ST0-237 Symantec Loss Prevention Technical Practice Exam Set 6

When reviewing an SMTP incident snapshot, which reporting feature would a Data Loss Prevention administrator use to quickly find recent incidents with the same subject and sender?


Options are :

  • Incident Correlations
  • Incident History
  • Incident Summary report
  • Incident Notes

Answer : Incident Correlations

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 10

A company needs to scan all of its file shares on a weekly basis to make sure sensitive data is being stored correctly. The total volume of data on the file servers is greater than 1 TB. Which approach will allow the company to quickly scan all of this data on a weekly basis?


Options are :

  • run an initial complete scan of all the file shares, then modify the scan target to an incremental scan type
  • create a separate scan target for each file share and exclude files accessed before the start of each scan
  • run an initial complete scan of all file shares, create a summary report of all incidents created by the scan, then run weekly scans and compare incidents from weekly scans to incidents from the complete scan
  • run an initial complete scan of all the file shares, then modify the scan target to add date filters and exclude any files created or modified before the initial scan was run

Answer : run an initial complete scan of all the file shares, then modify the scan target to an incremental scan type

Which two dates must be selected when creating an exception request? (Select two.)


Options are :

  • expiration date
  • start date
  • effective date
  • due date
  • evaluation date

Answer : expiration date effective date

When configuring DLP Agents, what does the File Recovery Area Location setting determine?


Options are :

  • the secure filestore of incidents and data while agents are offline
  • the location of files quarantined through Endpoint Discover scans
  • the location of files for redeployment or upgrade of agents
  • the temporary backup location of blocked files

Answer : the temporary backup location of blocked files

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 5

How are permissions granted to predefined objects?


Options are :

  • The administrator must manually add permissions
  • Permissions are automatically granted when the user is added to a role.
  • Permissions are granted through Active Directory.
  • Permissions can only be granted to CCS administrators.

Answer : Permissions are automatically granted when the user is added to a role.

In the Reports > Predefined folder, which two actions can the user perform? (Select two.)


Options are :

  • Delete report templates
  • Customize certain report templates
  • Edit the report template properties to add user-defined values
  • Add report templates from CSV files
  • Schedule report templates

Answer : Customize certain report templates Schedule report templates

Which VPN configuration for the Data Loss Prevention for Tablets solution is unsupported?


Options are :

  • use the native iPad IPSec client when using the Juniper Networks SA VPN appliances
  • use the Juniper JunOS Pulse client when using the Juniper Networks SA VPN appliances
  • use the Cisco AnyConnect client when using the Cisco ASA series VPN devices
  • use the native iPad IPSec client when using the Cisco ASA series VPN devices

Answer : use the native iPad IPSec client when using the Juniper Networks SA VPN appliances

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 3

Which Symantec Control Compliance Suite 9.0 component is responsible for most intercomponent transactions?


Options are :

  • Directory Support Service
  • Information Server Service
  • Application Server Service
  • Data Processing Service

Answer : Application Server Service

An incident responder can see basic incident data, but is unable to view any specific details of the incident. What is the configuration for this role?


Options are :

  • Server administration rights have been deselected.
  • Incident Access tab conditions are specified.
  • Custom attributes have been selected and set to View Only.
  • The View option is selected and all display attributes are deselected.

Answer : The View option is selected and all display attributes are deselected.

For greater accuracy, what is the minimum recommended number of columns in a data source for use in an Exact Data Matching (EDM) profile?


Options are :

  • 4
  • 2
  • 5
  • 3

Answer : 3

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

Which throttling option is available when creating a Server SharePoint Discover target?


Options are :

  • maximum items per minute
  • maximum sites per hour
  • maximum encountered errors
  • maximum request per front-end server

Answer : maximum items per minute

When should Network Discover Scanners be used?


Options are :

  • to automatically remove sensitive files from data repositories
  • to scan data repositories that require special access methods to be readable
  • to scan and index documents from remote file servers for use in policies
  • to find open file shares on the network

Answer : to scan data repositories that require special access methods to be readable

What are two available options when accessing the Configure Server page of a Network Monitor server to configure protocol filters? (Select two.)


Options are :

  • UDP
  • ICMP
  • HTTPS
  • FTP
  • SMTP

Answer : FTP SMTP

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Which two policy management actions can result in a reduced number of incidents for a given traffic flow? (Select two.)


Options are :

  • Deploying to additional detection servers
  • Adding data owner exceptions
  • Adding additional component matching to the rule
  • Adding additional severities
  • Increasing condition match count

Answer : Adding data owner exceptions Increasing condition match count

With respect to the entitlements workflow, what is the first step that is performed?


Options are :

  • Gather business data
  • Assign a data owner
  • Mark control point
  • Import entitlements

Answer : Mark control point

The dashboard run date is displayed in which format?


Options are :

  • the date and time format of the application server
  • the date and time of the local computer
  • the Coordinated Universal Time (UTC) date and time
  • the date and time of the Data Processing Service computers

Answer : the date and time format of the application server

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 1

When approving an exception, which field requires input from the approver?


Options are :

  • Requestor Group
  • Requestor Email ID
  • Comments
  • Requestor

Answer : Comments

How can agentless asset data collection speed be improved on a large network?


Options are :

  • Set up multiple information server deployments on the network
  • Tune the SQL database for performance
  • Install the console on a faster machine
  • Install RMS and Symantec Control Compliance Suite 9.0 on the same box

Answer : Set up multiple information server deployments on the network

Which three are prerequisites for RMS installation? (Select three.)


Options are :

  • Windows Installer 3.1
  • Microsoft SQL Server 2005 Express
  • Internet Information Server
  • Microsoft .NET Framework 2.0
  • Crystal Report 2008

Answer : Windows Installer 3.1 Microsoft SQL Server 2005 Express Microsoft .NET Framework 2.0

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

A company has SMTP Prevent deployed with email blocking enabled in their confidential data policy. The finance department reports that emails containing sensitive data sent to external business partners are being blocked. The company maintains a list of the external business partner domains. How can a policy be modified so that emails are sent only to authorized recipients?


Options are :

  • create a new rule in the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting
  • duplicate the confidential data policy, add a rule based on "Sender Matches Pattern", and add the email addresses of all employees in the finance department, select "All senders must match" for Match Counting
  • add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "All recipients must match" for Match Counting
  • add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "At least 1 recipient must match" for Match Counting

Answer : add an exception to the policy based on "Recipient Matches Pattern", add the authorized email domains of business partners to the recipient pattern and select "All recipients must match" for Match Counting

For most organizations, the password for the database accounts is changed on a regular basis. Which action is recommended for the account that is used by Symantec Control Compliance Suite 9.0 (CCS 9.0)?


Options are :

  • Create a job that refreshes the settings information automatically
  • Coordinate the password change to ensure database connectivity
  • Require that the CCS 9.0 have a password exception
  • Require that the CCS 9.0 administrator also have database administrator rights

Answer : Coordinate the password change to ensure database connectivity

Which command line utility generates custom authentication keys to improve the security of the data that is transmitted between the Enforce server and detection servers?


Options are :

  • keytool
  • sslkeytool
  • servertool
  • endpointkeytool

Answer : sslkeytool

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

How is a policy applied to Network Discover scans?


Options are :

  • by assigning policy groups to the scan target
  • by choosing the correct policies in the scan target
  • by choosing the correct targets to run the policies
  • by assigning policies to the Network Discover Server

Answer : by assigning policy groups to the scan target

Which two components are required for the Symantec Data Loss Prevention for Tablets solution in addition to the Tablet Prevent and Enforce servers? (Select two.)


Options are :

  • 2010 Exchange Server
  • Web Proxy
  • Virtual Private Network Gateway
  • Mobile Device Management
  • DLP Agent

Answer : Web Proxy Virtual Private Network Gateway

Which three are valid Reconciliation Rule types in Symantec Control Compliance Suite 9.0? (Select three.)


Options are :

  • Change Rule
  • Add Rule
  • Update Rule
  • Pre Rule
  • Delete Rule

Answer : Add Rule Update Rule Pre Rule

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

Which response rule condition allows a policy manager to configure an Automated Response rule to execute while a user is travelling?


Options are :

  • Endpoint Device
  • Endpoint Location
  • Sender/User Matches Pattern
  • Protocol or Endpoint Monitoring

Answer : Endpoint Location

Within an evaluation result, the status Unknown is primarily defined with which check setting?


Options are :

  • check expression
  • data items filter
  • missing data items
  • precondition

Answer : missing data items

Which three asset types can be imported using the default Symantec Control Compliance Suite 9.0 data collection import feature? (Select three.)


Options are :

  • Windows domains
  • Windows machines
  • Windows users
  • Exchange mailboxes
  • UNIX machines

Answer : Windows domains Windows machines UNIX machines

250-253 Administration of Veritas Cluster Server 6.0 Exam Set 6

Which two requirements must be met to successfully use Network Monitor on a Windows based detection server? (Select two.)


Options are :

  • ARP proxy must be enabled to ensure the Windows system captures all traffic.
  • The network interface card must support Jumbo frames.
  • At least two network interfaces must be available.
  • WinPCAP must be installed on the Windows system.
  • Wireshark must be installed on the Windows system.

Answer : At least two network interfaces must be available. WinPCAP must be installed on the Windows system.

A Data Processing Service in a Load Balancer role distributes jobs to Data Processing Services in which two roles? (Select two.)


Options are :

  • BladeRunner
  • Load Balancer
  • Evaluator
  • Scheduler
  • Collector

Answer : Evaluator Collector

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions