250-252 Administration ofVeritas Storage Foundation 6.0 Test Set 11

What are two benefits of the Multi-Volume Support feature (MVS)? (Select two.)


Options are :

  • Multiple file systems can share storage from an MVS volume.
  • It provides data failover to secondary volumes
  • A single Veritas File System (VxFS) can be created on multiple volumes
  • Metadata can be placed on a separate volume.
  • It supports UNIX native file systems

Answer : A single Veritas File System (VxFS) can be created on multiple volumes Metadata can be placed on a separate volume.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

Which command is required to make changes in I/O policies for multiple paths persistent?


Options are :

  • vxdctl
  • vxddladm
  • vxtune
  • vxdmpadm

Answer : vxdmpadm

Which command is used to change the default thin reclaim schedule?


Options are :

  • vxdmptune
  • vxdmpadm
  • vxdefault
  • vxtune

Answer : vxdefault

Which setting can only be configured during bootstrap?


Options are :

  • system settings configuration
  • time zone configuration
  • product registration
  • appliance role set up

Answer : appliance role set up

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 4

How are email clients able to transfer non-text data, such as images, zip files, etc.?


Options are :

  • using SMTP tunneling
  • using the enhanced SMTP protocol
  • using MIME encoding
  • using the IMAP protocol

Answer : using MIME encoding

When performing a dry run for deduplication, fsdedupadm may take a '-o threshold=percentage' argument. This argument will initiate an actual deduplication run when the metric reaches which given value?


Options are :

  • the percentage of the dry run completed
  • the percentage of duplicate file names
  • the percentage of file system disk usage
  • the percentage of expected savings

Answer : the percentage of expected savings

A snapshot is created under the command vxassist snapstart and successfully completes. The server is subsequently rebooted. What is the snapshot plex state after the server has come completely online?


Options are :

  • SNAPCOMPLETE
  • SNAPRECOVER
  • SNAPATT
  • SNAPDONE

Answer : SNAPDONE

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

What is a recommended use of a compliance policy?


Options are :

  • to check outbound messages for restricted attachment types and content
  • to check sender address against a blocked/allowed senders list
  • to verify sender authentication through a Sender ID
  • to improve the antispam effectiveness of the product

Answer : to check outbound messages for restricted attachment types and content

Which two fields must be configured to identify the LDAP server? (Select two.)


Options are :

  • Host
  • Name (Bind DN)
  • Port
  • Username
  • Password

Answer : Host Port

What is the function of the Symantec Mail Security 8300 default Email Virus Policy?


Options are :

  • checks for viruses, mass-mailing worms, spam, and suspected spam
  • checks for viruses, mass-mailing worms, spyware, adware, and suspicious attachments
  • checks for spyware, adware, and all message attributes
  • checks for internal and external mass-mailings and suspicious attachments

Answer : checks for viruses, mass-mailing worms, spyware, adware, and suspicious attachments

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

During which stage of the installation process is external Internet connectivity mandatory?


Options are :

  • when racking the appliance
  • during the registration phase of the Site Setup Wizard
  • when physically connecting the appliance to the network
  • during the bootstrap phase

Answer : during the registration phase of the Site Setup Wizard

What enables combining disks or LUNs into logical collections to make administration easier?


Options are :

  • plex
  • subdisk
  • disk group
  • volume

Answer : disk group

In which scenario should an administrator add MTA host information to the Internal Mail Host page?


Options are :

  • one or more MTAs are, with respect to inbound mail flow, upstream from the Symantec Mail Security 8300 Scanners
  • the Symantec Mail Security 8300 Scanners, with respect to inbound mail flow, are deployed at the Internet gateway
  • the Symantec Mail Security 8300 is configured as a combined Scanner/Control Center during the initial bootstrap phase
  • Directory Harvest Attack prevention is enabled and the configured LDAP source is situated in the internal network

Answer : one or more MTAs are, with respect to inbound mail flow, upstream from the Symantec Mail Security 8300 Scanners

250-253 Administration of Veritas Cluster Server 6.0 Test Set 1

What is an example of a temporary SMTP failure code?


Options are :

  • 6xx
  • 3xx
  • 4xx
  • 5xx

Answer : 4xx

Which information is required when backing up the system to a remote location using the Control Center?


Options are :

  • the directory where the compressed backup should be downloaded
  • the IP address of the dedicated backup appliance
  • a username and host to facilitate secure copy protocol (SCP) transfer
  • the domain, port, and path of the ftp server

Answer : the domain, port, and path of the ftp server

What is a key prerequisite for enabling the end-user Email Spam Quarantine feature?


