250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 8

Under which high-level node in the left navigation panel can administrators find the Discover Targets page?


Options are :

  • Administration
  • Data at Rest
  • Policy
  • Reports

Answer : Policy

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 8

Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?


Options are :

  • Byte Throttling
  • Exclude Filtering
  • Inventory Mode Scanning
  • File Throttling

Answer : Inventory Mode Scanning

Which TrueMatch detection method can be evaluated at the agent level?


Options are :

  • Indexed Document Matching (IDM)
  • Exact Data Matching (EDM)
  • Directory Group Matching (DGM)
  • Described Content Matching (DCM)

Answer : Described Content Matching (DCM)

In addition to the full backup schedule type, which other schedule can be configured as a synthetic backup?


Options are :

  • Automatic backup
  • Differential incremental backup
  • Cumulative incremental backup
  • User backup
  • Application backup

Answer : Cumulative incremental backup

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 10

Which three are valid Scanned Content filter types for the Discover File System target? (Select three.)


Options are :

  • Read ACL filter
  • File Owner filter
  • Exclude filter
  • File Date filter
  • File Size filter

Answer : Exclude filter File Date filter File Size filter

Which three protocols are system-configured and are recognized by Network Monitor by their individual signatures? (Select three.)


Options are :

  • TFTP
  • IM: AIM
  • FTP
  • IM: ICQ
  • NNTP

Answer : IM: AIM FTP NNTP

Which three does the Environment Check Utility (ECU) provide? (Select three.)


Options are :

  • Days remaining on the current license
  • Software build numbers
  • Installation configuration settings
  • System events records
  • Operating system version of servers

Answer : Software build numbers Installation configuration settings Operating system version of servers

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

An administrator configures STU-A with the "On Demand Only" option. When will backups write to this storage unit?


Options are :

  • When all other storage units are unavailable
  • When the policy specifies STU-A as an attribute
  • When the Any Available storage unit is selected in the policy
  • When the storage unit specified in the policy is full or unavailable

Answer : When all other storage units are unavailable

What are three benefits that data loss prevention solutions provide that other security technologies or tools do not? (Select three.)


Options are :

  • Give visibility into where sensitive data is stored
  • Give insight into capacity planning for sensitive data
  • Identify who has access to sensitive data
  • Measure encryption strength for sensitive data
  • Indicate where sensitive data is being sent

Answer : Give visibility into where sensitive data is stored Identify who has access to sensitive data Indicate where sensitive data is being sent

What is required to implement Auto Image Replication?


Options are :

  • BasicDisk or AdvancedDisk storage units and at least two master servers
  • BasicDisk or AdvancedDisk storage units and at least one master server
  • OST-compliant appliances or MSDP and at least two master servers
  • OST-compliant appliances or MSDP and at least one master server

Answer : OST-compliant appliances or MSDP and at least two master servers

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

An administrator must recover an expired image from a tape where only one remaining copy exists and there are other unexpired images on the tape. How should the administrator proceed?


Options are :

  • Run the Tape Contents report
  • Run an import on the tape
  • Verify the tape
  • Duplicate the unexpired images

Answer : Run an import on the tape

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 10

If Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict?


Options are :

  • Endpoint Prevent queues files until resources are available.
  • Endpoint Discover pauses any scans if resources are needed.
  • Endpoint Prevent pauses detection until any scans complete.
  • Endpoint Discover copies all files for later analysis

Answer : Endpoint Discover pauses any scans if resources are needed.

What is an advantage of using the Device Configuration Wizard to configure robots and tape devices?


Options are :

  • The wizard simplifies whether drives will be placed in a media manager or NDMP storage unit.
  • The wizard is the only method that allows for configuration of shared drives.
  • The wizard indicates whether the latest device drivers have been installed before attempting configuration.
  • The wizard eliminates the possibility that a drive will be mapped to the wrong physical location in a robot.

Answer : The wizard eliminates the possibility that a drive will be mapped to the wrong physical location in a robot.

What is one function of a Network Discover scanner?


Options are :

  • It collects content and metadata from a variety of repositories.
  • It scans an organization's network to identify Network Discover targets.
  • It sends collected content to the Enforce Server for processing.
  • It specifies the types of repositories that can be scanned.

Answer : It collects content and metadata from a variety of repositories.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

Where can administrators find an installation checklist for installing Symantec NetBackup 7.5 patches?


Options are :

  • sort . symantec.com
  • fileconnect . symantec.com
  • Symantec.Cloud
  • ftp.support . symantec.com

Answer : sort . symantec.com

On which system(s) is the Symantec NetBackup 7.5 LiveUpdate agent installed by default?


Options are :

  • Master server only
  • Master server, media server, and client
  • Master server and media server only
  • Media server and client only

Answer : Master server, media server, and client

By default, how long will a failed restore job remain in an Incomplete state prior to being moved to a Done state?


Options are :

  • one day
  • three days
  • until the administrator cancels the restore job
  • seven days

Answer : seven days

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 12

Where on the Endpoint Server Detail page can a system administrator configure the throttling option?


Options are :

  • Agent Configuration section
  • Agent Filtering section
  • Agent Listener section
  • Agent Monitoring section

Answer : Agent Configuration section

When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?


Options are :

  • Export incidents
  • Set severity
  • Delete incidents
  • Add comments

Answer : Add comments

In the Symantec NetBackup Administration Console or Java console, how should a Symantec NetBackup administrator down a disk pool for maintenance?


Options are :

  • Media and device > Disk storage > Right-click and down the affected disk pool
  • Device monitor > Disk pool > Right-click and down the affected disk pool
  • Credentials > Storage server > Right-click and down the affected disk pool
  • Devices > Disk pool > Right-click and down the affected disk pool

Answer : Device monitor > Disk pool > Right-click and down the affected disk pool

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

What should be used to exclude email going to any email address in the partner.com domain?


Options are :

  • IP filter
  • Content filter
  • L7 filter
  • Sender/User Matches pattern

Answer : L7 filter

What should an administrator do when the License Key expires?


Options are :

  • Edit the key in the VontuManager.conf file
  • Edit the key in the Protect.properties file
  • Enter a new key on the System Settings page
  • Enter a new key on the Advanced Settings page

Answer : Enter a new key on the System Settings page

Why would a customer select "Use Change Journal" in the Symantec NetBackup 7.5 client settings?


Options are :

  • To identify changes of the client's VxFS change journal
  • To increase performance of an NTFS volume file system that contains a few very large files
  • To increase performance of an NTFS volume that contains more than 1,000,000 files
  • To increase performance of a VxFS volume that contains more than 1,000,000 files

Answer : To increase performance of an NTFS volume that contains more than 1,000,000 files

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 5

An organization needs to have backups span between different BasicDisk storage units. The "Allow backups to span disk" setting has been enabled in the host properties. What else is required to allow backups to span disks?


Options are :

  • Create a disk pool with all the appropriate disk volumes
  • Enable the "Enable standalone drive extension" setting in host properties
  • Put the BasicDisk storage units in a storage unit group
  • Configure the media server as a storage server

Answer : Put the BasicDisk storage units in a storage unit group

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files). Which two Discover target configuration mistakes might be causing the problem? (Select two.)


Options are :

  • The Copy option is selected.
  • The Quarantine/Copy Share credentials are invalid.
  • The sharelist excludes all directories on the host being scanned.
  • The Protect credential is unspecified
  • The Default credentials are invalid.

Answer : The Quarantine/Copy Share credentials are invalid. The Protect credential is unspecified

What does a data loss prevention solution help an organization identify? (Select three.)


Options are :

  • risk of virus infection
  • encryption enforcement opportunities
  • employee education opportunities
  • illegally obtained software on desktops
  • unprotected content on laptops

Answer : encryption enforcement opportunities employee education opportunities unprotected content on laptops

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 7

Which detection server requires the use of two network card ports?


Options are :

  • Network Prevent Server
  • Network Monitor Server
  • Endpoint Server
  • Discover Server

Answer : Network Monitor Server

A backup job exits with "Status Code 1: the requested operation was partially successful". Which resource will provide useful information on the specific cause of this issue?


Options are :

  • The All Log Entries report
  • The bptm log on the media server involved in the backup job
  • The Client Backups report
  • The bpcd log on the client system for the job

Answer : The All Log Entries report

The file system on a server is corrupt and a restore is required. The system is being backed up using True Image Restore with move detection enabled. The most recent backups of this file system are displayed below: - Monday: A full backup - Tuesday: A differential incremental backup - Wednesday: A cumulative incremental backup - Thursday: A differential incremental backup What is the minimum number of restores required to restore all of the most recent data for this server?


Options are :

  • Two
  • One
  • Four
  • Three

Answer : One

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to "Modified"?


Options are :

  • incidents in which an SMTP email was changed to include a specified header
  • incidents in which confidential content resulted in a blocked Web mail
  • incidents in which confidential content was removed from a Web mail
  • incidents in which confidential content was removed from an SMTP email

Answer : incidents in which an SMTP email was changed to include a specified header

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions