Filters
Question type

Study Flashcards

You are administering the Volume Manager in Cluster environment in the datacenter showing a type of write failure on a slave node. You are not able to view the write failure occurred to other nodes in the cluster. What will be the cluster behavior under the local disk detach policy? (Each correct answer presents part of the solution.) (Select two.)


A) I/O is stopped for the node that first saw the failure.
B) Application using the volume is also notified about the failure.
C) Cluster Management software moves the application to a live node.
D) Slave node continues to perform I/O operation from and to the volume.

Correct Answer

verifed

verified

What will Image Composition Analysis detect when the "heuristics" setting is selected within Image Control?


A) Images with embedded content
B) Spoofed images
C) Confidential images
D) Pornographic images

Correct Answer

verifed

verified

A DLP administrator needs to decide if using Symantec Management Console (SMC) will provide additional functionality over the built-in Agent Actions that can be performed via Agents > Overview > Summary Reports. What are two of the Agent Actions that can be performed with SMC that are unable to be used with the built-in Agent Actions?  (Select two.)


A) Set Under Investigation
B) Get Agent Configuration
C) Toggle Print Screen
D) Set Log Level
E) Gather Endpoint detection server logs

Correct Answer

verifed

verified

A DLP administrator is testing Web Prevent functionality. When the administrator posts a small test file to a cloud storage website, a new incident fails to appear. What should the administrator do to allow incidents to be generated against this file?


A) uncheck trial mode under the ICAP tab
B) change the 'Ignore Requests Smaller Than' value to 1
C) add the filename to the Inspect Content Type field
D) change the PacketCapture.DISCARD_HTTP_GET value to 'false'

Correct Answer

verifed

verified

A software company needs to protect its source code including new source code between indexing times. Which detection method should the company use to meet this requirement?


A) Exact Data Matching (EDM)
B) Described Content Matching (DCM)
C) Indexed Document Matching (IDM)
D) Vector Machine Learning (VML)

Correct Answer

verifed

verified

You are administering Veritas Volume Manager on the UNIX platform, and you need to remove the volume using vxassist command. Given the following steps: 1. Remove the volume entry from the /etc/vfstab file. 2. Remove all references to the volume by application programs. 3. Stop all Activity by VxVM on the volume using vxvol stop command. 4. Unmount the volume, which is mounted as a file system. What are the necessary sequential steps you need to follow before removing the volume?


A) 4,2,1,3
B) 3,1,4,2
C) 1,4,3,2
D) 2,4,3,1

Correct Answer

verifed

verified

Consider a situation where you run the vxdmpadm start restore command and encounter an error message "VxVM vxdmpadm ERROR V-5-1-3243 The VxVM restore daemon is already running" How will you solve this error?


A) Stop vxdmpadm and restart vxdmpadm.
B) Stop vxdmpadm and start vxdarestore.
C) Stop vxdmpadm and reboot the system.
D) Restart the all the VxVM daemons.

Correct Answer

verifed

verified

You have installed site awareness licenses on all hosts in the remote mirror configuration. You want the volume to be automatically mirrored across sites when it is created and you specify the allsites=on attribute with the vxassist command. Which read policy do you need to set to accomplish this task?


A) Siteread policy
B) Round robin policy
C) Prefer policy
D) Select policy

Correct Answer

verifed

verified

How does an administrator create a detailed report for Email Security.cloud Anti-Malware scanning?


A) Report request wizard within ClientNet
B) Report request wizard within Administrator Quarantine
C) Contact support via ClientNet
D) Contact support via email

Correct Answer

verifed

verified

Showing 401 - 409 of 409

Related Exams

Show Answer