A Veritas Volume Manager (VxVM) disk named Disk_4 has been removed from the datadg disk group. Which command is used to remove this disk from Veritas Volume Manager (VxVM) control?
A. vxdisk -g datadg rmdisk Disk_4
B. vxdiskunsetup Disk_4
C. vxdg -g datadg rmdisk Disk_4
D. vxdisksetup -r Disk_4
Which component do you configure to enable the Instant Messaging security proxy?
A. Premium Content Control
B. Control Center
C. Conduit
D. Scanner
A server with one disk group is running Veritas Storage Foundation 6.0 for UNIX and suffers a system board failure. An administrator moves the disks in that disk group to a new server. When the administrator tries to import the disk group, the import fails.
Which command should the administrator use to successfully import the disk group?
A. vxdg -C import
B. vxdg -f import
C. vxdg -n newname import
D. vxdg -t import
Which statement is true regarding the encrypted attachment disposition in the Virus policy settings?
A. it is a subset of the 'unscannable' disposition
B. it leverages TLS or gateway to gateway encryption
C. the default action is to delete
D. it also includes password protected files
Which Veritas Storage Foundation 6.0 for UNIX user interface provides a menu-driven, text- based interface for performing some disk and disk group administration?
A. Veritas Enterprise Administrator (VEA)
B. Veritas Operations Manager (VOM)
C. vxedit
D. vxdiskadm
Which command can be run from the command line interface of a Scanner appliance to list, backup or restore the current message audit logging logs?
A. nslookup
B. ipconfig
C. malquery
D. mallog
Which two Veritas Storage Foundation 6.0 for UNIX commands are used to prevent and allow multipathing of Veritas Volume Manager (VxVM) devices? (Select two.)
A. vxdiskadm
B. vxddladm
C. fsvoladm
D. vxdmpadm
E. vxsfadm
What is the function of the Symantec Mail Security 8300 Transformation Engine?
A. based on configured policies, it performs the required actions on the message
B. based on configured policies, it scans the message for attributes and violations
C. based on default policies, it stores spam and virus messages
D. based on default policies, it provides automated synchronization from LDAP
Which command is used to manually configure the Veritas Volume Manager (VxVM) product?
A. vxconfigd
B. vxinstall
C. vxdiskadm
D. vxdctl enable
Which display command consolidates information from Veritas Volume Manager (VxVM) and Veritas File System (VxFS)?
A. vxprint
B. vxadm
C. vxsfadm
D. vxlist
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-252 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.