250-252 Administration ofVeritas Storage Foundation 6.0 Test Set 13

How can an administrator uninstall the Veritas Operations Manager (VOM) management server prior to upgrade?


Options are :

  • execute the installation binary with the -uninstall option
  • use the Common Product Installer (CPI) script and select the VOM server to uninstall
  • connect to port 5634 on the VOM management server using a web browser
  • uninstall the two VOM packages using OS-specific commands

Answer : uninstall the two VOM packages using OS-specific commands

Which command is used to mirror all volumes from one disk to another?


Options are :

  • vxedit
  • vxdiskadm
  • vxvol
  • vxdiskpr

Answer : vxdiskadm

Which two actions are strongly recommended prior to shutting down a Symantec Mail Security 8300 Scanner? (Select two).


Options are :

  • Flush the mail queues
  • Back up the quarantine
  • Verify that all users are logged out
  • Stop the mail flow
  • Shut down the attached UPS

Answer : Flush the mail queues Stop the mail flow

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 9

Which command configures a disk for use by Veritas Storage Foundation 6.0 for UNIX?


Options are :

  • vxdisksetup
  • vxdg
  • vxdmpadm
  • vxdiskconfig

Answer : vxdisksetup

What is the recommended deployment location for Symantec Mail Security 8300?


Options are :

  • at the SMTP gateway
  • integrated with the existing gateway SMTP server
  • in front of the external firewall
  • behind the existing Exchange server

Answer : at the SMTP gateway

For disaster recovery purposes, data is mirrored between arrays at two sites. Which volume read policy preferentially reads from plexes at the locally defined site?


Options are :

  • local
  • prefer
  • select
  • siteread

Answer : siteread

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

At which point during the installation process do you register the product?


Options are :

  • during the bootstrap process
  • during the Site Setup wizard
  • after connecting power and appropriate devices
  • after the Site Setup wizard

Answer : during the Site Setup wizard

What is a content filtering capability of Symantec Mail Security 8300?


Options are :

  • True file type scanning
  • Advanced phishing capability
  • Custom sieve editor
  • Word stemming analysis

Answer : True file type scanning

Which three are functions of the Control Center? (Select three.)


Options are :

  • executes email policies
  • generates encrypted structured data indexes
  • houses email Spam Quarantine messages
  • consolidates logging information

Answer : generates encrypted structured data indexes houses email Spam Quarantine messages consolidates logging information

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 11

The volume datavol has yet to be started, its kernel state is DISABLED, and its plexes are synchronized. The volume datavol is in which state?


Options are :

  • CLEAN
  • WAIT
  • READY
  • INIT

Answer : CLEAN

How are shrunk spaces reclaimed on shrinking Veritas Volume Manager (VxVM) volumes based on thin reclaimable LUNs?


Options are :

  • through aggressive reclamation
  • manually, by the administrator using the fsadm command
  • by using Veritas Operations Manager (VOM)
  • through automatic reclamation asynchronously

Answer : through automatic reclamation asynchronously

Which best describes address masquerading?


Options are :

  • email fraud tactic where the sender maliciously alters the From: headers
  • encrypting outgoing email to ensure the sender information is concealed
  • rewriting the domain name in the address of inbound and outbound mail
  • expanding an email address to one or more other email addresses

Answer : rewriting the domain name in the address of inbound and outbound mail

When creating a policy to check outbound messages for inappropriate dissemination of credit card numbers, which policy resource should be leveraged in the policy?


Options are :

  • Patterns
  • Annotations
  • Dictionaries
  • Smart identifiers

Answer : Patterns

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 4

Which command is used to monitor a plex synchronization that is occurring in the background when a mirror is added to a volume?


Options are :

  • vxtrace
  • vxtask
  • vxplex
  • vxstat

Answer : vxtask

Which command resizes the file system without changing the volume size?


Options are :

  • fsadm
  • vxresize
  • vxfsadm
  • tunefs

Answer : fsadm

Which statement is true about the Message Audit Logs feature on Symantec Mail Security 8300?


Options are :

  • it supports a maximum of one mandatory and two optional query filters
  • it is accessible only via the Control Center graphical interface
  • it requires a dedicated appliance to query data across all scanners
  • it is disabled by default

Answer : it is disabled by default

250-270 Administration of Symantec NetBackup 7.0 Unix Test Set 2

An administrator needs to move all data volumes and disks in diskgroup appdg into an existing diskgroup named webdg. The end result will yield one diskgroup on the system: webdg. Which command should the administrator use to move the data volumes?


Options are :

  • vxdg split appdg webdg
  • vxdg move appdg webdg
  • vxdg add appdg webdg
  • vxdg join appdg webdg

Answer : vxdg join appdg webdg

Which daemon performs thin reclamation asynchronously?


Options are :

  • vxattachd
  • vxconfigd
  • vxrelocd
  • vxcached

Answer : vxrelocd

Which command displays the number of paths to the disk DISK01?


Options are :

  • vxddladm getsubpaths DISK01
  • vxdisk getpath DISK01
  • vxdisk listpath DISK01
  • vxdisk list DISK01

Answer : vxdisk list DISK01

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

Which operation can be performed during a volume relayout?


Options are :

  • Change the number of mirrors in the volume
  • Stop and reverse the relayout
  • Create a volume snapsho
  • Perform another concurrent relayout on the volume

Answer : Stop and reverse the relayout

How often does Symantec Mail Security 8300 update new anti-spam rules?


Options are :

  • every day
  • several times a day
  • every 5-7 minutes
  • every 3-7 days

Answer : every 5-7 minutes

Which statement is true regarding the encryption support on Symantec Mail Security 8300?


