking components configured accordingly. The server is receiving traffic, but fails to detect incidents. Running Wireshark indicates that the desired traffic is reaching the detection server. What is the most likely cause for this behavior?

A. The mirrored port is sending corrupted packets. B. The wrong interface is selected in the configuration. C. The configuration is set to process GET requests. D. The communication to the database server is interrupted.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 145 You have a customer who has set up a 5 GB full-size instant snapshot volume on one of his file servers. The data replicated into the snapshot is a combination of code and content elements, which serves as a rapid recovery mechanism in case of a corruption in a new build installed on the server. The customer tells you that the snapshot is working correctly, but that the time it takes to refresh the snapshot is unusually longer than expected. The customer is expecting you to resolve this problem.

How should you resolve this problem?

A. Recreate the snapshot as a space-optimized instant snapshot B. Use "vxsnap prepare" on the source volume, then remove and recreate the snapshot C. Use vxassist addlog logtype=dco to enable FastResync on the volume D. Recreate the snapshot as a traditional third-mirror break-off snapshot

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 146 A DLP administrator is testing Web Prevent functionality. When the administrator posts a small test file to a cloud storage website, a new incident fails to appear. What should the administrator do to allow incidents to be generated against this file?

A. uncheck trial mode under the ICAP tab B. change the 'Ignore Requests Smaller Than' value to 1 C. add the filename to the Inspect Content Type field D. change the PacketCapture.DISCARD_HTTP_GET value to 'false'

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 147 A DLP administrator needs to inspect HTTP traffic using a Network Monitor, including data pushed up to the web and data pulled down from the web. Which configuration changes should the administrator make under the advanced server settings to include all cases?

A. L7.processGets=false, PacketCapture.DISCARD_HTTP_GET=true, L7.minSizeofGetURL=1000 B. L7.processGets=true, PacketCapture.DISCARD_HTTP_GET=true, L7.minSizeofGetURL=100 C. L7.processGets=false, PacketCapture.DISCARD_HTTP_GET=false, L7.minSizeofGetURL=10 D. L7.processGets=true, PacketCapture.DISCARD_HTTP_GET=false, L7.minSizeofGetURL=10

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 148 When the system is configured to boot a volume from the root system, you get an error "VxVM vxconfigd ERROR V-5-1-1049 System boot disk does not have a valid rootvol plex".

How will you resolve this error?

A. Reboot the system. B. Stop and restart the vxconfigd daemon on the node indicated. C. Try to boot from one of the named disks using the associated boot command that is listed in the message. D. Check other error messages appearing on the console and take the actions suggested in the descriptions of those messages.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 149 An administrator receives the following error:

Error Code:3018 lt;profile name> has reached maximum size. Only 44245 out of 97737 documents are indexed.

What must the administrator do to resolve this error?

A. increase the advanced server setting Lexer.MaximumNumberOfTokens to 90k B. reindex the current IDM to refresh the .IDX files C. split the IDM into multiple indexes when the index is too large D. increase the advanced server setting FileReader.MaxFileSize to 300M

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 150 In System Overview, the status of a detection server is shown as 'unknown'. Examination of the detection server reveals all Vontu services are running. Which port is blocked and causing the server to be in the 'unknown' state?

A. 443 B. 8000 C. 8100 D. 8300

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 151 The DLP services on an Endpoint Server keep stopping. The only events displayed in the Enforce UI are that the server processes have stopped. What is the first step the administrator should take to keep the services on the Endpoint server running?

A. perform a complete uninstall and reinstall of the Product B. install malware detection software on the server C. remove the Endpoint server from the UI and add it again D. exclude the DLP directories from any scheduled or real-time virus scanning

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 152 You are administering Veritas Volume Manager on the UNIX platform, and you need to remove the volume using vxassist command. Given the following steps:

1. Remove the volume entry from the /etc/vfstab file. 2. Remove all references to the volume by application programs. 3. Stop all Activity by VxVM on the volume using vxvol stop command. 4. Unmount the volume, which is mounted as a file system.

What are the necessary sequential steps you need to follow before removing the volume?

A. 4,2,1,3 B. 3,1,4,2 C. 1,4,3,2 D. 2,4,3,1

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 153 You administer the Storage Foundation 5.0 environment in your organization. A particular file system displays some odd I/O characteristics. Before you proceed, you decide to take a look at the current I/O parameters. Which command will you use to print the current values of the I/O parameters?

A. tunefstab B. read_pref_io C. vxtunefs D. vol_maxio

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 154 What is the minimum percentage of spare disks in a disk group?

A. 10% B. 15% C. 20% D. 25%

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 155 You are the administrator of Veritas Volume Manager in Veritas Storage Foundation environment. You want to remove a disk from a disk group. You execute the command vxdg -g dg01rmdisk d001. After executing the command, you are prompted with the error "VxVM vxdg ERROR V-5-552 disk diskname is used by one or more subdisks." You want to ensure you are able to remove the disk from the disk group.

What should you do?

A. Use -n option with vxdg command B. Use -t option with vxdg command C. Use -o option with vxdg command D. Use -k option with vxdg command

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 156 You have a Storage Foundation 5.0 server named SrvA connected to SrvB, which is a cloned server of SrvA. SrvA is able to recognize the quick I/O (QIO) files. However, SrvB is unable to recognize the quick I/O files. You have ensured that the file systems are the same on both the servers. You want to ensure SrvB is able to recognize the quick I/O files. What should you do? (Select two. Each correct answer presents part of the solution.)

A. Check the file system on both the servers. B. Restart the Oracle instance to recognize the Quick I/O file. C. Enable the Quick I/O on SrvB. D. Enable the Quick I/O on SrvA. E. Apply a new license for the cloned server, SrvB.

Correct Answer: CE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 157 An administrator is checking System Overview and all of the detection servers are showing as 'unknown'. The Vontu services are up and running on the detection servers. Thousands of .IDC files are building up in the Incidents directory on the detection servers. There is good network connectivity between the detection servers and the Enforce server when testing with the telnet command. How can the administrator bring the detection servers to a running state in the Enforce UI?

A. delete all of the .BAD files in the incidents folder on the Enforce server B. restart the Vontu Monitor Service on all of the detection servers affected C. ensure the Vontu Monitor Controller service is running on the Enforce server D. ensure port 8300 is configured as open on the firewall

Correct Answer: C Section: (none) Explanation

Explanation/Reference: i am satisfy with the answer. QUESTION 158 Where in the Enforce UI can the administrator find the option to participate in the Supportability Telemetry Program?

A. System > System Reports B. System > Incident Data C. System > Servers D. System > Settings

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 159 You are managing a Storage Foundation 5.0 server that has Storage Foundation Management Server (SFMS) software installed. You force a placement policy to a file system using the Storage Foundation Management Server (SFMS). What is the outcome when a policy is forced to a file system?

A. The current policies of the file system are overwritten by the SFMS policies. B. The file system will retain its policies and discard the SFMS policies. C. The file system will incorporate the changes of both the policies. D. The file system will apply the SFMS policies only in the case where its own policies cannot be assigned.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 160 Which is a limitation of using CDS disk layout under VxVM 4.0 or above?

A. The CDS format cannot contain a private region and a public region on a single partition. B. The CDS format cannot be used with hardware RAID controllers. C. The CDS format cannot be used in conjunction with OS-level partitioning. D. The CDS format cannot be used for boot disks.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 161 Which two Diagnostic Logging Settings can be configured under the Systems > Servers > Logs - Configuration tab in the Enforce UI? (Select two.)

A. Discover Trace Logging B. Packet Capture Debug Logging C. Endpoint Debug Logging D. Described Content Matching Incident Logging E. Aggregator Debug Logging Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 162 You are responsible for managing and monitoring the Storage Foundation 5.0 environment in your organization. You notice that VxFS is not performing at an optimal level. You decide to run the fsadm utility. How will the fsadm utility help you resolve this problem?

http://www.gratisexam.com/

A. Defragment VxFS. B. Check and repair VxFS. C. Remount VxFS and administer it for changes. D. Administer VxFS File Change Logs.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 163 After installing the Volume Manager, you need to configure the Volume manager for large number of servers. You also need to consider the capacity and performance in installed environment. You want to optimize the performance of mirrored volumes by applying default Volume Manager policy. Which policy will you apply to get performance of mirrored volumes?

A. Apply the prefer policy B. Apply the select policy C. Apply the round robin policy D. Apply the siteread policy

Correct Answer: B Section: (none) Explanation

Explanation/Reference: answer is right.

QUESTION 164 Which two products are leveraged for Network Prevent integration? (Select two.)

A. Mail Transfer Agent B. Network Tap C. Proxy Server D. Span Port E. Load Balancer

Correct Answer: AC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 165 Which server target uses the 'Automated Incident Remediation Tracking' feature?

A. Lotus Notes B. File System C. SharePoint D. Exchange

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 166 As the storage administrator for a large multifaceted environment, you are faced with the challenge to support the growth of the environment's capacity and to manage the budget for that growth. The company's management requires you to limit the growth of expenses, even at the cost of using slower storage configurations. On the other hand, the application administrators demand maximum performance. How can you resolve this conflict?

A. You can use DST to accelerate access to specific volumes. B. You must manually assign files to specific volumes at run time. C. You can use DST to retrieve inactive data from volume snapshots. D. You can use DST to distribute files to appropriately-configured storage within the storage allocated to a DST file system.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 167 You are managing a Storage Foundation 5.0 using Storage Foundation Management Server on Solaris 10. You need to manage hosts with different domain names from the Storage Foundation Management Server. What should you do?

A. Modify the hosts file in the /etc directory. B. Modify the resolv.conf in the /etc directory. C. Modify the nsswitch.conf in the /etc directory. D. Modify the system in the /etc directory.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 168 While monitoring the Storage Foundation 5.0 environment in your organization, you get a kernel message specifying a disk failure.

In which order would you perform the actions below to resolve this error?

1. Confirm that the problem is caused by a disk failure. 2. Unmount the file system and use fsck to run a full structural check. 3. Check the console log for I/O erros. 4. Replace the disk before the file system is mounted for write access.

A. 1,3,4,2 B. 2,4,1,3 C. 1,4,3,2 D. 2,1,4,3

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 169 When you are working on Veritas Storage Foundation for Oracle, the vxdbd daemon reports an error: "VXDBA_PRODUCT exec_remote ERROR V-81-7700 Can not connect to the vxdbd". You must resolve this error with minimum administrative effort. What should you do? (Each correct answer presents part of the solution. Select two.)

A. Define a HOME directory for the vxdbd daemon. B. Restart the vxdbd daemon. C. Change the port of VXDBD_SOCKET and restart the vxdbd daemon. D. Restart the Veritas Storage Foundation for Oracle server.

Correct Answer: BC Section: (none) Explanation

Explanation/Reference: properly answered.

QUESTION 170 What is a collection of VxVM disks that share a common configuration and are used to hold the data for a specific application or set of applications?

A. Plex B. Volume C. Disk Group D. Subdisk

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 171 When working on Storage Foundation 5.0 from Storage Foundation Management Server 1.0, you get an error "Could not connect to central server. Central server may not be running." Given the following steps:

1. Start Veritas Private Branch Exchange. 2. Stop the Management server Web applications. 3. Start the Database and Domain Controller. 4. Stop all agents and the Database. 5. Start the Management Server Web Applications. 6. Start VxPAL Agents.

Identify the correct sequence of steps to solve the problem?

A. 3,1,4,2,6,5 B. 4,2,5,3,2,6 C. 3,4,6,2,1,5 D. 5,4,1,2,6,3

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 172 You want to use the VxSE rule to detect whether a physical disk has too many RAID-5 logs. Before you execute the VxSE rule, you want to acquire complete information about the rule. How would you search for the VxSE rule that informs you whether a physical disk has too many RAID-5 logs on it?

A. Use the vxse "list" command. B. Look in the rules directory, run each rule with the "info" operator, and choose the rule you want. C. Use the vxse_inventory command. D. Look in the rules directory, run each rule with the "check" operator, and choose the rule you want based on its output.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 173 After you install Veritas Enterprise Administrator to manage Storage Foundation 5.0, you attempt to start the Veritas Enterprise Administrator, but are prompted with an error "Veritas VM Storage Administrator Server Terminated. Stopping Veritas VM Storage Administrator Server ### Terminated."

How do you solve this problem?

A. Enable the VMSA auto-start mode and restart. B. Restart Veritas Enterprise Administrator. C. Restart the Volume Manager Storage administrator (VMSA) Server. D. Disable the VMSA auto-start mode and restart.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 174 While working under VxVM control, you execute a command:vxassist g hrdg mirror payvol hrdg03

What will be the expected result of this command? A. This command will mirror the user volumes to the destination disk. B. This command will not execute. C. This command will list the disk under disk group hrdg. D. This command will mirror the volume payvol from the disk group hrdg, using the disk hrdg03.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 175 You have a Storage Foundation 5.0 server with a number of mirrored volumes. You need to appropriately utilize the free space on the mirrored volumes. What should you do?

A. Mirror several concatenated plexes B. Concatenate and stripe several underlying mirror volumes C. Concatenate several underlying mirror volumes D. Mirror several striped plexes

Correct Answer: C Section: (none) Explanation

Explanation/Reference: genuine answer.

QUESTION 176 Which command will you use to display all the disk groups that are currently imported on the system?

A. vxdg import B. vdisk dglist C. vxvm dg list D. vxdg list

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 177 You are working with the Storage Foundation Intelligent Storage Provisioning feature, to create a new mirrored volume. To prevent system failure, you want to ensure that you are able to perform a recovery of mirrored volumes in minimum response time. What should you do?

A. Create a Dirty Region Log. B. Create a Data Change Map log. C. Create a RAID-5 log. D. Create a Snap object log.

Correct Answer: A Section: (none) Explanation Explanation/Reference: Explanation:

QUESTION 178 You're the administrator of a production database environment, including a large transaction processing complex, a large decision support system, and smaller systems dedicated to supporting functions, such as backups. Uptime is critical, and the DBA for the environment has found the mechanisms at his disposal for sharing data among the environment's functions cumbersome.

How can Storage Foundation's point-in-time copy capabilities help manage the environment more effectively? (Select two)

A. You can use PITCs to transfer daily transaction data between systems. B. You can use PITCs to propagate physical database objects between the OLTP system and decision support systems. C. You can use PITCs to summarize information accumulated by the OLTP system. D. You can use PITCs to capture instant backup images. E. You can use PITCs to enable real-time access to OLTP data by the decision support system.

Correct Answer: BD Section: (none) Explanation

Explanation/Reference: Explanation:

Topic 3, Volume C

QUESTION 179 You are monitoring a file system on a Solaris operating system using Veritas Volume Manager when the following kernel message appears: WARNING. msgcnt x: mesg 069: V-2-69: memory usage specified by the vxfs:vxfs_ninode and vxfs:vx_bc_bufhwm parameters exceeds available memory; the system may hang under heavy load. You need to resolve this error. What should you do?

A. Increase the value of one or both parameters to 100% of physical memory or to 100% of kernel virtual memory B. Remove either the physical memory parameter or the kernel virtual memory parameter. C. Leave the parameters at current levels and disregard the system message because it is a false message. D. Reduce the value of one or both parameters to less than 50% of physical memory or to 66% of kernel virtual memory

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 180 You have a nonredundant concatenated volume named datavol in a disk group named datadg. The volume has a file system on it. One of the underlying disks of the volume called datadg02 fails temporarily due to a power failure. You fix the problem of the power failure, and ensure that the disk is powered back again. You ensure that both the system and VxVM can see the disk again. Then, you reattach the disk back to the disk media record. Which command will you execute next to be able to run fsck on the file system?

A. vxvol g datadg start datavol B. vxrecover s datavol C. vxrecover -ns D. vxvol g datadg f start datavol

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 181 A DLP administrator needs to configure an Automated Response rule that can execute while end-users are off the corporate network. Which response rule condition will enable the administrator to accomplish this task?

A. Endpoint Location B. Endpoint Device C. Protocol or Endpoint Destination D. Sender/User Matches Pattern

Correct Answer: A Section: (none) Explanation

Explanation/Reference: good answer.

QUESTION 182 You have already removed a mirror from volume using vxassist command. After removing a mirror you will be left with only one mirror. However, you need to have at least two mirrors on a volume. What should you do to resolve this situation?

A. Change the rule to allow the mirror to be removed B. Use the b option with the vxassist command C. The rule will not allow you to complete this operation. D. Use the f option with the vxdg command

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 183 A DLP administrator needs to forward data loss incidents to the company's Security Information and Event Management (SIEM) system. Which response rule action provides the administrator with the ability to accomplish this task?

A. All: Send Email Notification B. All: Log to a Syslog Server C. All: Add Note D. All: Set Attribute

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 184 You are using Veritas Enterprise Administrator (VEA) to create a volume set. You need to have e is a pre- requisite in place before you can create the new volume set. What should you do?

A. Ensure that you have minimum 256 volumes to be configured in a volume set. B. Ensure that the new volume is a /ext file system. C. Ensure that the volume set is a raw I/O. D. Ensure that you have at least one volume created.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 185 You have installed Storage Foundation 5.0 on the Unix platform and need to add licenses. You want to ensure that the licenses are correctly installed on the system. What should you do?

A. Add the valistat package. B. Add the VRTSvlic package. C. Add the vxlicrep package. D. Add the VRTSspt package.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 186 You are managing a Storage Foundation 5.0 server and want to capture an image of a file system at a selected instant for use in applications. Which feature will you use to capture the image?

A. Veritas FlashSnap Point-in-Time copy B. Veritas Volume Replicator C. Configure the Veritas Storage Checkpoint option D. Configure the Veritas Quick I/O option

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 187 Which traffic type is excluded from analysis when an administrator uses Network Monitor?

A. Skype B. Yahoo! Instant Messenger C. NNTP D. Telnet Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 188 You execute the vxtrace command without any option to collect I/O trace data on all virtual disk drives during peak I/O operations. When you start to analyze the data, you notice that vxtrace displays a record indicating records are lost. You want to reduce the likelihood of the kernel discarding records so that you don't have to rerun vxtrace to capture the records.

What should you do?

A. Print vxtrace event records to a file B. Increase the kernel buffer C. Wait until I/O operations have decreased D. Increase the kernel buffer using the o option

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 189 Refer to the exhibit.

A DLP administrator is planning the deployment of the Symantec Data Loss Prevention with Mobile Email Monitor. Where should the administrator place the Mobile Email Monitor? A. 1 B. 2 C. 3 D. 4

Correct Answer: C Section: (none) Explanation

Explanation/Reference: appropriate sort of answer.

QUESTION 190 Which two fallback options are available for a 'Network Prevent: Remove HTTP/HTTPS' content response rule when a web-based message contains confidential data? (Select two.)

A. redirect the content to an alternative destination B. block the content from being posted C. encrypt the content before posting D. remove the content through FlexResponse E. allow the content to be posted

Correct Answer: BE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 191 You are implementing a tiered storage environment. You are ready to build the first tier. What is the process you need to follow? (Arrange the following answers in the correct order)

1. Implement storage tiering policies 2. Classify the types of storage in the environment 3. Add the volumes to a volume set 4. Tag the volumes you want to place in this tier

A. 4,3,2,1 B. 1,3,2,4 C. 1,2,4,3 D. 4,1,3,2

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 192 A network architect needs to install Symantec Data Loss Prevention detection servers in a hosted environment.

Which action should the network architect take to ensure secured communication between the detection server and the Enforce server?

A. use the sslkeytool utility to create multiple unique certificates for each detection server B. generate a certificate directly on each detection server C. use the built-in Symantec Data Loss Prevention certificate for the hosted server D. generate identical certificates for on-premise servers and identical certificates for hosted servers

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 193 You want to preserve data on existing slices on the disk and want to put this disk under Volume Manager control without loosing any data. How will you preserve the data?

A. By encapsulating the disk B. By initializing C. By saving the data on the disk D. By exporting data to another disk

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 194 You are managing Veritas Storage Foundation for Oracle. You need to pre-allocate space for a database file named db_data. To do this, you first create a db_data file on a mounted point. Next, you execute the command setext r size f noreserve -f chgsize \ .filename with respective attributes. What should you do next?

A. Access the VxFS mount point. B. Change the owner and group permissions on the database file. C. Create a symbolic link between the database application and the database file using Quick I/O interface. D. Change the login to superuser.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 195 Which function does the Email Prevent server provide when integrating into an existing email environment?

A. inspects, stores, and blocks confidential emails as a Mail Transfer Agent (MTA) B. integrates with a Mail Transfer Agent (MTA) to inspect SMTP email messages C. maintains each inbound SMTP message transaction until the outbound is inspected D. processes and inspects outbound SMTP messages until the email transaction has been closed

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 196 You are installing the Storage Foundation Management Server 1.0 in Storage Foundation 5.0 Environment. What resource you require before installing?

A. Type of File System B. Fully Qualified Host Name of the system C. IP address of the host D. Authentication Broker and Management Server not set to same UC/UTC

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 197 After installing Veritas Enterprise Administrator, you start the VEA with the profile name that you have specified. When you click the Console View, what does it display? (Select two.)

A. Active Events B. Volume Summary C. Alerts D. Disk History

Correct Answer: AC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 198 There are four volumes that are striped across five disks. One of the disks fails. From how many volumes will you restore the data?

A. One volume B. Two volumes C. Three volumes D. Four volumes

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 199 You work in a Server Operations Center (SOC), and you are required to track the status of the VxVM tasks in progress on a UNIX server. Another member of the administration team is scheduled to execute VxVM changes; you are also responsible for tracking the progress of those changes. In addition, you are required to escalate any issues with the change to the team member. How would you execute this task?

A. By using vxtask monitor to track active VxVM tasks B. By using OS-level process monitoring tools, such as top or prstat C. By using vxassist monitor to track active VxVM tasks D. By using vxtask status to track active VxVM tasks

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 200 Which two pieces of system information are collected by Symantec Data Loss Prevention Supportability Telemetry? (Select two.)

A. currently installed version of the Enforce Server B. number of policies currently deployed C. cumulative statistics regarding network traffic D. file types for which there are incidents E. number of system alerts generated daily

Correct Answer: AD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 201 You have designed a tiered storage environment using ISP volumes, created the disk group that will be used to hold the tiered volumes, and created the storage pool in the disk group. You are now ready to install the template definition file in the ISP configuration database that you have created. What should you do next?

A. Use the vxtemplate command to install your template definition file in the ISP configuration database. B. Use the vxdisk command to install your template definition file in the ISP configuration database. C. Use the vxassist command to install your template definition file in the ISP configuration database. D. Use the vxvset command to install your template definition file in the ISP configuration database.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 202 How would you define a template that is used in Intelligent Storage Provisioning (ISP)?

A. It is a collection of rules that specify the performance and reliability characteristics for volumes. B. It creates volumes from available storage with the required capabilities that you specify. C. It is a set of storage pool definitions for a data pool and its clone pools that define how storage is organized within the disk group. D. It is a storage pool that contains snapshots of your primary data.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: proper answer.

QUESTION 203 Which RAID-levels are the parts of Data Redundancy layout? (Each correct answer presents part of the solution. Select three.) A. RAID-1 B. RAID-5 C. RAID-0+1 D. RAID-0 E. RAID-1+0

Correct Answer: ABC Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 204 You're the administrator of a large storage environment. The environment includes DBMS systems that use VxFS-based data files, performance-critical application files, and archives of historical user data.

You have made a recommendation to adopt the Dynamic Storage Tiering (DST) capability, and you've been asked to summarize the differences between DST and standard volumes and file systems. What are the components of DST that distinguish it from standard mechanisms? (Select two)

A. Among the distinctive mechanisms underlying DST is the volume set. B. Among the distinctive mechanisms underlying DST are specialized volume types. C. Among the distinctive mechanisms underlying DST are command scripts. D. Among the distinctive mechanisms underlying DST are policies governing the mapping of files to storage mechanisms. E. Among the distinctive mechanisms underlying DST are volume snapshots.

Correct Answer: AD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 205 You are auditing a current storage environment that is not utilizing storage tiering. The information gained from the audit is to be used in a new storage tiering design that will have 4 tiers, Tiers 1-4. You need to determine the location for data that is not directly related to an enterprise's business, but nevertheless must be retained. Where should you store this data?

A. Tier 1: High-end storage arrays with fast, reliable network connections. B. Tier 2: High-end arrays, but performance is not a priority. C. Tier 3: Mid-range to low-end storage arrays with fast, reliable network connections. D. Tier 4: low-cost media, such as tape, with little consideration given to performance.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 206 Which rule will you use to discover disabled controllers failures in the Storage Foundation 5.0 environment?

A. vxse_host B. vxse_disk C. vxse_disklog D. vxse_dc_failures

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 207 While encapsulating a disk, you discover that a volume is removed as a part of the existing configuration. You want to restore the data on the disk as it was before removal of the disk. As the first step, you recreate the volume using the vxdg make command. What should you do next?

A. Replace the disk B. Restore the plexes on the volume C. Restore the data on the volume D. Start the hot-relocation process

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 208 While performing a disk group joins operation, you get an error "VxVM vxdg ERROR V-5-1-2866 object: Record already exists in disk group." You want to resolve this error. How should you resolve this error?

A. Change the object name in the disk group. B. Change the object name to same as disk group. C. Import a disk group and rename it. D. Delete the disk group and recreate it with another name.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 209 When you are administrating Veritas Volume Manager on the Solaris platform, you want to remove a disk using vxdiskunsetup command from the Veritas Volume Manager without erasing the VxVM metadata on the disk.

What is the necessary step you need to do before running the command in the scenario and to prevent a data loss?

A. Data on the disk should be evacuated from the disk. B. You need to encapsulate the disk. C. Disable a disk group before you remove a disk. D. Move data using Veritas Volume Manager.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 210 You are performing a move operation under VxVM control. You cannot find the disk involved in a disk group. In addition, you get the following error message:

"VxVM vxconfigd ERROR V-5-1-4551 dg_move_recover: can't locate disk(s), giving up"

How should you resolve this error?

A. Use vxdisk command to import a disk group. B. Use vxdg command to clean the disk group to be imported. C. Use vxassist command to clean the disk group to be imported. D. Use vxconfigd command to import a disk group.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: satisfied with the answer

QUESTION 211 On your Storage Foundation 5.0 server, a mirror volume is no longer needed. You need to disassociate and remove a mirror named, vol01-02 from the disk group so that you can free up disk space. How will you accomplish this?

A. Use the vxassist command with the remove mirror option. B. Use the vxedit command with the rm vol01-02 option. C. Use the vxplex command with the rm dis vol01-02 option. D. Use the vxplex command with the dis vol01-02 option.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 212 How would you define virtual storage?

A. Virtual storage is a method of accessing data attached to another host. B. Virtual storage is a method of increasing disk I/O bandwidth. C. Virtual storage is the practice of accessing storage systems by means of an opaque software façade. D. Virtual storage is the practice of storing data on large storage arrays.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 213 You want to allow non-layered volume to change to layered stripe-mirror volume while remaining online. What is the correct procedure to perform this conversion? A. Convert the volume, stop the volume, remount the file system, and start the volume. B. Unmount the file system, stop the volume, convert the volume, start the volume, and remount the file system. C. Resync the volume, convert the volume, and mirror the volume. D. Stop the volume and then convert the volume.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 214 While working under VxVM control, you discover that the vxplex command has failed because a previously attached plex did not complete. You get the following error messagE. "VxVM vxplex ERROR V-5-1-809 Plex plex1 in volume volume1 is locked by another utility." You must resolve this error with minimum administrative effort. How should you resolve this error?

A. Detach the plex and reattach B. Reboot the system C. Clear the fields for the volume and its components D. Reattempt to execute the vxplex command

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 215 The vxprint command output for volume vol07 indicates that it has three plexes. How will you determine which plexes are used for data?

A. Note the lengths. Data plexes are all the same length. B. Note the STATE field. Non-data plexes will be indicated by the valuE. LOG. C. Note the STATE field. Data plexes will be indicated by the valuE. MIRROR. D. Note the RECORD TYPE field. Data plexes are designated with PL.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 216 You are monitoring I/O on a volume that is under Veritas Volume Manager control using the vxstat command. You need to measure the impact of a specific write operation on a volume. You want to ensure you are successfully able to measure the impact. What should you do?

http://www.gratisexam.com/

A. Reset the statistics information to zero just prior to the specific write operation B. Reset the statistics information to zero just after the specific write operation C. Reset the statistics information to zero during the specific write operation D. Reset the statistics to measure the impact of all write operation, not a specific write operation

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 217 You are working on Storage foundation for DB2. You create a file system and you want to mount the file system to enable a Quick I/O. However, you are not able to mount the file system. What could be a probable cause? (Each correct answer presents part of the solution. Select two.)

A. The mount point path is not an absolute path name. B. You are not logged in as a root user. C. The file system is read-only. D. The Quick I/O is not licensed.

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: good choice of answer.

QUESTION 218 You have just performed maintenance operation on a system where VxVM is installed. When you start the system you realize that some disks have entered the FAILED state. After the inspection of the system, you discover that a cable is unplugged. You reconnect the cable. However, after reconnecting the cable, you need to move these disks out of the FAILED state.

How should you resolve this error?

A. Use the /usr/sbin/vxdctl enable command B. Use the /etc/vx/bin/vxreattach command C. Use the vxmend g command with the fix clean plex option D. Use the vxvol g command with the start volume option

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 219 You want to remove the disk named datadg01 from the disk group named datadg. You also want to remove the public and private regions from the disk. However, you want to retain the data stored on the disk. Which commands will you use to achieve this?

A. vxdiskunsetup vxdg rmdisk vxevac B. vxdg rmdisk vxevac vxdiskunsetup C. vxremove vxdg evac vxdisk rmdisk D. vxevac vxdg rmdisk vxdiskunsetup

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 220 How does VxFS allocate storage in the storage array?

A. By allocating groups of extents B. By allocating one block at a time C. By allocating random blocks D. By allocating one inode at a time

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 221 A volume called datavol in the disk group named datadg has two plexes. The plexes are named P1 and P2. Due to a series of failures, the P1 plex ends up in DISABLED/RECOVER state, and the P2 plex ends up in DISABLED/STALE state. As the administrator, you are aware of the series of failures, and you know that the data on the P1 plex is still valid and has the most recent copy of your data. You want to recover the plexes. Which command will you execute to recover the plexes?

A. vxmend g datadg fix stale P1 vxmend g datadg fix clean P1 vxrecover s datavol B. vxmend g datadg fix clean P1 vxrecover s datavol C. vxmend g datadg fix clean P1 vxmend g datadg fix clean P2 vxvol g datadg start datavol D. vxmend g datadg off P2 vxrecover ns vxvol g datadg start datavol

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 222 You have replaced disks on a system under the VxVM control and you get an error "VxVM vxconfigrestore ERROR V-5-1-6012 There are two backups that have the same disk group name with different disk group id". How will you resolve this error?

A. Delete the backup file, in dginfo, /etc/vx/cbr/bk/diskgroup. dgid/ dgid.dginfo. B. Rename one of the disk groups. C. Specify the disk group by its name rather than by its ID. D. Specify the disk group by its ID rather than by its name. Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 223 Which two methods should an administrator use to exclude emails going to partner.com and all traffic going to a specific subnet? (Select two.)

A. Protocol filter B. L7 recipient filter C. Sender/User Matches pattern D. L7 sender filter E. IP filter

Correct Answer: BE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 224 Which command will you run to get the full path name of the file, if you only have the inode number?

A. vxfsstat B. vxquot C. vxquota D. vxlsino

Correct Answer: D Section: (none) Explanation

Explanation/Reference: correct answer.

QUESTION 225 You have installed and configured Veritas Volume Manager on a UNIX server. You want to install and configure Veritas Enterprise Administrator (VEA) server to manage the VEA agents that you will be installing on Windows and UNIX client computers. You want to ensure you are able to successfully install VEA server. What should you do?

A. Install VEA server on a remote server that needs to be administered. B. Install VEA on the server where Veritas Volume Manager is installed. C. Install a Windows server and install Java Runtime 1.4 and then install VEA. D. Install VEA server on each Storage Foundation 5.0 server that needs to be administered.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 226 What does the ACTIVE plex state indicate? A. The data in the plex is not synchronized with the data in the CLEAN plexes. B. The plex does not participate in any I/O when plex is offline, so the contents of plex become outdated if the volume is actively written. C. The plex state does not define which plex has the active data, and which plex does not have the active data. D. The volume is currently started, and the volume is able to perform I/O.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 227 You want to rename a boot disk group because it contains volumes that are in use by mounted file systems. Before you rename, you want to unencapsulate the root disk. Which command is used to unencapsulate the root disk?

A. Vxvol B. Vxroot C. Vxunroot D. Vxmirror

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 228 You work in a Server Operations Center (SOC) with other administrators monitoring VxVM background tasks after you initiate them. You need to set up a VxVM task so that these SOC administrators can track your background tasks against the change control documentation. What would you do address this requirement?

A. Use the vxtask label command to mark the task with the change control number. B. Use the "-n" flag to associate the task with the change control number. C. Use the "-t" flag to mark the task with the change control number. D. Use the vxtask tag command to associate the task id with the change control number.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 229 An organization needs to implement a solution that will protect its sensitive information while allowing its mobile device users to access sites and applications such as Facebook, Dropbox, and Twitter.

Which Symantec Data Loss Prevention solution should the organization use to protect its information?

A. Mobile Email Monitor B. Mobile Prevent C. Network Prevent D. Endpoint Prevent Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 230 A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display. Why are the processes missing from the Server Detail page display?

A. The detection server Display Control Process option is disabled on the Server Detail page. B. The Display Process Control setting on the Advanced Settings page is disabled. C. The detection server PacketCapture process is displayed on the Server Overview page. D. The Advanced Process Control setting on the System Settings page is deselected.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 231 How is data moved to the servers at Symantec when auto-transmission of Supportability Telemetry data is enabled?

A. HTTP POST to Symantec from Agents B. HTTPS POST to Symantec from Enforce C. HTTP POST to Symantec from Enforce D. HTTPS POST to Symantec from Agents

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 232 Which DLP Agent task is unique to the Symantec Management Platform and is unavailable through the Enforce console?

A. Change Endpoint server B. Restart agent C. Pull agent logs D. Toggle print screen

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 233 Which two restrictions does relayout place on the administration of a volume while it is in progress? (Select two.) A. During a relayout, you cannot create a sparse plex. B. During a relayout, you cannot change the number of mirrors in a volume. C. During a relayout, you cannot change the number of subdisks in a volume. D. During a relayout, you cannot create a snapshot of a volume. E. During a relayout, you cannot create a backup of a volume.

Correct Answer: BD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 234 Which endpoint database file should be used to tune and change debugging levels?

A. cg.ead B. ps.ead C. am.ead D. ks.ead

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 235 Which file is required to decrypt the edpa_ext0.log using the Endpoint Agent logdump utility?

A. dcs.ead B. cg.ead C. ks.ead D. is.ead

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 236 You have Storage Foundation 5.0 installed on Solaris 10. When managing Storage Foundation 5.0 from Storage Foundation Management server, you get an error "The action agent has stopped running. Rule manager is no longer available." You need to resolve this error immediately. What should you do?

A. Restart the agent. B. Reinstall the agent. C. Restart the Storage Foundation Management Server. D. Reconfigure the agent.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 237 You have the hot-relocation feature enabled on your Storage Foundation Server. However, you are getting a disk failure error and you want to resolve the problem by using the vxrelocd daemon. Identify the correct sequence of steps that you will perform to resolve this problem?

1. Inform the administrator regarding the failed disk by electronic mail. 2. Initiate the appropriate recovery procedures. 3. Detect the failure by vxrelocd daemon to the failed disk. 4. Determine if any subdisks can be relocated.

A. 2,4,1,3 B. 2,1,3,4 C. 4,1,2,3 D. 4,3,1,2

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 238 You were running Storage Foundation 5.0 on an evaluation license. Two days back, the evaluation license expired. You want to retain the configuration of the existing system. You want a solution that requires minimum administrative effort.

What should you do?

A. Back date the system and continue using it. B. Obtain another evaluation key and replace it with the existing one. C. Replace the evaluation key with a permanent license key. D. Reinstall Storage Foundation with another evaluation key.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: valid answer.

QUESTION 239 While performing disk operation under Volume Manager Control, you will execute the command vxassist -g mktdg make mktvol 10g. What will be the output of this command?

A. The command will create a sub disk in a disk group. B. The command will create a volume in a disk group. C. The command will create boot disk group. D. The command will create default disk group.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 240 You are working on Veritas Volume Manager. You need to create volume layout from multiple regions of one or more disks, if there is not enough space available for entire volume on a single region of a disk. You want to ensure that the volume that you create provides the flexibility to extend the volume to another disk. What should you do?

A. Use striped volume B. Use mirrored volume C. Use concatenated volume D. Use RAID-5 volume E. Use mirrored-stripe volume

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 241 How do you change the time limit for an I/O request in Dynamic Multi-Pathing (DMP) in Veritas Volume Manager on a Solaris operating system?

A. Modify the /kernel/drv/vxdmp.conf file by adding dmp_failed_io_threshold tunable parameter. B. Modify the /kernel/drv/vxio.conf file by adding dmp_failed_io_threshold tunable parameter. C. Modify the /kernel/drv/vxdmp.conf file by adding vol_maxio tunable parameter. D. Modify the /kernel/drv/vxdmp.conf and /kernel/drv/vxio.conf files by adding dmp_failed_io_threshold tunable parameter.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 242 Which object is used as a building block for a plex?

A. A physical disk B. A Volume C. A subdisk D. A VxVM Disk

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 243 A DLP administrator needs to improve the reporting performance of the Symantec Data Loss Prevent deployment by archiving incidents. What happens to incidents as a result of using the Incident Archive Flag feature?

A. they are moved to offline storage B. they are moved from reporting status C. they are moved to the archive table D. they are moved to the archive database Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 244 An I/O error has corrupted multiple plexes of a mirrored volume and has not left any plex CLEAN or ACTIVE. You are required to mark one of the plexes CLEAN and point the system to use that plex as the source for reviving the other plexes. How should you resolve this error?

A. Use the vxmend g command with the fix stale plex option. B. Use the vxplex g command with the att plex volume option. C. Use the vxmend g command with the on plex option. D. Use the vxmend g command with the fix clean plex option.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 245 An incident responder can see basic incident data, but is unable to view specific details of the incident. What could be wrong with the configuration in the incident responder's role?

A. View option is selected and all display attributes are deselected. B. Incident Access tab conditions are specified. C. Available Smart Response rules are deselected. D. Server administration rights are deselected.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 246 The datavol volume is in the datadg disk group. A VxFS file system is mounted on the datavol volume. You need to increase the length of a datavol volume because it is not large enough for the amount of data to be stored on it. Which statement is correct for this situation?

A. You cannot resize a volume by using VEA. You must use the command line to perform this task. B. When you resize the volume using VEA, the file system is also resized by default. C. You can resize the volume using VEA, but the file system cannot be resized using VEA. D. You can use VEA and vxassist command to resize the volume.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 247 You have executed the vxdg -g diskgroup adddisk disk_name= command. Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A. -force B. -k C. -f D. -assign

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 248 You are consulted by a development environment administrator about a test server with Storage Foundation installed. The development administrator is facing difficulty in making changes to a complex configuration. You are required to identify the problem with the process of changing the existing configuration. What would you do to perform this task?

A. Use vxprint to visually inspect the configuration of the disk group's objects. B. Issue the command "vxse_drl1 run" and save the output of the rule as a text file, documenting rule violations as actionable issues. C. Issue the command "vxse_dg1 run" and save the output of the rule as a text file, documenting rule violations as actionable issues. D. Issue the command "vxse_disklog run" and save the output of the rule as a text file, documenting rule violations as actionable issues.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 249 Refer to the exhibit. Symantec Data Loss Prevention's four phases of risk reduction model provides a blueprint for identifying and remediating key risk areas without disrupting legitimate business activity. According to best practices, which option should be enabled during the baseline phase of policy risk reduction?

A. change automated email responses B. EDM/IDM detection C. use secure storage D. enable auto-encryption

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 250 Which command is used to save queries/commands written to the database when one of the following DMLs is used: Update, Insert, or Delete?

A. commit B. finalize C. :wq D. exit Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 251 You're administering a 10GB volume on a test server that regularly receives new builds that replace most or all of its contents. The build currently under test has an issue that is in the process of being resolved, when a critical production issue arises. Within an hour, the test build you're working with will be overwritten by a copy of the production build, and your working volume under test will be overwritten by a copy of the production build, for its problem resolution.

Given that you don't have time to synchronize a snapshot of your test build before it gets overwritten, what technique can you use to get a snapshot of the test volume ready to preserve the state of your test before testing gets set back a week by being overwritten by the production copy?

A. Use vxsnap addmir to create a snapshot mirror on the test volume, then use vxsnap make with the nmirror=1 option to convert the mirror into a snapshot volume. B. Use the vxsnap make command with the plex option to convert an existing plex of the test volume into a snapshot. C. Use vxassist to create an empty volume matching the size of the test volume, then use vxsnap make with the snapvol option and the sync=off option to attach the new volume to the test volume as a snapshot. D. Use the vxsnap make command with the cachesize=1g option.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 252 What is the importance of using a CPU in Oracle within the DLP technology?

A. Central Processing Unit - ensures database has enough processing power B. Command Processor Unit - lays out the commands to process for the database C. Critical Patch Update - ensures Oracle is securely patched D. Communications Processing Unit - sends alerts to administrator

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 253 After upgrading the Volume Manager, you are trying to start a vxconfigd daemon. You get the following error messagE. "VxVM vxconfigd ERROR V-5-1-543 Differeing version of vxconfigd installed"

How should you resolve this error?

A. Reconfigure the Volume Manager configuration data. B. Reboot the system. C. Restart vxconfigd daemon. D. Re-upgrade the Volume Manger.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 254 You are working in a production environment. You need to reconfigure the layout of a concatenated volume to a striped volume using the command line without taking the volume offline. You must ensure availability of the volume. What should you do? (Each correct answer presents part of the solution.) (Select two.)

A. Use the relayout command to change the volume from concatenated to striped. B. Use the vxassist to convert the volume from concatenated to striped. C. Use the vxdiskadm command to convert the volume from concatenated to striped. D. Use the vxassist command to change the volume from concatenated to concatenated-striped and then to a striped.

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 255 You are responsible for managing Veritas Storage Foundation for Oracle. While working on the Veritas Storage Foundation for Oracle with Quick I/O feature, you execute the command #mount -F vxfs -o noqio / dev/vx/dsk/testdg/testvol1 /testvol1.

What would be the expected outcome for this command?

A. It enables the Quick I/O feature for Oracle when file system is being mounted. B. It disables the Quick I/O feature for Oracle when file system is being mounted. C. It enables the Quick I/O feature when the file system is online. D. It unmounts the file system and disables the Quick I/O feature.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 256 Which object is used to initialize a file system for application use?

A. A subdisk B. A volume C. A disk group D. A partition

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 257 Consider a situation where a system has a volume with the traditional mirror-stripe layout that consists of four disks. The volume consists of: Subdisk1 and Subdisk2, which are in Plex1 and Subdisk3 and Subdisk4, which are in Plex2. What is the volume status if both Subdisk1 and Subdisk4 fail?

A. The volume remains up because of mirroring. B. The volume is down because both plexes are detached. C. The volume remains up because of striping. D. The volume goes into REBUILD status.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 258 You are accessing the public region of a drive. You get an error message stating that the disk has failed. What could be the possible reason for this message?

A. VxVM can access the private region but there are uncorrectable I/O failures on the public region of the drive. B. VxVM cannot access the private region or the public region of the drive. C. VxVM can access the public region of the drive but there are uncorrectable I/O failures on the private region of the drive. D. VxVM can access the public and the private region of the drive but the plex on the drive is disabled.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 259 You are monitoring the Storage Foundation 5.0 environment in your organization. A disk starts receiving intermittent I/O errors and shows signs of hardware fatigue. All the data on the disk is redundant; however, in this situation, you cannot interrupt I/O. How should you resolve this error?

A. Copy the volume to another disk. B. Add a new drive and wait for it to populate. C. Move all the subdisks to healthier disks. D. Force the subdisks to move to a stripped volume.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 260 The administrator determines that \SymantecDLP\Protect\Incidents folder on Enforce contains .BAD files dated today while other .IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD.

What could be causing only incident data smaller than 1MB to persist while incidents that are larger than 1MB change to .BAD files?

A. Enforce hard drive is out of free disk space B. detection server has excessive filereader restarts C. tablespace is almost full D. corrupted policy was deployed

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 261 You are responsible for administering a large storage environment. The environment includes DBMS systems that use VxFS-based data files, performance-critical application files, and archives of historical user data. Users and application administrators are not satisfied with policies segregating their data files into different file systems in terms of these usages, and they want you to manage these issues for them.

How does DST help in this case? (Select two.)

A. You can simplify the management of file system data. B. You can increase access speed for all files. C. You can reduce storage costs for all files. D. You can distribute the contents of a file system across multiple volumes that may have different configurations. E. You can match file access characteristics to performance requirements and cost constraints.

Correct Answer: DE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 262 You are responsible for administering a server with mirrored volume layouts. You noticed that the last time the server was down, the server took longer than usual to resynchronize the mirrors. You want to make configuration changes on the server to reduce resynchronization time. Which actions will you perform?

A. Run the vxprint command, inspect the storage configuration manually, and write a plan to place dirty region logs on the three biggest volumes. B. Run the vxse_redundancy rule and plan configuration changes to eliminate any rule violations it reports. C. Run the vxse_rootmir rule and plan configuration changes to eliminate any rule violations it reports. D. Run the vxse_drl1 rule and plan configuration changes to eliminate any rule violations it reports.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 263 The 'Administer' button in the Storage Foundation Management Server user interface for a host is continually red, and the vxsvc32 agent is listed as DOWN. How do you solve this problem?

A. Reconfigure the Storage Foundation management Server. B. Reinstall the agent. C. Restart Storage Foundation Management Server. D. Change the types.ini configuration file on the Central Management Server.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 264 You have imported a disk group onto a new Storage Foundation 5.0 server named Srv1. The existing Storage Foundation 4.1 server named Srv1 will be decommissioned. When you attempt to use the newly imported disk group on Srv2, you get the following error: VxVM vxedit ERROR V-5-1-2829 Disk group version doesn't support feature. You want to resolve this error and use the features provided by VxVM running on Srv2. How would you solve this error?

A. Upgrade the disk group on Srv1 and then import the disk group. B. Explicitly upgrade the disk group to the current version. C. Reboot Srv2. D. Revert VxVM to an earlier version.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 265 You execute the qio_convertdbfiles command to convert the database files to use Quick I/O. The command results with an error that the database files are not on a VxFS file system. You need to convert the database files to use Quick I/O.

What should you do?

A. Run the qio_getdbfiles command to get the database files on the VxFS file system. B. Remove the files from the mkgio.dat file. C. Predefine the DB2 environment variable $DB2DATABASE. D. Set the database type to DB2.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: nicely done.

QUESTION 266 A Network Monitor is showing under System Overview as 'Running Selected'. The corresponding detection server events indicate that packet capture and filereader are crashing. What is a possible cause for the Network Monitor being in this state?

A. the license has expired for this detection server B. the Enforce server and detection server are running different versions C. the detection server is missing the server side certificate D. the minimum required amount of available free space has been used

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 267 An administrator is attempting to check the status of the services for a detection server in the UI. The only option showing under System > Servers > Overview > Server Detail is 'Status'. What is a possible cause for the server details to show 'Status' only?

A. the services are failing to run B. the user is logged in with a limited role C. Advanced Process Control is unchecked D. Symantec Data Loss Prevention Standard Edition is installed

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 268 You have installed Storage Foundation for DB2. You need to create a multi-mirror snapshot. When you attempt to add the second mirror and the data change object (DCO) log, db2ed_vmchecksnap fails.

What could be the probable cause?

A. Snap volumes are not splittable. B. Newly added mirror is not tagged with the same tag as the first mirror. C. The SNAPSHOT_MIRROR keyword to the snapplan has not been added. D. All tagged snapshot mirrors are in the SNAPDONE state.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 269 You need to create a new volume that bears the failure of one enclosure and provides greater reliability. To meet the required goal, you type the following command on the command line: vxassist -g diskgroup -P storagepool make strpvol 2g layout=mirror \ nmir=2 mirror=enclosure options

What should be the expected outcome of this command?

A. The new 2GB mirrored volume will have mirrors on separate enclosures with 2 mirrors. B. The new 2GB mirrored volume will have mirrors on separate controllers with 2 mirrors. C. The new 2GB mirrored volume will have mirrors on a single enclosure with 2 mirrors. D. The new 2GB mirrored volume will have mirrors on separate enclosures with 2 mirrors on each enclosure.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Very well. QUESTION 270 Which System Administration page will display a list of the system servers as well as recent error-level and warning-level system events?

A. System > Servers > Events B. System > Servers > Overview C. System > Settings > General D. System > Servers > Alerts

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 271 How does a volume created by VxVM appear in the operating system?

A. As remotely-hosted disks B. As simple disks C. As SAN disks D. As physical disks

Correct Answer: D Section: (none) Explanation

Explanation/Reference: valid answer.

QUESTION 272 While working with volume under VxVM control, you discover that a subdisk is detached from a RAID-5 volume. Because of the failure of the disk or an uncorrectable error on the disk, you get the following error messagE. "VxVM vxio WARNING V-5-0-237 object subdisk detached from RAID-5 volume at column column offset offset"

How should you resolve this error?

A. Replace the failed disk. B. Reattach the subdisk using vxreattach command. C. Correct the errors on the disk. D. Reboot the system to correct the problem.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 273 You are not able to find a physical device corresponding to the disk ID in the disk media record when one of the subdisks associated with the plex fails. You need to check the plex state to solve the problem. What will be the status of the plex in this situation?

A. UNENABLED B. NODEVICE C. DISCONNECTED D. INACTIVE Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 274 You have installed the Veritas Enterprise Administrator to manage Storage Foundation 5.0. You want to manage the Veritas Enterprise Administrator from remote system using the Graphical User Interface (GUI).

What services must be running on the remote system? (Select two.)

A. vxconfigd B. vxservice C. vea D. vxsvc E. vxsvcctrl

Correct Answer: AD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 275 A software company needs to protect its source code including new source code between indexing times.

Which detection method should the company use to meet this requirement?

A. Exact Data Matching (EDM) B. Described Content Matching (DCM) C. Indexed Document Matching (IDM) D. Vector Machine Learning (VML)

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 276 An organization needs to determine whether at least 50% of a sensitive document is being sent outside the organization. Which action should the company take to accomplish this?

A. use a whitelisted.txt document B. use match on selected fields C. use match count D. use minimum document exposure

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 277 You want to implement Storage Foundation Enterprise in your storage environment. You want to ensure you have at least 5 GB of free space after the Storage Foundation 5.0 has been installed on your computer. You are installing Storage Foundation on the same drive where the operating system has been installed.

What should be the size of the system drive to meet the requirement?

A. 6245 MB B. 5922 MB C. 6524 MB D. 6287 MB

Correct Answer: B Section: (none) Explanation

Explanation/Reference: truthfully.

QUESTION 278 You need to create a new volume. The new volume will only use disks on controller 1. You want to execute the vxassist command with the ctlr:c1 storage attribute. You want to ensure that the command provides desired output.

What should you ensure to meet the required goal?

A. Ensure that storage attribute is a part of the disk group. B. Ensure that storage attribute is a part of the plex. C. Ensure that storage attribute is a part of the disk. D. Ensure that storage attribute is a part of the volume.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 279 You were working with Veritas Volume Manager and the Volume Manager failed due to disk failure. You are required to recover the Veritas Volume Manager Configuration. Identify the correct sequence of actions that you would perform in this situation.

1. Reinstall the operating system 2. Replace the failed disk 3. Recover the VxVM configuration 4. Add the Volume Manager Packages 5. Startup Hot-relocation 6. Clean up the system configuration

A. 4,3,2,6,1,5 B. 3,6,1,5,2,4 C. 2,1,4,3,6,5 D. 6,2,1,4,5,3

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation: QUESTION 280 An incorrectable I/O error has occurred on a RAID volume due to a disk failure that caused the data on the disk to become unavailable. For the RAID volume, the subdisk becomes unavailable and is considered stale and detached. What is the RAID level in the volume in this situation?

A. 0 B. 2 C. 4 D. 5

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 281 Which two actions should an organization take when deploying Endpoint Prevent according to Symantec best practices? (Select two.)

A. test the agent on a variety of end-user images B. enable monitoring of the local file system C. enable monitoring of many destinations and protocols simultaneously D. configure, test, and tune filters E. delete the pre-defined filters and create its own

Correct Answer: AD Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 282 How does the DLP Agent prevent slow response time?

A. Endpoint Discover queues files until resources are available. B. Endpoint Discover pauses any scans if resources are needed. C. Endpoint Prevent pauses detection until any scans complete. D. Endpoint Prevent queues files until resources are available.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 283 An administrator is configuring an approved Endpoint device and adding it as an exception to a policy that blocks the transfer of sensitive data. Data transfers to these approved Endpoint devices are still being blocked. Which action should the administrator take to prevent the data transfers from being blocked?

A. disable and enable the policy involved for the changes to take effect B. verify that the proper device ID or class has been entered C. edit the exception rule to ensure Match On is set to 'Attachments' D. assign the Endpoint device configuration to all of the Endpoint servers Correct Answer: B Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 284 You have just started a relayout operation in a live test environment, and you want to limit the impact of your work on concurrent testing activities. You also want to accommodate the need to constrain a relayout job's performance impact on concurrent activities. What would you do to perform this task?

A. Use the "set iodelay" option of vxtask to throttle the VxVM task. B. Use the "set iowait" option of vxtask to throttle the VxVM task. C. Use the "set slow" option of vxtask to throttle the VxVM task. D. Use the "set nice" option of vxtask to throttle the VxVM task.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 285 You need to mirror an existing volume named mirvol1. You need to achieve the following goals:

Mirror mirvol1: Should be a single mirror to the existing volume using disk mydg01: Synchronization must take place in the background: To meet the required goal, you execute the following command: vxassist -g mydg -b make mirror mirvol1 \ use_storage=' "DM"="mydg01"

Which of the defined goals have been met?

A. All goals have been met. B. Only the first goal has been met. C. Only first and second goals have been met. D. Only first and third goals have been met.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 286 You administer a server that needs to support a large (~1 TB) end-user VxFS file system. The users request file restorations from backup several times per week. The amount of space required for a full- size copy of the file system's data is more than you have available.

What type of Storage Foundation object would be best suited to support this requirement for an undelete capability?

A. Full-sized instant snapshots B. Break-off mirror snapshots C. Space-optimized instant snapshots D. File system storage checkpoints

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 287 You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance. What should you do?

A. Create a file named quota and assign it to the finance group. B. Create a file named quota and place it in the root directory of the file system. C. Create a file named quota.grp and assign it to the group of users. D. Create a file named quota.grp that is owned by the root of the file system.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 288 What is the main difference between data loss prevention and other security technologies?

A. It is designed to take a content aware approach to security. B. It determines the data owner of inbound sensitive information. C. It quarantines adware before it is able to extract confidential information. D. It is designed to give visibility into where the company's least sensitive data is stored.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: good answer.

QUESTION 289 You are responsible for administering the Storage Foundation for Oracle server. You plan to clone a database using Database FlashSnap. When you run the dbed_vmchecksnap command you get an error "SFORA dbed_vmchecksnap ERROR V-81-5677 Could not find a mandatory, primary and valid archive destination for database PROD." You want to resolve this error.

What should you do?

A. Empty the full mandatory location and make free space available for the Oracle database. B. Define the location of the archive logs in the UNC format. C. Change the default archive location. D. Set the valid archive destination.

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 290 You move a set of files from a VxFS file system to another file system. When the files are moved, the extent attributes are not moved along with the files and are lost during the migration. What could be a possible cause for this problem?

A. The target file system is not a VxFS type file system. B. There is a variation in the block size of source and target VxFS file system. C. The target VxFS file system does not have enough free space to accommodate the extent attributes. D. The target VxFS file system uses mixed block size.

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 291 What causes the majority of data loss prevention violations?

A. hackers exploit vulnerabilities and exfiltrate confidential data B. companies lack security policies to prevent loss of confidential data C. employees unintentionally expose confidential data D. system backups are performed improperly

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 292 You execute the command ps ef | grep vxatd. What is the expected output of this command?

A. The command verifies the Fully Qualified Host Name. B. The command verifies the status of Symantec Authentication service. C. The command verifies the status of Root Broker. D. The command verifies the status of Authentication Broker.

Correct Answer: B Section: (none) Explanation

Explanation/Reference: right answer.

QUESTION 293 What is the default naming format for a plex?

A. volume_name-xx B. volume_namexx C. volumename-xx D. volumenamexx

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 294 What is the minimum number of plexes required for true mirroring to provide redundancy of data?

A. One B. Two C. Three D. Four

Correct Answer: B Section: (none) Explanation

Explanation/Reference: right answer.

QUESTION 295 You have encapsulated the disk for swap partitions and created mirrors under the VxVM control. Which files in /etc get modified when the root disk is encapsulated?

A. vfstab and file system B. vfstab and rootdisk C. mnttab and file system D. volboot and file system

Correct Answer: A Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 296 While working under VxVM control, you get an error message "VxVM vxassist ERROR V-5-1-2935 No more space in disk group configuration." This message indicates that there is no more space in the disk group configuration database for VxVM object records. How should you resolve this error?

A. Copy the contents of the volumes to another disk group. B. Delete some files from the current disk for some free space. C. Copy the contents of several volumes to another disk group and then delete the volumes from the current disk group. D. Add an additional disk to perform the operation.

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 297 You have a system that has two disks--disk01 and disk02, which are mapped into the system configuration during boot as disks c0t0d0s2 and c0t1d0s2, respectively. A failure has caused disk01 to become detached. What would you do to view the status of the failed disk01?

A. Use the vxdg list command B. Use the vxdg s list command C. Use the vxprint command D. Use the vxdisk list command

Correct Answer: D Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 298 You are the administrator for Veritas Volume Manager. You are resizing a device by reducing the size of the device, which has a volume configured on it. However, when you attempt to reduce the size, the resize operation fails. You want to ensure you are able to reduce the size of the device. What should you do? (Each correct answer presents a unique solution.)(Select two.)

A. Move the volume B. Reduce the size of the volume C. Replace the disk with a disk of different size D. Add the Storage Foundation license for LUN expansion

Correct Answer: AB Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 299 Which three are the database agents that are supported by Storage Foundation High Availability version? (Select three.)

A. Informix B. DB/2 C. Ingress D. Oracle E. Sybase F. SQL

Correct Answer: BDE Section: (none) Explanation

Explanation/Reference: Explanation:

QUESTION 300 What is the default limit to the number of subdisks that can be attached to a single plex?

A. 1024 B. 2048 C. 4096 D. Unlimited

Correct Answer: C Section: (none) Explanation

Explanation/Reference: Explanation:

http://www.gratisexam.com/