Which Network Protect feature is a system administrator unable to configure?
A. Ability to copy files
B. Ability to restore files
C. Location of quarantined files
D. Content of the file marker
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
A. Volume Replicator
B. Storage Replicator
C. NetBackup
D. Replication Exec
How is a policy applied to files found in Network Discover scans?
A. By assigning policy groups to the scan target
B. By choosing the correct policies in the scan target
C. By assigning policies to the Network Discover Server
D. By choosing the correct detection servers to run the scans
How can an incident responder remediate multiple incidents simultaneously?
A. By selecting a Smart Response on the Incident Snapshot page
B. By selecting an Automated Response on an Incident List report
C. By selecting a Smart Response on an Incident List report
D. By selecting the Find Similar command on the Incident Snapshot page
To which file system folder does PacketCapture write reconstructed SMTP messages?
A. drop
B. drop_pcap
C. drop_discover
D. drop_ttd
Only two local disks suitable for use as coordinator disks are available for a local muti-node cluster. Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/ O fencing configuration? (Select two.)
A. One-node CP server cluster with GAB and LLT configured
B. One-node CP server cluster with only LLT configured
C. Second network connection to the CP server cluster
D. Multi-node CP server cluster
E. I/O fencing on the CP server cluster
An employee received the following email notification:
***************************************************************************** *******************************************
Dear Bob,
Your email to [email protected] with subject Account Info you requested violates the company's
Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The
communication will then be automatically sent to the recipient in an encrypted form, in accordance with
company policy.
Please note that this violation has also been reported to your manager. Confidential data protection is
every employee's responsibility.
Thank you,
Corporate Information Security Team
***************************************************************************** *******************************************
Which recommended item is missing from this email notification?
A. A contact person
B. The severity of the violation
C. The affected business unit
D. The name of the file that caused the violation
An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites.
If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?
A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
C. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
D. One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site
Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.
Thinking specifically about data disks, which two cluster configuration requirements must be met to implement this? (Select two.)
A. The application using the disks must be managed by a VCS Application resource type.
B. The disks must be in a Veritas Volume Manager disk group.
C. The service group containing the disks must include an IP resource.
D. The disks must be managed by a VCS DiskGroup resource type.
E. The disks must contain at least one *.dbf file.
Which detection method includes keyword rules?
A. Exact Data Matching (EDM)
B. Directory Group Matching (DGM)
C. Described Content Matching (DCM)
D. Indexed Document Matching (IDM)
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.