You are required to change a volume named vol1 in disk group mydg1 from a RAID-5 volume layout to a mirror-stripe (RAID 0+1) volume layout. You want to follow the correct procedure to change the volume layout. Which sequence of commands would you follow to achieve this goal?
A. vxassist -g mydg1 relayout vol1 layout=stripe-mirror vxassist -g mydg1 convert vol1 layout=mirror-stripe
B. vxassist -g mydg1 relayout vol1 layout=mirror-stripe
C. vxassist -g mydg1 convert vol1 layout=stripe-mirror vxassist -g mydg1 relayout vol1 layout=mirror-stripe
D. vxassist -g mydg1 convert vol1 layout=mirror-stripe
Which version of Oracle does Symantec Data Loss Prevention version 12.0 require for new installations or upgrading from 11.x to 12.0?
A. 10.2.0.1
B. 10.2.0.4
C. 11.2.0.2
D. 11.2.0.3
How should an administrator determine which Database version is running?
A. run the command select database version from database;
B. right click on database folder and select version
C. run the command select * from v$version;
D. look in add/remove programs for the database program
Which structure records are stored in the private region?(Each correct answer presents part of the solution. Select three.)
A. Disk group configuration
B. Disk and disk group ID
C. File system metadata
D. Disk group kernel log
E. Partition tables
You are the administrator for the Veritas Storage Foundation. Using Veritas Volume Manager, you want to migrate an internal boot disk to a SAN boot disk. Given the following steps:
1.
Add the target SAN disk to the boot disk group.
2.
Create a mirror of the root disk on the target disk.
3.
Verify that the Hardware Compatibility List for the target SAN disk being supported for SAN booting.
4.
Boot from the mirror disk to verify that the system is bootable. What are the sequential steps you need to follow to accomplish this?
A. 4,1,2,3
B. 3,1,4,2
C. 4,2,1,3
D. 2,3,1,4
A system administrator has a large amount of data that is not being accessed on the company's storage devices. This excess amount of data is causing slow access to the active data. You want to set up automatic relocation of data so that data expires as per its defined age.
What should you do?
A. Use the Data Movement Service (DMS) to set the threshold for automatic relocation of data.
B. Use the Quality of Storage Service (QoSS) to set the threshold for automatic relocation of data.
C. Use the Virtual Data Aging Service (VDAS) to set the threshold automatic relocation of data.
D. Use the Intelligent Volume Service (IVS) to set the threshold for automatic relocation of data.
Refer to the exhibit.
Symantec Data Loss Prevention's four phases of risk reduction model provides a blueprint for identifying and remediating key risk areas without disrupting legitimate business activity. What occurs during the notification phase?
A. Notification helps define confidential information and assign appropriate levels of protection to it using classifications.
B. On-Screen Pop-ups compare existing company information protection polices to best practices.
C. Notification helps develop a plan for integrating appropriate data security practices.
D. Automated sender notification educates employees in real-time about company policy violations.
You place six physical disks under Volume Manager control to create 10GB of volume. You want to use this volume as an archive directory. You need to create a volume that will store three copies of the archived data. Which command will you use to create a volume with three plexes?
A. vxassist make archivevol 30g layout=stripe-mirror nmirror=3
B. vxassist make archivevol 30g layout=stripe-mirror ncolumn=3
C. vxassist make archivevol 10g layout=stripe-mirror nmirror=3
D. vxassist make archivevol 10g layout=stripe-mirror ncolumn=3
The chief information security officer (CISO) is responsible for overall risk reduction and develops high-level initiatives to respond to security risk trends.
Which report will be useful to the CISO?
A. all high severity incidents that have occurred during the last week
B. all dismissed incidents violating a specific policy marked as false positive
C. all incidents from the previous month summarized by business units and policy
D. all new incidents that have been generated by a specific business unit during the last week
Refer to the exhibit.
Symantec Data Loss Prevention's four phases of risk reduction model provides a blueprint for identifying and remediating key risk areas without disrupting legitimate business activity.
According to this model, which activity should occur during the baseline phase?
A. monitor incidents and tune the policy to reduce false positives
B. define and build the incident response team
C. establish business metrics and begin sending reports to business unit stakeholders
D. test policies to ensure that blocking actions minimize business process disruptions
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-513 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.