ST0-237 Symantec Loss Prevention Technical Practice Exam Set 11

When does the RMS Console Configuration Wizard appear? (Select two.)


Options are :

  • every time a new license has been added
  • after a bv-Control snap-in installation on the console computer
  • after a new Credential database has been applied to the user
  • the first time that a user opens the console after the installation or the upgrade
  • after the user has changed their default information server

Answer : after a bv-Control snap-in installation on the console computer the first time that a user opens the console after the installation or the upgrade

251-312 Administration of Symantec Backup Exec 12 for Exam Set 4

The administrator determines that \SymantecDLP\Protect\Incidents folder on Enforce contains .BAD files dated today while other .IDC files are flowing in and out of the \Incidents directory. Only .IDC files larger than 1MB are turning to .BAD. What could be causing only incident data smaller than 1MB to persist while incidents that are larger than 1MB change to .BAD files?


Options are :

  • detection server has excessive filereader restarts
  • corrupted policy was deployed
  • Enforce hard drive is out of free disk space
  • tablespace is almost full

Answer : tablespace is almost full

What must be done in order to create a new asset type?


Options are :

  • Import assets from this new type
  • Install a new bv-Control snapin
  • Create the asset type in the asset interface
  • Extend the asset schema

Answer : Extend the asset schema

In which case will the agent status remain green (healthy) on the Agent Events page?


Options are :

  • The Endpoint server detects that the connection with the agent is lost.
  • The agent service and file-system driver are running.
  • The agent is unable to restore a database file.
  • There is agent or server authentication failure.

Answer : The agent service and file-system driver are running.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

What should be used to add an Apple iPod device to a list of Endpoint devices?


Options are :

  • GLOBAL;MANUFACTURER;Apple*
  • USBSTOR\\DISK&VEN_APPLE&PROD_IPOD&.*
  • DEVICESTORE:*APPLE&IPOD*
  • CLASS/GENERIC/MUSIC/Apple

Answer : USBSTOR\\DISK&VEN_APPLE&PROD_IPOD&.*

You are accessing the public region of a drive. You get an error message stating that the disk has failed. What could be the possible reason for this message?


Options are :

  • VxVM can access the public and the private region of the drive but the plex on the drive is disabled.
  • VxVM can access the private region but there are uncorrectable I/O failures on the public region of the drive.
  • VxVM cannot access the private region or the public region of the drive.
  • VxVM can access the public region of the drive but there are uncorrectable I/O failures on the private region of the drive.

Answer : VxVM can access the public region of the drive but there are uncorrectable I/O failures on the private region of the drive.

What is the minimum number of computers required to configure each Data Processing Service role?


Options are :

  • 3
  • 4
  • 2
  • 1

Answer : 1

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

A company has created an Exact Data Matching profile and referenced it in a policy to protect customer credit card information. New customers are added daily, but the profile is updated weekly. Until the profile can be updated, which rule should be added to protect new credit card numbers?


Options are :

  • A detection rule that matches on sender/user
  • A separate detection rule that uses a data identifier
  • A detection rule that matches on regular expressions
  • A compound rule that also matches on a data identifier

Answer : A separate detection rule that uses a data identifier

In Symantec Control Compliance Suite 9.0, on which console section is Managing Reconciliation Rules located?


Options are :

  • Manage > Content
  • Settings > General
  • Monitor > Jobs
  • Manage > Assets

Answer : Manage > Assets

The Symantec Control Compliance Suite 9.0 (CCS 9.0) stores large amounts of data in databases. The database administrator must perform tasks on the databases outside of CCS 9.0 to maintain the databases and to ensure that the databases are performing at an acceptable level. Which three tasks should be routinely scheduled in SQL Server Management Studio? (Select three.)


Options are :

  • Refresh the databases
  • Rebuild the indexes
  • Back up the databases
  • Configure the databases
  • Update the database statistics

Answer : Rebuild the indexes Back up the databases Update the database statistics

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 2

Which two job types invoke the Data Processing Service data collector? (Select two.)


Options are :

  • Asset Import job
  • Reporting job
  • Evaluation job
  • Evidence Collection job
  • Data Collection job

Answer : Asset Import job Data Collection job

A policy author is creating a policy using a Data Identifier (DI) and needs to add keywords to help eliminate false positives. The policy author needs to avoid duplicates with the Keyword validators included with the DI. Where can the policy author find the list of validators?


Options are :

  • User Interface - Edit Policy > Edit Rule > More Info
  • Symantec Data Loss Prevention Install Guide
  • Symantec Data Loss Prevention Administration Guide
  • User Interface - Manage > Response Rules

Answer : User Interface - Edit Policy > Edit Rule > More Info

Silent installation can be performed for which component of Symantec Control Compliance Suite 9.0?


Options are :

  • application server
  • directory server
  • Data Processing Service
  • Response Assessment Module

Answer : Data Processing Service

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

What are two benefits that data loss prevention solutions provide? (Select two.)


Options are :

  • Identify who has access to sensitive data
  • Indicate where sensitive data is being sent
  • Give insight into capacity planning for sensitive data
  • Meet data retention requirements for business continuity
  • Provide accurate measurement of encryption strength

Answer : Identify who has access to sensitive data Indicate where sensitive data is being sent

In order to have a proper Disaster Recovery Plan, all Symantec Control Compliance Suite 9.0 server components need to be included in the backup strategy. For some components, it is easiest to recreate the installation of a failed component. For other components, the data is backed up and the component software is reinstalled. For which three components is a data backup needed? (Select three.)


Options are :

  • Production database
  • application server
  • directory server
  • Data Processing Service
  • Evidence database

Answer : Production database directory server Evidence database

Which command line diagnostic utilities would give a user the operating system version of the detection servers?


Options are :

  • Environment Check Utility
  • NormalizationConfigCheck.exe
  • Log Collection Utility
  • SC.exe

Answer : Environment Check Utility

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 4

An administrator has completed the example document training process, but is having difficulty deciding whether or not to accept a VML profile. Where can the administrator find information regarding the quality of each training set at a granular, per-fold level?


Options are :

  • machinelearning_native_manager.log file
  • machinelearning_training_process.log file
  • machinelearning_training.log file
  • machinelearning_native_filereader.log fil

Answer : machinelearning_training.log file

Which Oracle utility can be run from the Enforce box to test network connectivity between Enforce and the Oracle database?


Options are :

  • rman
  • sqlplus
  • rconfig
  • netca

Answer : sqlplus

Which System Administration page will display a list of the system servers as well as recent error-level and warning-level system events?


Options are :

  • System > Settings > General
  • System > Servers > Overview
  • System > Servers > Events
  • System > Servers > Alerts

Answer : System > Servers > Overview

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 12

Which command is used to save queries/commands written to the database when one of the following DMLs is used: Update, Insert, or Delete?


Options are :

  • :wq
  • finalize
  • commit
  • exit

Answer : commit

Which log should be reviewed first if a database issue is suspected?


Options are :

  • enforce_diagnostics.log
  • alert_.log
  • manager_operational.log
  • manager_jdbc.log

Answer : alert_.log

Which three are available Export Formats for Symantec Control Compliance Suite 9.0 reports? (Select three.)


Options are :

  • Comma Separated Values (CSV)
  • Rich Text
  • Microsoft Access (MDB)
  • Crystal Reports (RPT)
  • Adobe Reader (PDF)

Answer : Rich Text Crystal Reports (RPT) Adobe Reader (PDF)

250-352 Administration of Storage Foundation and HA 6.0 Test Set 9

Where are assets stored?


Options are :

  • Assets.XML
  • Production database
  • ADAM
  • RMS database

Answer : ADAM

Which products can be configured on the same detection server?


Options are :

  • Network Protect and Network Discover
  • Network Monitor and Network Prevent
  • Endpoint Discover and Network Discover
  • Network Monitor and Network Discover

Answer : Network Protect and Network Discover

Which three are components of a Reconciliation Rule? (Select three.)


Options are :

  • Rule Type
  • Select Asset Filter
  • Save in: Folder Selection
  • Asset Type
  • Set Asset Group

Answer : Rule Type Save in: Folder Selection Asset Type

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 2

What are two benefits of the Symantec Data Loss Prevention 11.5 security architecture? (Select two.)


Options are :

  • Communication is initiated by the detection servers inside the firewall.
  • All indexed data uploaded into the Enforce Platform is protected with a two-way hash.
  • SSL communication is used for user access to the Enforce Platform.
  • Confidential information captured by system components is stored using Advanced Encryption Standards (AES) symmetric keys
  • Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (Triple DES).

Answer : SSL communication is used for user access to the Enforce Platform. Confidential information captured by system components is stored using Advanced Encryption Standards (AES) symmetric keys

To manually troubleshoot DLP Agent issues, the database and log viewer tools must be executed in which location?


Options are :

  • in the same location as the is.ead file location
  • in the same location as the cg.ead file location
  • in the same location as the ks.ead file location
  • in the same location as the dcs.ead file location

Answer : in the same location as the ks.ead file location

During testing, a Data Loss Prevention administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, observes that all confidential files are still in their original location, but the configured quarantine directory contains the confidential files. Which two Discover target configuration mistakes might be causing the problem? (Select two.)


Options are :

  • The sharelist excludes all directories on the host being scanned.
  • The Default credentials are invalid.
  • The Protect credential is unspecified
  • The Copy option is selected.
  • The Quarantine/Copy Share credentials are invalid.

Answer : The Protect credential is unspecified The Copy option is selected.

ST0-135 Symantec Network Access Technical Assesment Exam Set 3

An administrator is attempting to check the status of the services for a detection server in the UI. The only option showing under System > Servers > Overview > Server Detail is 'Status'.What is a possible cause for the server details to show 'Status' only?


Options are :

  • Symantec Data Loss Prevention Standard Edition is installed
  • the services are failing to run
  • Advanced Process Control is unchecked
  • the user is logged in with a limited role

Answer : Advanced Process Control is unchecked

How are permissions to user-defined objects granted to individual users?


Options are :

  • Permissions are automatically assigned by role.
  • A custom role must be created to grant access.
  • The administrator must manually assign permissions.
  • They are granted through Active Directory.

Answer : The administrator must manually assign permissions.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions