ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 2

When configuring the DLP Agents, the File Recovery Area Location setting determines?


Options are :

  • location files, or update agents
  • secure file store incidents and information about the substances are offline
  • location of files through quarantine Endpoint Discover scans
  • None
  • a temporary backup location of blocked files

Answer : a temporary backup location of blocked files

ST0-135 Symantec Network Access Controls Technical Exam Set 7

A user has deleted the report template user-defined folder. As for the user to make use of this re-report template?


Options are :

  • None
  • Find the report template Application Server trash
  • Re-creation of reports work
  • Click More reports
  • Re-report template ready-made report templates

Answer : Re-report template ready-made report templates

Propulsion bv-Control query targeting Microsoft SQL Server 2005, Microsoft's component required information server?


Options are :

  • SQL Agent
  • Distributed Objects
  • Reporting Services
  • None
  • integration Services

Answer : Distributed Objects

The administrator recently applied to the configuration of the server. Upon inspection, however, none of the new settings will appear. What is the possible cause of this issue?


Options are :

  • None
  • The new configuration is copied and modified from the default configuration.
  • The server that the new configuration is applied needs to be recycled.
  • The new configuration is saved by applying it to an endpoint server.
  • Administrative permissions to restrict access to apply the new configurations.

Answer : The new configuration is saved by applying it to an endpoint server.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 4

What are the two policy management actions can lead to a smaller number of cases of a particular traffic flow? (Choose two.)


Options are :

  • By adding the data owner exceptions
  • Adding component matching rule
  • additional detection of the use of servers
  • increase in severity
  • Increasing condition match count

Answer : By adding the data owner exceptions Increasing condition match count

When you look at a snapshot of the SMTP case, which would bring the reporting Data Loss Prevention administrator used to quickly find the recent events in the same subject and sender?


Options are :

  • correlations case
  • case Notes
  • Case summary report
  • None
  • case History

Answer : correlations case

What are the two of the options will be using the Configure Server page of the network control server determines the protocol filters? (Choose two.)


Options are :

  • ICMP
  • HTTPS
  • FTP
  • SMTP
  • UDP

Answer : FTP SMTP

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 11

Which two sanitation activities are available online Protect? (Choose two.)


Options are :

  • Copy
  • quarantine
  • Block
  • Move
  • Rename

Answer : Copy quarantine

The answers to the evaluation module (RAM) installed after Symantec to enforce Suite 9.0 (9.0 CCS) reporting and analytics. What must be changed in order to connect the CCS 9.0 RAM?


Options are :

  • RAMServer.exe.config file
  • RAM DB assembly
  • None
  • DPS settings
  • RAM Server connection string

Answer : RAM DB assembly

In adopting the exemption in the field requires information officer?


Options are :

  • the requestor
  • requestor Group
  • requester Email ID
  • None
  • Comments

Answer : Comments

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

Whose property is the right to an exception?


Options are :

  • standard
  • period
  • None
  • tick
  • policy

Answer : tick

Which three database types are suitable for the RMS Information Server? (Choose three.)


Options are :

  • Remote Microsoft SQL Server 2005 Standard
  • a local Microsoft SQL Server 2005 Standard
  • a local Microsoft SQL Server 2005 Express
  • a local Microsoft SQL Server 2005 Enterprise
  • local Oracle 10g

Answer : a local Microsoft SQL Server 2005 Standard a local Microsoft SQL Server 2005 Express a local Microsoft SQL Server 2005 Enterprise

The company has SMTP Block troop levels on the e-mail in order to prevent their confidential information policies. Economic Division, says that e-mails containing sensitive information is sent to an external business partner is blocked. The company maintains a list of external business partners domains. How to policy can be changed so that emails are sent only to authorized recipients?


Options are :

  • None
  • Create a policy based on the new rule "Reply To model", more e-mail domains authorized business partners to model and select the "At least one recipient must be answered" Match Counting
  • add a policy based on the exceptional "To Reply to this model," adds e-mail domains authorized business partners to model and select "All recipients must respond" Match Counting
  • to copy confidential information policy, add a rule based on the "Reply to Sender model", and adds email addresses to all the employees of the finance department, select "All senders must correspond to the" Match Counting
  • add a policy based on the exceptional "To Reply to this model," adds e-mail domains authorized business partners to model and select the "At least one recipient must be answered" Match Counting

Answer : add a policy based on the exceptional "To Reply to this model," adds e-mail domains authorized business partners to model and select "All recipients must respond" Match Counting

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 11

Each step can be omitted from the installation and configuration process for a valid Mobile Device Management solution, which is used Symantec Data Loss Prevention tablet?


Options are :

  • to set up a backup and load balancing VPN connections
  • configure the VPN profile tamper-proofing
  • target profiles and submit them to the devices
  • VPN and SCEP profiles
  • None

Answer : to set up a backup and load balancing VPN connections

Every VPN configuration Data Loss Prevention solution tablets are not supported?


Options are :

  • Use the native iPad client for IPSec Juniper Networks SA VPN devices
  • Cisco AnyConnect client for Cisco ASA series VPN devices
  • ipad use the native IPSec client when the Cisco ASA series VPN devices
  • None
  • Use the Juniper Junos Pulse client when using Juniper Networks SA VPN devices

Answer : Use the native iPad client for IPSec Juniper Networks SA VPN devices

How cases are classified as network Prevent Data Loss Prevention Plus Tablets hybrid deployment?


Options are :

  • None
  • Incidents arising from all sources of traffic are generally classified.
  • Incidents are classified specifically based on the traffic source.
  • Classification for all events depends on the traffic to the destination.
  • All cases are classified as the Network category.

Answer : Incidents are classified specifically based on the traffic source.

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 3

Which is at least required to a standard user to open the RMS console and use the features associated with the query?


Options are :

  • is formed on the RMS Console User
  • must be part of the RMS console users local group
  • None
  • be to monitor Symantec Suite 9.0 Administrator role
  • must be part of the RMS system administrator users local group

Answer : is formed on the RMS Console User

For most organizations, password database accounts are changed regularly. Where action is recommended which is used for Symantec to enforce Suite 9.0 (9.0 CCS)?


Options are :

  • Require that CCS 9.0 administrator of the database administrator rights
  • Coordinate the password change to ensure database connectivity
  • Require that password exceptional CCS 9.0
  • Create a job that updates the settings information is automatically
  • None

Answer : Coordinate the password change to ensure database connectivity

In connection with the observance of information technology, what are the requirements?


Options are :

  • a number of commonly accepted best practices
  • opinions goals and objectives
  • a collection of methods to assess the compliance efforts
  • protector against specific risk or threat
  • None

Answer : a number of commonly accepted best practices

ST0-135 Symantec Network Access Control 12 Technical Exam Set 4

The dashboard driving the date is displayed in what form?


Options are :

  • None
  • Date and time of data processing service computers
  • Coordinated Universal Time (UTC) date and time
  • the date and time format of the application server
  • the date and time on the local computer

Answer : the date and time format of the application server

How Settlement Rules handled?


Options are :

  • None
  • Best fit matching, a number of rule matches
  • securities
  • CIA values
  • primarily, the first matching rule

Answer : primarily, the first matching rule

How does the user control the policies?


Options are :

  • asking questions
  • via regulations
  • via frames
  • via statements
  • None

Answer : via statements

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 6

The company is to scan all of the file shares on a weekly basis to ensure sensitive data is stored correctly. The total volume file servers, the data is more than 1 TB. What approach allows the company to quickly scan all of this information on a weekly basis?


Options are :

  • to drive the first scan of all shared files, then edit the scan target date filters to add them inside any files created or modified before the original check was made
  • to drive the first scan of all shared files, then edit the scan target of increasing the scan type
  • Amendment to create a separate object for each file share them within the files before each scan
  • None
  • drive shares in the first scanning of all files, create a summary report of accidents created by the scanner, run weekly scans and compares the cases of weekly full scan scans cases

Answer : to drive the first scan of all shared files, then edit the scan target of increasing the scan type

Where is Data Loss Prevention Administrator File Reader recycle process on the detection of the server?


Options are :

  • Server Detail page
  • System Overview page
  • Command Prompt
  • Windows Services
  • None

Answer : Server Detail page

During testing, Data Loss Prevention Discover network administrator to determine the objective to identify and quarantine confidential files. The aim is to set up default account data that is read-only permissions on the file server. After completion of the scan and check the results, the administrator will find a number of cases from the scan, points out that all confidential files are still in their original locations, but the configured quarantine directory contains confidential files. Which two look at the target configuration errors can cause the problem? (Choose two.)


Options are :

  • Stock list excludes all directories on the host to be scanned.
  • Default user information is incorrect.
  • Copy option is selected.
  • The quarantine / Share Copy user information is incorrect.
  • Protect your account information is undefined

Answer : Copy option is selected. Protect your account information is undefined

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 6

You have completed qio_convertdbfiles command to convert the database files to Quick I / O. The results of the command error, the database files are not on a VxFS file system. You must convert database files to Quick I / O. What should you do?


Options are :

  • Delete files mkgio.dat file.
  • Specify the type of database DB2.
  • Run the command to get qio_getdbfiles database files VxFS file system
  • Predefine the DB2 environment variable $ DB2DATABASE.
  • None

Answer : Delete files mkgio.dat file.

In order to obtain a proper disaster recovery plan, all Symantec to monitor Suite 9.0 server components that must be included in the backup strategy. Some of the ingredients, it is easiest to create a failed component installation. The other components of data backed up, and component software is reinstalled. Which three components are needed for backup? (Choose three.)


Options are :

  • directory server
  • Data processing Service
  • the production database
  • evidence database
  • application server

Answer : directory server the production database evidence database

What is the minimum number of computers needed to determine the role of each Data Service?


Options are :

  • 4
  • 2
  • None
  • 3
  • 1

Answer : 1

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

The company has created a profile Exact Data Matching and refers to its policy to safeguard the customer's credit card information. New customers in other countries, but the profile will be updated on a weekly basis. Until a profile can be updated, which should add a rule to protect the new credit card numbers?


Options are :

  • The detection method is a rule that is responsible for ensuring regular expressions
  • Separate detection of the rule, which uses the data identifier
  • None
  • Compound rule, which also corresponds to a data tag
  • The detection method is a rule that corresponds to the sender's / user

Answer : Separate detection of the rule, which uses the data identifier

In which case the agent status remains green (healthy) is the agent of Events page?


Options are :

  • None
  • Endpoint Server detects that the connection to the agent is lost.
  • Agent Service and the file system driver is running.
  • The substance has been able to restore the database file.
  • It is an agent or server authentication error.

Answer : Agent Service and the file system driver is running.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions