Vcehome > Symantec > SCS > 250-513 > 250-513 Online Practice Questions and Answers

250-513 Online Practice Questions and Answers

Questions 4

You have installed Storage Foundation 5.0 Standard server with a number of hosts. You want to centrally monitor and manage the hosts. You also want to generate reports for the hosts and the storage resources that the hosts consume.

What should you do?

A. Install the Veritas Quick I/O option on Storage Foundation 5.0 server.

B. Install Veritas Storage Foundation Management Server on Storage Foundation 5.0 server.

C. Install Veritas Storage Foundation Management Host on Storage Foundation 5.0 server.

D. Upgrade Storage Foundation 5.0 Standard to Storage Foundation 5.0 Enterprise.

Browse 305 Q&As
Questions 5

In which two ways can the default listener port for a detection server be modified? (Select two.)

A. through the Enforce user interface under System > Overview

B. by editing the Communication.properties file on a detection server

C. through the Enforce user interface under Manage > Policies

D. by editing the MonitorController.properties file on a detection server

E. by editing the model.notification.port file on a detection server

Browse 305 Q&As
Questions 6

While working under VxVM control, you get an error message "VxVM vxassist ERROR V-5-1-2935 No more space in disk group configuration." This message indicates that there is no more space in the disk group configuration database for VxVM object records.

How should you resolve this error?

A. Copy the contents of the volumes to another disk group.

B. Delete some files from the current disk for some free space.

C. Copy the contents of several volumes to another disk group and then delete the volumes from the current disk group.

D. Add an additional disk to perform the operation.

Browse 305 Q&As
Questions 7

A company needs to disable USB devices on computers that are generating a number of recurring DLP incidents. It decides to implement Endpoint Lockdown using Endpoint Prevent, which integrates with Symantec Endpoint Protection Manager and Symantec Management Platform. After incidents are still detected from several agents, the company determines that a component is missing.

Which component needs to be added to disable the USB devices once incidents are detected?

A. Control Compliance Suite

B. Workflow Solution

C. pcAnywhere

D. Risk Automation Suite

Browse 305 Q&As
Questions 8

When the system is configured to boot a volume from the root system, you get an error "VxVM vxconfigd ERROR V-5-1-1049 System boot disk does not have a valid rootvol plex".

How will you resolve this error?

A. Reboot the system.

B. Stop and restart the vxconfigd daemon on the node indicated.

C. Try to boot from one of the named disks using the associated boot command that is listed in the message.

D. Check other error messages appearing on the console and take the actions suggested in the descriptions of those messages.

Browse 305 Q&As
Questions 9

You are managing a Storage Foundation 5.0 server and want to capture an image of a file system at a selected instant for use in applications.

Which feature will you use to capture the image?

A. Veritas FlashSnap Point-in-Time copy

B. Veritas Volume Replicator

C. Configure the Veritas Storage Checkpoint option

D. Configure the Veritas Quick I/O option

Browse 305 Q&As
Questions 10

You administer a server that needs to support a large (~1 TB) end-user VxFS file system. The users request file restorations from backup several times per week. The amount of space required for a full-size copy of the file system's data is more than you have available.

What type of Storage Foundation object would be best suited to support this requirement for an undelete capability?

A. Full-sized instant snapshots

B. Break-off mirror snapshots

C. Space-optimized instant snapshots

D. File system storage checkpoints

Browse 305 Q&As
Questions 11

How does VxFS allocate storage in the storage array?

A. By allocating groups of extents

B. By allocating one block at a time

C. By allocating random blocks

D. By allocating one inode at a time

Browse 305 Q&As
Questions 12

Which two methods should an administrator use to exclude emails going to partner.com and all traffic going to a specific subnet? (Select two.)

A. Protocol filter

B. L7 recipient filter

C. Sender/User Matches pattern

D. L7 sender filter

E. IP filter

Browse 305 Q&As
Questions 13

How do you change the time limit for an I/O request in Dynamic Multi-Pathing (DMP) in Veritas Volume Manager on a Solaris operating system?

A. Modify the /kernel/drv/vxdmp.conf file by adding dmp_failed_io_threshold tunable parameter.

B. Modify the /kernel/drv/vxio.conf file by adding dmp_failed_io_threshold tunable parameter.

C. Modify the /kernel/drv/vxdmp.conf file by adding vol_maxio tunable parameter.

D. Modify the /kernel/drv/vxdmp.conf and /kernel/drv/vxio.conf files by adding dmp_failed_io_threshold tunable parameter.

Browse 305 Q&As
Exam Code: 250-513
Exam Name: Administration of Symantec Data Loss Prevention 12
Last Update: Apr 18, 2024
Questions: 305 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99