Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
What is unable to be configured for the Email Security.cloud Anti-Malware Service?
(Multiple Choice)
4.8/5
(25)
In which scenario should an Incident Responder manually submit a file to the Cynic portal?
(Multiple Choice)
4.8/5
(34)
Why should an organization publish a Send Policy Framework (SPF) Record to DNS?
(Multiple Choice)
4.8/5
(41)
Which section of the ATP console should an ATP Administrator use to evaluate prioritized threats within the environment?
(Multiple Choice)
4.9/5
(39)
Which section of the sysinfo file would an administrator examine to see how specific components are behaving? (Choose the best answer.)
(Multiple Choice)
4.8/5
(42)
You have large number of mirrored volumes, and the resynchronization process on mirrored volumes will take lot of time. You want to address enable Dirty Region Logging (DRL) and find out the cause why it takes a long time for resynchronization. You want to check the status of DRL logging to see if it is already enabled. How will you accomplish this task?
(Multiple Choice)
4.8/5
(33)
The VxVM operation fails while importing a disk group and you get an error message "VxVM vxdg ERROR V-5-1-2907 diskgroup: Disk group does not exist" How will you solve this problem?
(Multiple Choice)
4.9/5
(38)
A DLP administrator is attempting to use Encryption Insight to detect confidential information in encrypted files but has been unsuccessful. It is determined that the process was unable to retrieve the appropriate PGP key because the user key was using the incorrect encryption mode. What is the correct encryption mode that must be used by the user key?
(Multiple Choice)
4.7/5
(40)
A large organization wants to stagger the installation of software updates with computers in different organizational groups by installing the updates on different days. How can an administrator accomplish this without continually creating separate software update policies that target the different organizational groups?
(Multiple Choice)
4.8/5
(39)
While working under VxVM control, you get an error message "VxVM vxassist ERROR V-5-1-2935 No more space in disk group configuration." This message indicates that there is no more space in the disk group configuration database for VxVM object records. How should you resolve this error?
(Multiple Choice)
4.6/5
(30)
An administrator implements a policy to block confidential data from being posted to Facebook. The policy generates incidents but allows the content to be posted. Which action should the administrator take to resolve this issue?
(Multiple Choice)
4.9/5
(30)
You are creating a volume and need the storage allocated in: 1. Concatenated disks 2. Form columns 3. Form mirrors You want to specify the space allocation across multiple volumes. What should you do?
(Multiple Choice)
4.9/5
(38)
What is the minimum percentage of spare disks in a disk group?
(Multiple Choice)
4.9/5
(32)
Which section of the sysinfo file displays information such as the number of successes and failures? (Choose the best answer.)
(Multiple Choice)
4.9/5
(34)
You are monitoring I/O on a volume that is under Veritas Volume Manager control using the vxstat command. You need to measure the impact of a specific write operation on a volume. You want to ensure you are successfully able to measure the impact. What should you do?
(Multiple Choice)
4.8/5
(45)
You administer a server that needs to support a large (~1 TB) end-user VxFS file system. The users request file restorations from backup several times per week. The amount of space required for a full-size copy of the file system's data is more than you have available. What type of Storage Foundation object would be best suited to support this requirement for an undelete capability?
(Multiple Choice)
4.9/5
(36)
Which feature provides an administrator a way to discover, import, and deliver software simultaneously?
(Multiple Choice)
4.8/5
(43)
A user is unable to log in as sysadmin. The Data Loss Prevention system is configured to use Active Directory authentication. The user is a member of two roles: sysadmin and remediator. How should the user log in to the user interface in the sysadmin role?
(Multiple Choice)
4.8/5
(42)
Which action does the Symantec Management Agent perform when it receives a tickle packet?
(Multiple Choice)
4.9/5
(42)
You have installed the Veritas Enterprise Administrator to manage Storage Foundation 5.0. You want to manage the Veritas Enterprise Administrator from remote system using the Graphical User Interface (GUI). What services must be running on the remote system? (Select two.)
(Multiple Choice)
4.8/5
(26)
Showing 261 - 280 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)