Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An administrator running a company's first Discover scan needs to minimize network load. The duration of the scan is unimportant. Which method should the administrator use to run the Discover scan?

Free
(Multiple Choice)
4.7/5
(44)
Correct Answer:
Verified

C

Which deployment method represents a single point of failure? (Choose the best answer.)

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

You are writing the change documents for a procedure to relay a volume. In which two cases is it necessary to specify a target plex for the "vxassist relayout" operation? (Each correct answer presents part of the solution. Select two.)

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B,C

Under which conditions does a policy-driven trace generate a trace? (Choose the best answer.)

(Multiple Choice)
4.7/5
(33)

Which type of attack is executed by a cybercriminal posing as a senior executive of a company that targets other executives within that same organization?

(Multiple Choice)
4.9/5
(26)

An administrator receives the following error: Error Code:3018 lt;profile name> has reached maximum size. Only 44245 out of 97737 documents are indexed. What must the administrator do to resolve this error?

(Multiple Choice)
4.8/5
(43)

What is a benefit of using Microsoft SQL as the Symantec Endpoint Protection Manager (SEPM) database in regard to ATP?

(Multiple Choice)
4.8/5
(39)

Which component of IT Management Suite 8.1 can an administrator use for management of both Windows and Mac OS X based computers?

(Multiple Choice)
4.9/5
(43)

An ATP Administrator set up ATP: Network in TAP mode and has placed URLs on the blacklist. What will happen when a user attempts to access one of the blacklisted URLs?

(Multiple Choice)
4.7/5
(40)

You are administering the Veritas Volume Manager. While working on the Veritas Volume Manager, you execute the vxprint -hvt command. What will be the outcome of the command?

(Multiple Choice)
4.9/5
(36)

An organization is considering an ATP: Endpoint and Network deployment with multiple appliances. Which form factor will be the most effective in terms of performance and costs?

(Multiple Choice)
4.8/5
(37)

What is the purpose of Email Track and Trace?

(Multiple Choice)
4.8/5
(34)

What component of the Symantec Management Platform defines all the information that a Symantec Management Agent would require in order to establish a connection to a Notification Server or Site Server?

(Multiple Choice)
4.9/5
(33)

Where can an administrator locate the "Pen Number" for an email quarantined by Anti-Malware?

(Multiple Choice)
4.9/5
(26)

How can an Incident Responder generate events for a site that was identified as malicious but has NOT triggered any events or incidents in ATP?

(Multiple Choice)
4.9/5
(33)

Which service is provided by the ProxySG? (Choose the best answer.)

(Multiple Choice)
4.9/5
(29)

You have collected performance data from an e-commerce Oracle database using the vxstat command. You are creating a similar e-commerce Oracle database to serve as a backend for an e-commerce website. You also want to ensure optimal Online Transaction Processing (OLTP) throughput by balancing the I/O across as many disks as possible. What should you do?

(Multiple Choice)
4.9/5
(41)

In which caching technique are objects that require more server-side bandwidth and response time less likely to be deleted from the cache? (Choose the best answer.)

(Multiple Choice)
4.8/5
(29)

Which server encrypts the message when using a Modify SMTP Message response rule?

(Multiple Choice)
4.9/5
(37)

You were working with Veritas Volume Manager and the Volume Manager failed due to disk failure. You are required to recover the Veritas Volume Manager Configuration. Identify the correct sequence of actions that you would perform in this situation. 1. Reinstall the operating system 2. Replace the failed disk 3. Recover the VxVM configuration 4. Add the Volume Manager Packages 5. Startup Hot-relocation 6. Clean up the system configuration

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 409
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)