250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 6

What should a system administrator do to stop a detection server?


Options are :

  • Access the Enforce Server Detail page and select "Done"
  • Access a command prompt and enter the command "net stop service VontuMonitor"
  • Access the services panel and stop the VontuMonitorController service
  • Access the Server Detail page and select "Stop"

Answer : Access the Server Detail page and select "Stop"

How should a policy manager write policies that adhere to compliance regulations effectively and easily?


Options are :

  • by using a compliance data identifier in the policy
  • by using a policy template and editing as necessary
  • by copying an existing policy and editing as necessary
  • by creating a new blank policy and adding fitting rules

Answer : by using a policy template and editing as necessary

By default, new media is assigned to which volume pool during robot inventory without a configured barcode rule?


Options are :

  • Symantec NetBackup pool
  • Default pool
  • Scratch pool
  • None pool

Answer : Symantec NetBackup pool

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

A tape library had the robot firmware upgraded and now the robot is reading the barcodes with additional characters. What can be done so that Symantec NetBackup 7.5 uses the same characters as before the firmware upgrade occurred?


Options are :

  • Update the Media ID Generation setting
  • Update the Media Type mapping
  • Update the Robot Type mapping
  • Update the Barcode Rules setting

Answer : Update the Media ID Generation setting

An administrator needs to protect a large volume of data with millions of files to tape. Which policy feature should the administrator use?


Options are :

  • Use multiple streams
  • FlashBackup
  • Deduplication
  • Use accelerator

Answer : FlashBackup

What is the master administrator user (created during installation) unable to do?


Options are :

  • Save custom reports and then share them with others in the system
  • Create an incident responder role that sees incidents only from Endpoint Discover scans
  • Create a policy author role that has access to just one policy group
  • Remove a detection server from system configuration without uninstalling the detection server

Answer : Save custom reports and then share them with others in the system

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

What is commonly observed during the Notification phase of Risk Reduction?


Options are :

  • Improved employee communication
  • Asignificant drop in incident volume
  • More business unit involvement
  • Improved business processes

Answer : Asignificant drop in incident volume

A Standard policy is created with default settings. The hosts s1 and s2 are added as the client list. ALL_LOCAL_DRIVES is specified as the Backup Selection. Host s1 has the mount points listed below. / /opt /usr Host s2 has the mount points listed below. / /usr How many streams will be created when the policy runs for both clients?


Options are :

  • one
  • three
  • five
  • two

Answer : two

Where can an incident responder view all actions that have occurred for an incident?


Options are :

  • Incident Actions
  • Incident Snapshot
  • System Events
  • Auditlog Table

Answer : Incident Snapshot

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 10

Which two can cause a Symantec NetBackup job to run more frequently than expected? (Select two.)


Options are :

  • True image restore with move detection
  • Apolicy schedule that allows multiple copies
  • An administrator changing a policy
  • Image expiration
  • Presence of a synthetic backup schedule in the policy

Answer : An administrator changing a policy Image expiration

Under which high-level node in the left navigation panel can administrators find the System Events report?


Options are :

  • System Health
  • Policy
  • Reports
  • Administration

Answer : Administration

Which relational database management system (RDBMS) does Symantec Data Loss Prevention 9.0 support?


Options are :

  • Sybase
  • Oracle
  • IBM
  • MySQL

Answer : Oracle

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

An administrator configures a Symantec NetBackup 7.5 environment where there is only one tape drive available. The storage unit multiplex setting is 5. The schedule multiplex setting is 3. Six backup jobs initiate from that schedule. Given this configuration, how many backup streams will be multiplexed?


Options are :

  • 15
  • 5
  • 3
  • 1

Answer : 3

A company decided to automatically allocate all media to any volume pool on demand. Which two steps must be performed to meet this requirement? (Select two.)


Options are :

  • Use vmpool to set volume pools for on demand allocation
  • Delete the scratch pool to allow for automatic volume allocatio
  • Create volume pools as required without adding any volumes to the pools
  • Define a scratch pool and add all of the volumes to it
  • Create barcode rules to automatically allocate volumes

Answer : Create volume pools as required without adding any volumes to the pools Define a scratch pool and add all of the volumes to it

Which feature is a key benefit of onscreen notification?


Options are :

  • It informs endpoint users when they try to copy or transmit confidential data from the endpoint.
  • It informs endpoint users that the DLP agent has just been installed on their computers.
  • It informs endpoint users when an Endpoint Discover scan identifies confidential files on their computers.
  • It informs the system administrator when specified system events have occurred within the system.

Answer : It informs endpoint users when they try to copy or transmit confidential data from the endpoint.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

Discover Servers can leave Marker Files for files moved to the quarantine location. Which file types retain their file extension and the corresponding icon in the Marker File?


Options are :

  • All file types configured in Windows Explorer on the detection server host
  • Microsoft Office documents
  • File types specified in the ProtectRemediation.properties file
  • Text files, including source code in Java, C, and shell script

Answer : File types specified in the ProtectRemediation.properties file

By default, which port does the Enforce Server use to connect to all detection servers?


