Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
What is the correct configuration for BoxMonitor.Channels that will allow the server to start as a Network Monitor server?
(Multiple Choice)
4.9/5
(45)
When you are administrating Veritas Volume Manager on the Solaris platform, you want to remove a disk using vxdiskunsetup command from the Veritas Volume Manager without erasing the VxVM metadata on the disk. What is the necessary step you need to do before running the command in the scenario and to prevent a data loss?
(Multiple Choice)
4.8/5
(35)
You are installing the Storage Foundation Management Server 1.0 in Storage Foundation 5.0 Environment. What resource you require before installing?
(Multiple Choice)
4.9/5
(38)
You are not able to find a physical device corresponding to the disk ID in the disk media record when one of the subdisks associated with the plex fails. You need to check the plex state to solve the problem. What will be the status of the plex in this situation?
(Multiple Choice)
4.9/5
(39)
Which is responsible for detecting incoming traffic that matches specific IP addresses or subnets? (Choose the best answer.)
(Multiple Choice)
4.8/5
(39)
What are the two characteristics for an email to be considered Spam? (Choose two.)
(Multiple Choice)
4.9/5
(32)
Where can an Incident Responder view Cynic results in ATP?
(Multiple Choice)
4.8/5
(33)
You are required to change a volume named vol1 in disk group mydg1 from a RAID-5 volume layout to a mirror-stripe (RAID 0+1) volume layout. You want to follow the correct procedure to change the volume layout. Which sequence of commands would you follow to achieve this goal?
(Multiple Choice)
4.9/5
(39)
An Incident Responder wants to run a database search that will list all client named starting with SYM. Which syntax should the responder use?
(Multiple Choice)
4.8/5
(36)
You have just installed Storage Foundation 5.0 with Veritas Volume Manager and Veritas File System. You want to ensure that you are able to successfully install Veritas FlashSnap Agent for Symmetrix 5.0 on Storage Foundation server. What should you do to ensure you meet the required goal?
(Multiple Choice)
4.8/5
(37)
Which two (2) fields are essential to the tracking and reporting of an associated asset when creating a lease schedule in IT Management Suite 8.1? (Choose two.)
(Multiple Choice)
4.8/5
(40)
What should an administrator utilize in policies to specify which traffic should be decrypted? (Choose the best answer.)
(Multiple Choice)
4.9/5
(36)
When investigating Driver Management Issues in Deployment Solution, an administrator tries to import a known working driver named NIC_Intel_C8121.CAB, but the Driver Manager stalls and becomes non-responsive after 5 minutes. What is the cause of the program stalling?
(Multiple Choice)
4.9/5
(44)
You have to recommend appropriate virtual storage configurations for use by specific classes of applications, based on the details of each application's I/O requirements. Your application generates large volumes of temporary data. The RAID configuration for temporary space should aim to maximize I/O throughput. You also need to ensure that there is no unnecessary space overhead. Which RAID layout should you use?
(Multiple Choice)
4.7/5
(40)
How should an administrator determine which Database version is running?
(Multiple Choice)
5.0/5
(48)
What is the purpose of Email Security.cloud Click-Time protection?
(Multiple Choice)
4.9/5
(44)
Which two pieces of system information are collected by Symantec Data Loss Prevention Supportability Telemetry? (Select two.)
(Multiple Choice)
4.7/5
(39)
Which National Institute of Standards and Technology (NIST) cybersecurity function is defined as "finding incursions"?
(Multiple Choice)
4.8/5
(34)
Which quarantine settings are able to be managed within the Administrator Quarantine for Email Security.cloud?
(Multiple Choice)
4.7/5
(35)
Showing 201 - 220 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)