Options are :

  • Encrypted messages can be routed to the Web Messenger for storage and end user access.
  • Enabling encryption requires a Premium Content Control license.
  • Encryption support always requires integrating with a third party vendor, such as PGP or Voltage.
  • Administrators can configure a set of remote domains that require TLS encryption.

Answer : Administrators can configure a set of remote domains that require TLS encryption.

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

Which two Veritas Volume Manager (VxVM) commands can be used for printing statistical information on one or more disks? (Select two.)


Options are :

  • vxdmpadm iostat
  • vxmemstat
  • vxbench
  • vxstat
  • vxtrace

Answer : vxdmpadm iostat vxstat

Which two are advantages of deploying multiple Symantec Mail Security 8300 Scanners? (Select two.)


Options are :

  • scalability
  • management of policies
  • inbound and outbound scanning
  • redundancy

Answer : scalability redundancy

Which attribute is configurable for alert notifications?


Options are :

  • email address that appears in the FROM: line of the alert
  • subject line
  • HTML formatting
  • user name of recipient in LDAP

Answer : email address that appears in the FROM: line of the alert

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 2

Which two conditions are applicable to disks of a disk group that have been destroyed with the vxdg destroy command without re-deploying the disks? (Select two.)


Options are :

  • The destroy operation clears the on-disk disk group name and makes disks available for use in other disk groups.
  • The destroy operation deports the disk group and re-formats all of the disks.
  • The destroy operation clears the on-disk disk group ID, which makes recovery impossible.
  • The destroy operation clears the on-disk disk group name and re-initializes all of the disks
  • The destroy operation retains the on-disk disk group ID, which makes the disk group recoverable.

Answer : The destroy operation clears the on-disk disk group name and makes disks available for use in other disk groups. The destroy operation retains the on-disk disk group ID, which makes the disk group recoverable.

How should an administrator configure a Veritas Operations Manager (VOM) management server after installation?


Options are :

  • by using a Web browser to connect to port 5634 on the management server
  • by starting the xprtld and vxdclid processes on the management server
  • by using the Common Product Installer (CPI) on the management server
  • by using the vomadm utility on the management server

Answer : by using a Web browser to connect to port 5634 on the management server

What is the default action for an unscannable attachment?


Options are :

  • Quarantine
  • Delete
  • Strip and hold
  • Defer

Answer : Delete

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 7

What is the key purpose of the Alerts feature of the Control Center?


Options are :

  • sends email notifications to senders who violate configured email security policies
  • sends SNMP notifications to administrators or other parties
  • informs Symantec Mail Security 8300 administrators of antispam attacks detected by Symantec
  • sends email alerts to administrators or other parties

Answer : sends email alerts to administrators or other parties

Which command can be used to replace a failed or removed disk?


Options are :

  • vxdisksetup
  • vxdiskadm
  • vxdmpadm
  • vxassist

Answer : vxdiskadm

Where do you customize settings for Sender Groups?


Options are :

  • Administration tab
  • Virus tab
  • Spam tab
  • Status tab

Answer : Spam tab

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 9

Scanners configured for IM filtering act as a security proxy for which type of traffic?


Options are :

  • enterprise IM traffic
  • encrypted IM traffic
  • public network IM traffic
  • internal IM traffic

Answer : public network IM traffic

What SMTP command precedes the transmission of the message body?


Options are :

  • Data
  • 100
  • 250
  • Message

Answer : Data

Group policies for the Sales and IT departments have been created. The Sales department’s suspected spam action is set to quarantine the message, whereas the IT department’s suspected spam action is set to delete the message. If a user’s email address happens to be contained in both groups, how could you ensure the Sales department’s group policy is enforced?


Options are :

  • change the priority of the IT group policy to delete suspected spam
  • move the Sales group policy to the top of the Group's view
  • set the Sales group policy to quarantine spam
  • move the Sales group policy to the bottom of the Group's view

Answer : move the Sales group policy to the top of the Group's view

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

Which command will mirror an encapsulated boot disk?


Options are :

  • vxdisksetup
  • vxrootadm
  • vxbootadm
  • vxdmpadm

Answer : vxrootadm

After initial setup, what is the default action for suspected spam messages?


Options are :

  • Qauarantine the suspected spam message to the Email Spam Quarantine
  • Bounce the suspected spam message to the sender
  • Insert the text [Suspected Spam] into the subject line
  • Delete the suspected spam message

Answer : Insert the text [Suspected Spam] into the subject line

A disk has been initialized for use in Veritas Volume Manager (VxVM). Which command is used to create a disk group named datadg on a device shown as device_tag and using a disk media name of datadg01?


Options are :

  • vxdg init datadg device_tag=datadg01
  • vxdg init datadg datadg01=device_tag
  • vxdg setup datadg datadg01=device_tag
  • vxdg define datadg device_tag=datadg01

Answer : vxdg init datadg datadg01=device_tag

ST0-135 Symantec Network Access Controls Technical Exam Set 3

What does migrating from thick to thin LUNs involve?


Options are :

  • attaching a plex
  • encapsulation
  • array-level mirroring
  • creating volume snapshots

Answer : attaching a plex

Which operation must be performed to change a layered volume to a non-layered volume?


Options are :

  • Convert the volume using the vxedit command
  • Convert the volume using the vxcdsconvert command
  • Convert the volume using the vxrelayout command
  • Convert the volume using the vxassist command

Answer : Convert the volume using the vxassist command

Which three are options for invalid recipient handling? (Select three.)


Options are :

  • Accept all recipients
  • Drop invalid recipients
  • Quarantine invalid recipients
  • Reject invalid recipients

Answer : Accept all recipients Drop invalid recipients Reject invalid recipients

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions