Where on the Endpoint Server Detail page can a system administrator configure the throttling option?
A. Agent Listener section
B. Agent Monitoring section
C. Agent Configuration section
D. Agent Filtering section
To cluster an application with Veritas Cluster Server, an administrator must obtain which license(s)?
A. Permanent licenses tied to the system host ID
B. Demo license for at least one cluster node
C. Valid licenses to run on all cluster nodes
D. Keyless licenses for the application
Which three are valid Scanned Content filter types for the Discover File System target? (Select three.)
A. Exclude filter
B. File Size filter
C. Read ACL filter
D. File Owner filter
E. File Date filter
What is the default incident data retention behavior for Network Monitor and Network Prevent?
A. Only messages are retained.
B. Only attachments are retained.
C. Neither messages nor attachments are retained.
D. Messages and attachments are retained.
Which TrueMatch detection method can be evaluated at the agent level?
A. Exact Data Matching (EDM)
B. Indexed Document Matching (IDM)
C. Described Content Matching (DCM)
D. Directory Group Matching (DGM)
Which three functions of the communications architecture ensure that the system is able to automatically recover should a network connectivity failure occur between the detection servers and the Enforce Server? (Select three.)
A. Database backup
B. Autonomous monitoring
C. Automatic synchronizing
D. Incident queuing
E. Alert archiving
When a policy is applied for detection, how are exceptions evaluated?
A. Exceptions then detection rules
B. Detection rules then exceptions
C. Exceptions then response rules
D. Response rules then exceptions
What is the recommended deployment location for Network Monitor?
A. Inside the secured corporate LAN
B. Within the demilitarized zone (DMZ)
C. In its own isolated virtual LAN (VLAN)
D. On the WAN side of the corporate router
An administrator wants to change the name of an existing NIC resource from net0nic to net4nic. The resource is configured in the websg service group. What is the most efficient method to rename the NIC resource?
A. hares -ren net0nic net4nic
B. hares -add net4nic websg
hares -modify net4nic Device eth0
hares -delete net0nic
C. hares -duplicate net0nic net4nic hares -delete net0nic
D. hares -copy net0nic net4nic hares -paste net4nic hares -delete net0nic
What are three valid reasons for adding comments to incidents? (Select three.)
A. To provide detail to the next responder when escalating an incident
B. To allow the next responder to more quickly prioritize incidents for review
C. To allow the next responder to more quickly understand the incident history
D. To provide detail when closing an incident
E. To provide detail for report filtering
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.