Options are :

  • 443
  • 8100
  • 8000
  • 1293

Answer : 8100

Which two recommendations should an organization follow when deploying Endpoint Prevent? (Select two.)


Options are :

  • Test the agent on a variety of end-user images
  • Enable monitoring of many destinations and protocols simultaneously
  • Enable monitoring of the local file system first
  • Configure blocking as soon as the agents are deployed
  • Configure, test, and tune filters

Answer : Test the agent on a variety of end-user images Configure, test, and tune filters

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 1

Which file is created during Symantec NetBackup 7.5 catalog backup?


Options are :

  • Vfm.conf file
  • Critical policy file
  • Disaster recovery file
  • Catalog.dr file

Answer : Disaster recovery file

Which command is used to determine the state of an AdvancedDisk storage server?


Options are :

  • nbdevconfig
  • nbdevquery
  • nbemmcmd
  • nbdiscover

Answer : nbdevquery

A site needs to perform file system backups of Solaris, Red Hat, Windows 2003, and Windows 2008 clients. Backups are initiated by the Symantec NetBackup 7.5 scheduler and the backup of specific files are also initiated by the administrators of the client hosts. Both full and differential backups must be performed. What is the minimum number of policies and schedules that must be configured?


Options are :

  • 2 policies with 4 schedules in each policy
  • 4 policies with 2 schedules in each policy
  • 2 policies with 3 schedules in each policy
  • 4 policies with 3 schedules in each policy

Answer : 2 policies with 3 schedules in each policy

ST0-085 Symantec Security Information Manager Technical Exam Set 3

The administrator of a large bank needs to preserve financial information for an extended period of time. The bank's Symantec NetBackup 7.5 catalog is now over 800 GB in size, causing the catalog backups to contend for resources with production system backups. How can the administrator shorten the time needed to back up the Symantec NetBackup catalog?


Options are :

  • create a catalog archive policy and execute it from the command line using the catarc command
  • back up the Symantec NetBackup catalog by scheduling an online Sybase database backup policy to allow the Catalog Backup to run without contending for resources with the production system backups
  • use the Symantec NetBackup 7.5 client-side deduplication feature to shorten the time it takes to perform a Symantec NetBackup Catalog Backup
  • use the Symantec NetBackup 7.5 Agent for Symantec Enterprise Vault to perform an online archive of the Symantec NetBackup Catalog

Answer : create a catalog archive policy and execute it from the command line using the catarc command

What is the sequence of message processing for Network Monitor?


Options are :

  • Detection -> Packet Capture -> Incident Writer
  • Incident Persister -> File Reader -> Manager
  • Packet Capture -> File Reader -> Incident Writer
  • Incident Persister -> Manager -> Notifier

Answer : Packet Capture -> File Reader -> Incident Writer

Which three are examples of confidential data? (Select three.)


Options are :

  • Published press releases
  • National ID numbers
  • CAD drawings
  • Health information
  • Manufacturing plant locations

Answer : National ID numbers CAD drawings Health information

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

Which Symantec NetBackup 7.5 feature replicates images to a different Symantec NetBackup domain?


Options are :

  • Optimized duplication
  • Replication director
  • Optimized image replication
  • Auto image replication

Answer : Auto image replication

Which two types of stakeholders should be included when writing policies? (Select two.)


Options are :

  • Marketing
  • Risk management
  • Compliance
  • Messaging team
  • Education

Answer : Risk management Compliance

What is an advantage of using a Dashboard report?


Options are :

  • Incident reponders can execute Smart Responses from them.
  • They allow incidents to be viewed across multiple products.
  • They can be used as work queues for incident responders.
  • Incident responders can see the history of each incident.

Answer : They allow incidents to be viewed across multiple products.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

In addition to creating an automated response rule, which action must a policy manager take for the rule to execute?


Options are :

  • Enable Remediate Incidents privilege in the appropriate role
  • Add the response rule to the appropriate policy
  • Turn on response rules from the Settings page
  • Click the Response Rule button to execute

Answer : Add the response rule to the appropriate policy

How is a policy applied to files found in Network Discover scans?


Options are :

  • By assigning policy groups to the scan target
  • By choosing the correct policies in the scan target
  • By choosing the correct detection servers to run the scans
  • By assigning policies to the Network Discover Server

Answer : By assigning policy groups to the scan target

A Symantec NetBackup 7.5 administrator at a hospital needs to store secure tape copies of protected data to an offsite location. How can an administrator automatically eject tape media daily and create detailed reports?


Options are :

  • configure a storage lifecycle policy to enable automatic ejects and create reports, then enable the Encryption attribute on the policy
  • use tape drives that support hardware encryption and use a storage lifecycle policy to performautomated ejects and create reports
  • enable the Encryption attribute on the vault policy to perform automated ejects and create reports
  • use tape drives that support hardware encryption and use a Vault policy to perform automated ejectsand create reports

Answer : use tape drives that support hardware encryption and use a Vault policy to perform automated ejectsand create reports

250-254 Administration of Symantec Cluster Server 6.1UN Exam Set 5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions