The vxassist convert command can be used to convert between which two volume layouts? (Select two.)
A. mirror-stripe to stripe-mirror
B. mirror-stripe to RAID-5
C. concat-mirror to concat
D. mirror-stripe to stripe
E. concat-mirror to mirror-concat
Which firewall port should be opened to download antispam rulesets from Symantec?
A. 80
B. 443
C. 41025
D. 41443
Which command is used to gather buffer cache statistics for a Veritas File System (VxFS)?
A. fiostat
B. vxstat
C. vxfsstat
D. vxmemstat
A disk group with four disks contains a two-column striped and mirrored volume.
Which step must be performed first to change the volume to have three columns without losing the redundancy?
A. use the vxassist command to relayout the volume
B. use the vxrelayout command to relayout the volume
C. use the vxassist command to convert the volume
D. use the vxdg command to add two disks to the disk group
What is the primary purpose of Compliance Folders?
A. to block attempts to send confidential information outside the organization
B. to monitor, track, and remediate violations of a policy
C. to provide access to the document storage repository to monitor potential policy violations
D. to store archived messages
Which Storage Foundation utility is used to generate random read and random write workloads so that the performance of a file system can be analyzed?
A. vxbench
B. vxtrace
C. vxstat
D. vmstat
An administrator suspects that file creation performance is degraded in several directories on a Veritas File System (VxFS).
Which command should be used to analyze directory organization?
A. fsadm
B. fiostat
C. fsapadm
D. fsppadm
A file is compressed using vxcompress with a strength of 3. The owner subsequently needs to change it to a strength of 9.
Which steps must the owner take?
A. unmount file system, remount with new tunables
B. rename the file, recompress with strength 9
C. uncompress file, recompress with strength 9
D. rerun vxcompress with strength 9
Which two Symantec Mail Security 8300 Control Center components can be used to store email security violations? (Select two.)
A. Suspect virus quarantine
B. Email virus logging
C. Message audit logs
D. Email spam quarantine
E. Instant message quarantine
Which command is used to display current file system I/O parameters for a Veritas File System (VxFS)?
A. vxtune
B. vxtunefs
C. vxfsio
D. fsadm
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-252 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.