ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 12

Three of which are in force Reconciliation Rule titles Symantec to enforce Suite 9.0? (Choose three.)


Options are :

  • pre rule
  • Remove rule
  • update rule
  • Change rules
  • Add rule

Answer : pre rule update rule Add rule

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

The report model is scheduled. Where Result Report be located?


Options are :

  • Monitor> Jobs
  • My reports
  • My Documents folder
  • None
  • Predefined Reports

Answer : My reports

What is the condition of exported for viewing dashboards?


Options are :

  • None
  • Crystal Reports
  • Cognos
  • Adobe Flash
  • Java

Answer : Adobe Flash

Collecting data in the property, which is the most important factor in determining what kind of information do we collect?


Options are :

  • None
  • reference of property
  • baseline
  • scope
  • standard

Answer : standard

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 6

What is the process in which the address of the metadata resource?


Options are :

  • Dynamic grouping of assets
  • CSV Import
  • None
  • coding
  • A reconciliation of Policy Implementation

Answer : coding

When configuring the bv-Control for Microsoft SQL Server, including two authentication options? (Choose two.)


Options are :

  • SQL authentication
  • Basic authentication
  • Certificate-based authentication
  • Windows Authentication
  • Pass-through authentication

Answer : SQL authentication Windows Authentication

The administrator has received system event "table space is almost full." How the system administrator to resolve this problem?


Options are :

  • Creating more files in the Oracle database
  • Purge events from \ Vontu \ protect \ folder incidents
  • Start Vontu services
  • Start the Oracle database services
  • None

Answer : Creating more files in the Oracle database

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 6

When the installation manually Symantec DLP Agent how Data Loss Prevention Administrator to hide the agent registers with the Windows Control Panel?


Options are :

  • Select "Hide Control Panel" interface box installation
  • More ARPSYSTEMCOMPONENT = "1" in the installer script file
  • None
  • Select "ARPSYSTEMCOMPONENT" check box installation interface
  • More HIDECONTROLPANEL = 'yes' to the installer script file

Answer : More ARPSYSTEMCOMPONENT = "1" in the installer script file

Which two should be used to collect log data from servers in the Force? (Choose two.)


Options are :

  • Use the Log Collection and Configuration tool
  • Contact VontuSNMP service and set the community strings, respectively,
  • Use dbgmonitor connection from Sysinternals troubleshooting for profit service
  • Navigate to manually log directory of the server installation Force
  • Sign the log Force at https: /// logs? View = true

Answer : Use the Log Collection and Configuration tool Navigate to manually log directory of the server installation Force

Which three types of assets can be imported by default Symantec to enforce Suite 9.0 data import feature? (Choose three.)


Options are :

  • Windows machines
  • Windows users
  • UNIX machines
  • Exchange mailboxes
  • Windows domains

Answer : Windows machines UNIX machines Windows domains

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 3

Which three of the Enterprise Security Manager policy run options can be configured to monitor Symantec Suite 9.0? (Choose three.)


Options are :

  • The drive to the policy before the data collection
  • The drive to the policy of the days prior to the data collection
  • To collect information on recent policy runs
  • The drive to the policy, if the data is more than n days
  • To collect information on recent policy run

Answer : The drive to the policy before the data collection The drive to the policy, if the data is more than n days To collect information on recent policy run

How to Enterprise Security Manager settings are enabled Data Service?


Options are :

  • None
  • per domain
  • per group
  • per station
  • per organizational unit

Answer : per station

DLP agent is connected to the corporate network through a VPN. The administrator will see warning icon associated with the agent Agent overview page, select Enforce user interface. The administrator defines the warning associated with failure to update Active Directory group membership. What should the administrator do?


Options are :

  • Start DLP Agent
  • Start the Endpoint Server
  • Install DLP Agent
  • Update Active Directory Services
  • None

Answer : Start DLP Agent

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

The scanner does not return results after the end of the review process. What file should be removed to remove the previous scanning issues?


Options are :

  • None
  • ScannerControllerLogging.properties
  • logs
  • scanner_typeScanner.cfg
  • Clean.exe

Answer : scanner_typeScanner.cfg

What are the two reasons why the company should be taken to prevent data loss? (Choose two.)


Options are :

  • To demonstrate compliance with regulations
  • To protect the CISO liability due to security breaches
  • To prevent the threat of malicious software
  • Prevent the employee side measure
  • To protect brand and reputation

Answer : To demonstrate compliance with regulations To protect brand and reputation

Two of which are classified as impossible to deal with components of traffic report data elements? (Choose two.)


Options are :

  • traffic flow that is damaged
  • Traffic contains a password protected doc file
  • Packets arrive out of order
  • Excavation limit that has been exceeded
  • Transport, including jpg image

Answer : traffic flow that is damaged Excavation limit that has been exceeded

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

Data can be collected using two data collectors to monitor Symantec Suite 9.0? (Choose two.)


Options are :

  • XML
  • ESM
  • CSV
  • ODBC
  • AS400

Answer : ESM CSV

What can e-mail Block do to protect your confidential information in outbound email?


Options are :

  • add the title of the e-mail encryption gateway route
  • edit the e-mail attachment to remove confidential information
  • Use FlexReponse plug-in to change the e-mail operators
  • None
  • edit the e-mail body controlled by the quarantine camp location

Answer : add the title of the e-mail encryption gateway route

The business owner information is not available. Who can accept payment entitlements during his absence?


Options are :

  • None
  • Alternate owner information
  • Alternate approver
  • administrator
  • Any user with the role of approver

Answer : Alternate approver

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 10

Each response rule condition allows a policy manager determines the auto-reply rule to perform when the user is traveling?


Options are :

  • None
  • endpoint device
  • Endpoint Location
  • Protocol or Endpoint Monitoring
  • Sender / Reply: The user model

Answer : Endpoint Location

What is Network Monitor used to identify the SMTP network traffic going to non-standard port?


Options are :

  • string matching
  • signature of the protocol
  • None
  • the gate area
  • regular expressions

Answer : signature of the protocol

Which three database maintenance must be carried out to monitor the Symantec Suite 9.0? (Choose three.)


Options are :

  • purge evidence
  • defragment the databases
  • Purge stale data
  • shrink databases
  • Back up databases

Answer : defragment the databases shrink databases Back up databases

ST0-135 Symantec Network Access Technical Assesment Exam Set 1

Symantec recommends that the new system introduced Data Loss Prevention to replace the default encryption certificates are used to secure the data transmission between the server and the force detection servers. What is the right utility for generating new certificates for this communication?


Options are :

  • endpointkeytool.exe
  • certutil.exe
  • None
  • sslkeytool.exe
  • kinit.exe

Answer : sslkeytool.exe

In any cases appear in the Network Incident List, the network in order to prevent the effect of the filter is set to Modified?


Options are :

  • caused by digital rights applied to SMTP e-mail attachments
  • in cases where SMTP email was changed to include a specific title
  • caused by confidential content was removed from the SMTP e-mail
  • None
  • attachments were removed due to an SMTP e-mail

Answer : in cases where SMTP email was changed to include a specific title

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions