250-252 Administration ofVeritas Storage Foundation 6.0 Test Set 4

Which command resizes the file system without changing the volume size?


Options are :

  • vxfsadm
  • fsadm
  • tunefs
  • vxresize

Answer : fsadm

Which three settings impact the size and performance of the Symantec Mail Security 8300database? (Select three.)A. report retentionB. log levelsC. quarantine retentionD. compliance incident size


Options are :

  • CAB
  • ABC
  • BCA
  • CBA

Answer : ABC

What is the recommended deployment location for Symantec Mail Security 8300?


Options are :

  • behind the existing Exchange server
  • in front of the external firewall
  • integrated with the existing gateway SMTP server
  • at the SMTP gateway

Answer : at the SMTP gateway

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 2

Which two actions are strongly recommended prior to shutting down a Symantec Mail Security8300 Scanner? (Select two).A. Stop the mail flowB. Flush the mail queuesC. Shut down the attached UPSD. Verify that all users are logged outE. Back up the quarantine


Options are :

  • CA
  • BC
  • AD
  • AB

Answer : AB

Which best describes address masquerading?


Options are :

  • expanding an email address to one or more other email addresses
  • rewriting the domain name in the address of inbound and outbound mail
  • encrypting outgoing email to ensure the sender information is concealed
  • email fraud tactic where the sender maliciously alters the From: headers

Answer : rewriting the domain name in the address of inbound and outbound mail

Which two are advantages of deploying multiple Symantec Mail Security 8300 Scanners? (Selecttwo.)A. redundancyB. management of policiesC. scalabilityD. inbound and outbound scanning


Options are :

  • AC
  • CA
  • AB
  • BC

Answer : AC

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

When creating a policy to check outbound messages for inappropriate dissemination of credit cardnumbers, which policy resource should be leveraged in the policy?


Options are :

  • Dictionaries
  • Smart identifiers
  • Annotations
  • Patterns

Answer : Patterns

What is the default action for an unscannable attachment?


Options are :

  • Delete
  • Defer
  • Strip and hold
  • Quarantine

Answer : Delete

Which command is used to mirror all volumes from one disk to another?


Options are :

  • vxdiskadm
  • vxedit
  • vxdiskpr
  • vxvol

Answer : vxdiskadm

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 6

Which command configures a disk for use by Veritas Storage Foundation 6.0 for UNIX?


Options are :

  • vxdiskconfig
  • vxdmpadm
  • vxdg
  • vxdisksetup

Answer : vxdisksetup

The volume datavol has yet to be started, its kernel state is DISABLED, and its plexes aresynchronized.The volume datavol is in which state?


Options are :

  • CLEAN
  • INIT
  • READY
  • WAIT

Answer : CLEAN

What SMTP command precedes the transmission of the message body?


Options are :

  • Message
  • 250
  • Data
  • 100

Answer : Data

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

Which statement is true regarding the encryption support on Symantec Mail Security 8300?


Options are :

  • Encryption support always requires integrating with a third party vendor, such as PGP or Voltage.
  • Administrators can configure a set of remote domains that require TLS encryption.
  • Enabling encryption requires a Premium Content Control license.
  • Encrypted messages can be routed to the Web Messenger for storage and end user access.

Answer : Administrators can configure a set of remote domains that require TLS encryption.

What is the allowable score range for the Suspected Spam Threshold?


Options are :

  • 90 through 100
  • 20 through 89
  • 1 through 100
  • 25 through 89

Answer : 25 through 89

What is a content filtering capability of Symantec Mail Security 8300?


Options are :

  • True file type scanning
  • Word stemming analysis
  • Advanced phishing capability
  • Custom sieve editor

Answer : True file type scanning

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 10

Which three are options for invalid recipient handling? (Select three.)A. Reject invalid recipientsB. Accept all recipientsC. Drop invalid recipientsD. Quarantine invalid recipients


Options are :

  • CAB
  • BCA
  • ABC
  • BCA

Answer : ABC

Which daemon performs thin reclamation asynchronously?


Options are :

  • vxconfigd
  • vxcached
  • vxrelocd
  • vxattachd

Answer : vxcached

How are shrunk spaces reclaimed on shrinking Veritas Volume Manager (VxVM) volumes basedon thin reclaimable LUNs?


Options are :

  • through aggressive reclamation
  • through automatic reclamation asynchronously
  • manually, by the administrator using the fsadm command
  • by using Veritas Operations Manager (VOM)

Answer : through automatic reclamation asynchronously

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 10

How often does Symantec Mail Security 8300 update new anti-spam rules?


Options are :

  • every 3-7 days
  • several times a day
  • every day
  • every 5-7 minutes

Answer : every 5-7 minutes

Which statement is true about the Message Audit Logs feature on Symantec Mail Security 8300?


Options are :

  • it is disabled by default
  • it supports a maximum of one mandatory and two optional query filters
  • it requires a dedicated appliance to query data across all scanners
  • it is accessible only via the Control Center graphical interface

Answer : it is disabled by default

Which command displays thin provisioning capable devices?


Options are :

  • vxdisk
  • vxdmpadm
  • vxddladm
  • vxdefault

Answer : vxdefault

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 1

Which two Veritas Operations Manager (VOM) add-ons are deployed by default? (Select two.)A. Veritas Storage Foundation Add-on for Storage ProvisioningB. Veritas Operations Manager Add-on for VCS AdministrationC. Veritas Operations Manager Control Host Add-onD. Veritas Operations Manager Add-on for SF AdministrationE. Veritas Operations Manager Add-on for Storage Foundation Administration for UNIX


Options are :

  • BD
  • CD
  • DA
  • DC

Answer : BD

Which vxassist parameter is used to set the number of data plexes in a non-layered mirroredvolume?


Options are :

  • plex
  • nplex
  • ndisk
  • nmirror

Answer : ndisk

Which option can be selected for the log level from the Veritas Operations Manager (VOM)Management Server setting page?


Options are :

  • Notice
  • Warning
  • Critical
  • Error

Answer : Warning

ST0-135 Symantec Network Access Controls Technical Exam Set 4

What are two benefits of SmartMove? (Select two.)A. faster plex creationB. faster disk group deportC. reduced file system consistency checksD. reduced storage requirementsE. faster sequential I/O performance


Options are :

  • AD
  • BC
  • DA
  • CA

Answer : AD

What is the default block size for a 2TB file system?


Options are :

  • 8192
  • 1024
  • 4096
  • 2048

Answer : 8192

An administrator suspects that file creation performance is degraded in several directories on aVeritas File System (VxFS).Which command should be used to analyze directory organization?


Options are :

  • fsadm
  • fsapadm
  • fsppadm
  • fiostat

Answer : fsadm

250-371 Administration Symantec Net Backup 7.5 Windows Exam Set 8

Which command allows the removal of a mirror from a volume?


Options are :

  • vxvol
  • vxmirror
  • vxdiskadm
  • vxplex

Answer : vxplex

Which two Veritas Storage Foundation 6.0 for UNIX components are required to perform thin


reclamation on a thin provision capable array? (Select two.)A. Dynamic Multi-PathingB. Veritas Operations Manager (VOM)C. FlashSnapD. Veritas File System (VxFS)E. Intelligent Storage Provisioning (ISP)


Options are :

  • AD
  • CA
  • DE
  • BC

Answer : AD

Which two statements are true regarding the LiveUpdate section in the Virus settings area?(Select two.)A. Certified (or Platinum) definitions are enabled by default.B. A LiveUpdate can be initiated on demand.C. Rapid Response definitions are enabled by default.D. Rapid Response definitions can be scheduled on a daily or weekly basis.E. An intermediate proxy server is required for any virus definition download.


Options are :

  • AB
  • BC
  • AD
  • CA

Answer : AB

ST0-095 ST0-095 Symantec Technical Foundations Security Exam Set 4

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions