A Storage Checkpoint is created with the command:
fsckptadm -R create thu_8pm /data1
Which statement about this checkpoint is correct if the file system runs out of space?
A. It can only be removed manually because it is a non-removable checkpoint.
B. It is removed even if it is mounted.
C. This and all subsequent checkpoints are recursively removed.
D. It is removed only if the checkpoint is unused.
Which three policy types can be applied at the group level? (Select three.)
A. Spam
B. Invalid recipients
C. Reputation
D. Virus
E. Compliance
In which two situations can FileSnap be used to create a space optimized copy of a file? (Select two.)
A. within the same directory, original has another owner with 0400 permissions
B. between two different directories on the same file system
C. within the same directory over an NFS exported Veritas File System (VxFS)
D. between two different Veritas File Systems (VxFS) on the same host
E. between the primary fileset and a Storage Checkpoint on the same file system
What is an advantage of the Veritas Storage Foundation 6.0 for UNIX checkpoint visibility feature?
A. ensures checkpoint is automatically deleted under certain conditions
B. eliminates the need for manually mounting storage checkpoints
C. specifies verbose mode, which displays extensive statistical information
D. automatically creates new checkpoints as changes are made to the file system
What are the key components of a group policy in Symantec Mail Security 8300?
A. a list of sender groups, sender authentication profiles, and scan settings for an organization
B. disposition configuration, user email addresses, and quarantine settings
C. an LDAP source and a local domain
D. conditions, a set of actions, and groups to whom the policy applies
What is the default inbound action for a suspected virus?
A. Delete the message in virus quarantine
B. Strip and hold the message in virus quarantine
C. Strip the message's attachment
D. Bounce the message back to the sender
Which command will print information for Dynamic Multi-pathing nodes on a system?
A. vxdmpadm iostat show
B. vxdmpadm config show
C. vxdmpadm stat dmpnode
D. vxdmpadm list dmpnode all
Which command is used to change the dmp_cache_open tunable?
A. vxdmpadm tune dmp_cache_open=on
B. vxtune dmp_cache_open=on
C. vxtune dmp_cache_open on
D. vxdmpadm settune dmp_cache_open=on
Dynamic Multi-Pathing (DMP) uses the I/O policy for distributing I/O load across multiple paths to a disk array or enclosure.
What is the default I/O policy for all arrays?
A. minimumq
B. priority
C. round-robin
D. adaptive
What is the default Dynamic Multi-Pathing (DMP) path restoration policy?
A. check_all
B. check_alternate
C. check_periodic
D. check_disabled
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-252 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.