Options are :

  • defining an LDAP source for authentication
  • defining an LDAP source for synchronization
  • selecting the 'Delete messages sent to unresolved email addresses' option
  • importing a list of allowed users on the Quarantine Setup page

Answer : defining an LDAP source for authentication

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

What is considered a customer-defined verdict?


Options are :

  • Virus
  • Spam
  • Compliance
  • Email firewall

Answer : Compliance

Hot-relocation is available for which two types of volume layouts? (Select two.)


Options are :

  • striped
  • striped-mirror
  • concatenated with hot standby disk
  • striped with parity
  • striped with hot standby disk

Answer : striped-mirror striped with parity

Which value is configured during the bootstrap process?


Options are :

  • LDAP server
  • Group policies
  • Internal mail host
  • Administrator password

Answer : Administrator password

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 1

Which scanner log would you consult if you suspect that antispam rules are not being updated?


Options are :

  • Filter hub
  • Transmission
  • MTA
  • Conduit

Answer : Conduit

A disk group is configured for site awareness for two sites (SiteA and SiteB) and the site consistency flag for the disk group is set to off. Each site has four disks assigned. One disk on SiteB fails. What is the state of the disks assigned to the disk group?


Options are :

  • The failed disk is marked as failed and both sites are detached.
  • The failed disk is marked as failed and SiteB is detached.
  • All disks are marked as failed and SiteB is detached.
  • The failed disk is marked as failed and SiteB remains attached.

Answer : The failed disk is marked as failed and SiteB remains attached.

Which statement is true about Content Compliance policies?


Options are :

  • Available linked compound conditions include AND, OR, XOR, and NOT.
  • There is a set limit to the number of conditions per compliance policy.
  • They are evaluated in the order listed on the main page of the Compliance tab.
  • The order of conditions in a filter is important when a filter matches a message.

Answer : They are evaluated in the order listed on the main page of the Compliance tab.

250-400 Administration of Altiris Client Management Suite Set 1

Which Symantec Mail Security 8300 appliance is configured for RAID 10?


Options are :

  • 8320
  • 8380
  • 8360
  • 8340

Answer : 8380

A system administrator needs to optimize the use of solid state disks in a data center by automatically allocating them to files that are frequently accessed and that require high throughput. Using Veritas Operation Manager (VOM) to configure SmartTier, which Canned File Placement Policy should be configured to optimize the use of solid state disks?


Options are :

  • Access age-based
  • I/O activity-based
  • Update age-based
  • Access age-based with preferred files

Answer : I/O activity-based

An administrator sets up site awareness on a host and needs to verify that everything is set up correctly. Which command should the administrator execute to break off one of the sites to verify the configuration?


Options are :

  • vxdiskadm
  • vxsite detach
  • vxfiredrill
  • vxdg detachsite

Answer : vxdg detachsite

250-405 Administration of Symantec Management Platform Test Set 1

Under which condition is the 'Strip and Hold in Suspect Virus Quarantine' action available for use?


Options are :

  • if a message contains a mass-mailing worm
  • if a message is unscannable for viruses
  • if a message contains a virus
  • if a message contains a suspicious attachment

Answer : if a message contains a suspicious attachment

Which set of configuration choices will best help reduce the volume of messages that need to be processed by the filtering engine?


Options are :

  • controlling maximum attachment sizes, setting a lower recursion limit for ZIP files, enabling bad message handling
  • deleting all spam messages, deleting all virus attachments, configuring sender authentication
  • enabling SMTP traffic shaping, rejecting Zombie connections in Sender Groups, configuring invalid recipient configuration
  • enabling LDAP authentication, quarantining all spam and suspected spam, and increasing concurrent MTA connections

Answer : enabling SMTP traffic shaping, rejecting Zombie connections in Sender Groups, configuring invalid recipient configuration

Which two are benefits of using IM security features of Symantec Mail Security 8300? (Select two.)


Options are :

  • provides support for enterprise IM systems
  • archives IM traffic
  • enables disclaimers in IM traffic
  • archives IM traffic
  • allows administrator to restrict/allow IM use by network

Answer : archives IM traffic allows administrator to restrict/allow IM use by network

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 6

What is the proper function of the Symantec Mail Security 8300 IM Scanner?


Options are :

  • The proxy establishes the connection. The scanner accepts the instant message connection, encrypts the transmission, and connects the instant message to the internal network
  • The scanner accepts the instant message connection and connects the instant message to the internal network.
  • The scanner accepts the instant message connection and connects instant messaging to the external network.
  • The proxy establishes the connection. The scanner accepts the instant message connection, encrypts the transmission, and connects instant messaging to the external network.

Answer : The scanner accepts the instant message connection and connects instant messaging to the external network.

What is the default logging level for Symantec Mail Security 8300?


Options are :

  • Warnings
  • Errors
  • All
  • Information
  • Notices

Answer : Warnings

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions