What is a benefit of the Symantec Data Loss Prevention 9.0 security architecture?
A. Communication is initiated by the detection servers inside the firewall.
B. Mutual authentication between servers is based on the Challenge Handshake Authentication Protocol (CHAP).
C. Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (3DES).
D. Encryption is provided for confidential information across system components.
An administrator has configured Veritas Cluster Server (VCS) to periodically back up configuration files when the configuration is left open for update. What will be the resulting file name when VCS backs up the main.cf files?
A. main.cf.bak
B. main.cf.previous
C. main.cf.autobackup
D. main.cf.backup
Where are the installation log files created when Veritas Cluster Server is installed?
A. /opt/VRTS/install/logs/
B. /var/VRTS/install/logs/
C. /opt/VRTSvcs/install/logs/
D. /var/VRTSvcs/install/logs/
Which database does Symantec Data Loss Prevention 9.0 support for incident and policy storage?
A. Oracle 10g version 10.2.0.4
B. any version of Oracle 10g
C. Oracle 10g version 10.2.0.1
D. Microsoft SQL Server
Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover apply filters to?
A. Individual emails in the .pst file
B. The entire .pst file
C. Attachments in the .pst file D. Folders in the .pst file
A 2-node Veritas Cluster Server cluster has two dedicated Ethernet heartbeat links and I/O Fencing enabled.
What will happen if both heartbeat links simultaneously fail?
A. I/O Fencing takes over as the heartbeat mechanism.
B. All service groups are frozen on both nodes.
C. Both nodes panic and reboot into the cluster.
D. One node panics and the other remains running.
In a Veritas cluster, when all high priority links fail, the low priority links are promoted to high priority in which manner?
A. in order as they appear in /etc/llttab
B. in order by NIC name
C. all simultaneously regardless of number
D. one at a time as required
What is a situation that can be monitored by both Network Monitor and Endpoint Prevent?
A. An employee uses a Chrome 2 browser to post confidential data to a newsgroup.
B. An employee uses Skype to send an instant message to a friend at a competitor site.
C. An employee uses AIM to send an instant message while off the corporate network.
D. An employee uses Internet Explorer 7 to send confidential data from a Gmail account.
A power problem caused all nodes in the cluster to crash. One node has failed to reboot, and smoke is coming from the power supply. The administrator runs gabconfig -a and notices that port a has two of three nodes registered.
What should the administrator do to start Veritas Cluster Server on the running nodes?
A. edit /etc/llttab and change the -n3 option to -x
B. run hasys -force on one of the nodes to force HAD to start
C. run gabconfig -cx on both of the running nodes
D. run gabconfig -cx on one of the running nodes
Which report helps a compliance officer understand how the company is complying with its data security policies over time?
A. Policy Trend report, summarized by policy, then quarter
B. Policy Trend report, summarized by policy, then severity
C. Policy report, filtered on quarter, and summarized by policy
D. Policy report, filtered on date, and summarized by policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.