250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 7

Which statement describes a DLP Agent encryption feature?


Options are :

  • DLP Agent-to-server communication uses Secure Socket Layer (SSL).
  • The key size is standard and unconfigurable.
  • The system administrator can generate a unique authentication key.
  • The key is randomly generated for the agent store.

Answer : The system administrator can generate a unique authentication key.

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 8

Which three products support virtualization and can be run on virtual machines? (Select three.)


Options are :

  • Network Discover
  • Endpoint Discover
  • Network Prevent (Email)
  • Network Prevent (Web)
  • Network Monitor

Answer : Network Discover Network Prevent (Email) Network Prevent (Web)

What is required to use Symantec NetBackup Auto Image Replication?


Options are :

  • Only one replication operation can be configured within the SLP.
  • Symantec NetBackup RealTime must be installed and configured on a separate server.
  • The SLP in domain1 must have the same name as the Import SLP in domain2.
  • "Any Available" Storage Unit must be selected.

Answer : The SLP in domain1 must have the same name as the Import SLP in domain2.

What is a likely outcome of filtering network traffic in Network Monitor?


Options are :

  • Monitoring of traffic important to the customer
  • Increase in Network Monitor demand for RAM
  • Monitoring of outbound traffic before inbound traffic
  • Decrease in the detection accuracy

Answer : Monitoring of traffic important to the customer

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 7

Which two products are required for quarantining confidential files residing inappropriately on a public file share? (Select two.)


Options are :

  • Endpoint Discover
  • Network Monitor
  • Network Protect
  • Network Discover
  • Network Prevent

Answer : Network Protect Network Discover

An administrator is using storage lifecycle policies to create multiple backup copies. What is the result if one of the copies fails?


Options are :

  • All copies fail
  • The copy retries once and then fails
  • The copy fails and the cascaded jobs continue
  • The copy will retry

Answer : The copy will retry

To which file system folder does PacketCapture write reconstructed SMTP messages?


Options are :

  • drop_pcap
  • drop_ttd
  • drop
  • drop_discover

Answer : drop_pcap

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 6

A customer needs to restore individual objects and attributes in Active Directory. Which two tasks must be performed to achieve this? (Select two.)


Options are :

  • Install the NetBackup File System (NBFS) on the client
  • Install the Network File System (NFS) on the client
  • Choose the "Enable granular recovery" option in the policy
  • Choose Active Directory policy type
  • Choose the "Use accelerator" option in the policy

Answer : Install the Network File System (NFS) on the client Choose the "Enable granular recovery" option in the policy

A Windows policy is created with Allow Multiple Data Streams enabled. The hosts s1 and s2 are added as the client list and the backup selections listed below are specified. NEW_STREAM C:\ NEW_STREAM D:\ NEW_STREAM E:\ NEW_STREAM F:\ The drives listed below are present on the hosts. s1 has C:\ D:\ and E:\ s2 has C:\ D:\ and F:\ How many data streams will be created when the backup runs for both clients?


Options are :

  • Two
  • Three
  • Eight
  • Six

Answer : Eight

An administrator needs to configure a backup policy to run only on the 1st and 15th day of each month. The Calendar Schedule tab is absent from the schedule window. How does the administrator get the Calendar Schedule tab to display, so that the schedule can be configured for specific days?


Options are :

  • Change the schedule type from Frequency to Calendar
  • Enable specific days using the bpplsched command line
  • Enable specific days using the master server's host properties
  • Configure a start window within the schedule

Answer : Enable specific days using the master server's host properties

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 2

Which two operations are valid first steps in a storage lifecycle policy in Symantec NetBackup 7.5? (Select two.)


Options are :

  • duplication
  • backup from snapshot
  • import
  • replication
  • backup

Answer : import backup

Which types of information are backed up by a cumulative incremental backup schedule?


Options are :

  • Files and folders that have changed since the last differential incremental, cumulative incremental, or full backup
  • Files and folders that have changed since the last full backup
  • Files that have changed since the last incremental or full backup
  • Files and folders that have changed since the last cumulative incremental or full backup

Answer : Files and folders that have changed since the last full backup

How can an administrator back up application data that resides on a hardware disk array without affecting CPU or disk resources?


Options are :

  • enable the Master Server Property - Client Attribute "Enable Windows Open File Backups" to use Microsoft Volume Shadow Copy Service (VSS)
  • enable the "Perform snapshot backup" policy attribute, choose the auto Snapshot method, and select the "Perform off-host backup" attribute
  • enable the Master Server Property - Client Attribute "Enable Windows Open File Backups" to use Veritas Snapshot Provider (VSP) with a Global Drive Snapshot
  • enable the "Perform snapshot backup" policy attribute, choose the vxvm Snapshot method, and select the "Perform off-host backup" attribute

Answer : enable the "Perform snapshot backup" policy attribute, choose the auto Snapshot method, and select the "Perform off-host backup" attribute

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

Which report helps a compliance officer understand how the company is complying with its data security policies over time?


Options are :

  • Policy report, filtered on quarter, and summarized by policy
  • Policy report, filtered on date, and summarized by policy
  • Policy Trend report, summarized by policy, then severity
  • Policy Trend report, summarized by policy, then quarter

Answer : Policy Trend report, summarized by policy, then quarter

Auto Image Replication is being used to replicate New York backups to London. The New York backups have completed. What is the next step?


Options are :

  • Image duplicated to London using a storage lifecycle policy to a media server deduplication pool
  • Image duplicated to London using a storage lifecycle policy to a Disk Staging Storage Unit
  • Image duplicated to London using a Disk Staging Storage Unit
  • Image duplicated to London using Symantec NetBackup Vault to tape

Answer : Image duplicated to London using a storage lifecycle policy to a media server deduplication pool

What is the default incident data retention behavior for Network Monitor and Network Prevent?


Options are :

  • Messages and attachments are retained
  • Neither messages nor attachments are retained.
  • Only attachments are retained.
  • Only messages are retained.

Answer : Messages and attachments are retained

251-312 Administration of Symantec Backup Exec 12 for Exam Set 2

A backup is configured with a 10 minute checkpoint interval. The third checkpoint interval expires in the middle of transferring the file images.zip. The backup fails 7 minutes later, after transferring images.zip and three additional files. Where does the backup resume?


Options are :

  • At the previous checkpoint
  • At the beginning of images.zip
  • At the point of failure in images.zip
  • At the end of images.zip

Answer : At the end of images.zip

An organization needs to automatically back up a server's data every other Sunday with a backup start window from 7:00 PM to 10:00 PM. It is expected that manual backups will never be run. How can this backup schedule be configured to ensure it runs every other Sunday at 7:00 PM?


Options are :

  • Scheduletype:Frequency, once per 13 days
  • Scheduletype:Calendar CalendarSchedule:Recurring Week Days: 1st and 3rd Sunday
  • Scheduletype:Frequency, once per 2 weeks
  • Scheduletype:Calendar CalendarSchedule:Recurring Week Days: 2nd and 4th Sunday

Answer : Scheduletype:Frequency, once per 13 days

What are three valid reasons for adding comments to incidents? (Select three.)


Options are :

  • To provide detail to the next responder when escalating an incident
  • To provide detail for report filtering
  • To allow the next responder to more quickly prioritize incidents for review
  • To provide detail when closing an incident
  • To allow the next responder to more quickly understand the incident history

Answer : To provide detail to the next responder when escalating an incident To provide detail when closing an incident To allow the next responder to more quickly understand the incident history

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 6

All users, regardless of their role permissions, are allowed to configure which two reporting options? (Select two.)


Options are :

  • Ability to look up custom attributes
  • Ability to print reports to PDF
  • Ability to delete incidents
  • Ability to select reports to display
  • Ability to set the default report

Answer : Ability to select reports to display Ability to set the default report

Which type of rule do incident responders use to remediate an incident?


Options are :

  • Incident response rule
  • Smart Response rule
  • Automated response rule
  • Policy response rule

Answer : Smart Response rule

An administrator needs to protect multiple clients that contain multiple data volumes to removable media. Which policy setting in Symantec NetBackup 7.5 will perform the backup the fastest?


Options are :

  • Multiplexing
  • Accelerator
  • Disable client deduplication
  • Enable client compression

Answer : Multiplexing

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 12

A UNIX client has the mount points listed below. /var /usr /opt /home A backup policy for this client has "Allow multiple data streams" enabled and contains a backup selections list with the ALL_LOCAL_DRIVES directive. It also contains an exclude list that excludes /home. What happens when this backup policy runs?


Options are :

  • The backup job for /home is partially successful because /home is excluded.
  • All backup jobs complete successfully.
  • Backup jobs are created for all mount points except for /home.
  • The backup job for /home fails because /home is excluded.

Answer : The backup job for /home fails because /home is excluded.

Which Network Protect feature is a system administrator unable to configure?


Options are :

  • Ability to copy files
  • Location of quarantined files
  • Ability to restore files
  • Content of the file marker

Answer : Ability to restore files

Which information is recommended to be included in an Exact Data Matching (EDM) data source?


Options are :

  • Numeric fields with fewer than five digits
  • Date fields
  • Column names in the first row
  • Country, state, or province names

Answer : Column names in the first row

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

A system administrator examines the results of a completed scan. Which information is available on a scan listing on the Discover Targets page? (Select three.)


Options are :

  • Elapsed time and total time for each scan
  • File structure and location
  • User who initiated the scan
  • Number of items changed since the previous scan
  • Number of items scanned
  • Errors encountered

Answer : Elapsed time and total time for each scan Number of items scanned Errors encountered

Where are backup selections configured?


Options are :

  • in the client's host properties
  • on a configuration file on the client
  • in the policy on the master server
  • in the relational database on the master server

Answer : in the policy on the master server

Why should Network Monitor be configured to filter out low-threat traffic?


Options are :

  • Because no other traffic will be monitored until this is accomplished
  • Because the product is unable to filter out high-threat traffic
  • To ensure that CPU cycles are spent processing high-threat traffic
  • To verify that the filtering process is actually working

Answer : To ensure that CPU cycles are spent processing high-threat traffic

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

In which two cases will the agent status remain green (good) on the Agent Events page? (Select two.)


Options are :

  • There was an agent service shutdown during machine shutdown.
  • The agent closed the connection to the Endpoint Server.
  • There was agent or server authentication failure.
  • The Endpoint Server detected that the connection with the agent was lost.
  • The agent is unable to restore a database file.

Answer : There was an agent service shutdown during machine shutdown. The agent closed the connection to the Endpoint Server.

Which statement applies to a Symantec NetBackup 7.5 calendar based schedule in a policy of type Standard?


Options are :

  • A calendar based schedule is incompatible with a frequency based schedule.
  • Configuring a start window spanning midnight is invalid.
  • An Exclude date may be configured to occur on an included recurring day of the week.
  • The backup may run on a day with a closed backup window with Retries allowed after runday.

Answer : An Exclude date may be configured to occur on an included recurring day of the week.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions