Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
You are managing Storage Foundation 5.0 server in your organization. When working on Veritas Enterprise Administrator Server, you are prompted with an error message "VxVM Provider initialization warninG. vxinstall has not been run." What should you do to resolve this problem?
(Multiple Choice)
4.8/5
(38)
You need to increase the size of an existing volume to 10 gigabytes. You also want to exclude storages on the controller c1 from being allocated. To meet the required goal, you execute the following command, but when executed, the command fails. vxassist -g mydg1 growto vol1 10g \use_storage='noneof("Controller"="c1")' What could be the possible cause for the failure?
(Multiple Choice)
4.7/5
(29)
An Incident Responder has noticed that for the last month, the same endpoints have been involved with malicious traffic every few days. The network team also identified a large amount of bandwidth being used over P2P protocol. Which two steps should the Incident Responder take to restrict the endpoints while maintaining normal use of the systems? (Choose two.)
(Multiple Choice)
4.8/5
(38)
An administrator pulls the Services and Operation logs off of a DLP Agent by using the Pull Logs action. What happens to the log files after the administrator performs the Pull Logs action?
(Multiple Choice)
4.8/5
(36)
What is the risk to the inventory data gathered from these endpoints, if an Inventory Policy is created with the throttling period set to extend after users typically shut down computers and go home?
(Multiple Choice)
4.8/5
(35)
Which email client is compatible with the Email Security.cloud Email Submission add-in?
(Multiple Choice)
4.8/5
(44)
You want to allow non-layered volume to change to layered stripe-mirror volume while remaining online. What is the correct procedure to perform this conversion?
(Multiple Choice)
4.8/5
(35)
Which action is available for use in Smart Response rules and Automated Response rules?
(Multiple Choice)
4.8/5
(37)
You are working on Veritas Storage Foundation for Oracle RAC and want to create a disk group on the shared disks. You execute the command vxdctl -c mode on a node. What will be the output of this command?
(Multiple Choice)
4.8/5
(30)
An ATP administrator is setting up an Endpoint Detection and Response connection. Which type of authentication is allowed?
(Multiple Choice)
4.9/5
(46)
What does the authentication mode specify? (Choose the best answer.)
(Multiple Choice)
4.8/5
(40)
You have installed the Storage Foundation for Sybase. You want to temporarily suspend all write operations to all databases. What should you do?
(Multiple Choice)
4.8/5
(36)
How can an administrator quickly view and export report results while creating a filter based on the location of computers?
(Multiple Choice)
4.9/5
(33)
What is a SMTP server that is configured to allow anyone to send email through it called?
(Multiple Choice)
4.8/5
(33)
You are auditing a current storage environment that is not utilizing storage tiering. The information gained from the audit is to be used in a new storage tiering design that will have 4 tiers (Tiers 1-4). You need to determine the location for archive data which needs to be accessible but is not used heavily. Where should you store this data?
(Multiple Choice)
4.8/5
(38)
You have installed all the features for Storage Foundation for DB2. On the VxFS file system, you execute a command /opt/VRTS/bin/qiomkfile -s 500m /db01/dbfile. What will be the outcome of this command?
(Multiple Choice)
5.0/5
(39)
An ATP administrator is setting up correlation with Email Security.cloud. What is the minimum Email Security.cloud account privilege required?
(Multiple Choice)
4.8/5
(40)
Which threat is an example of an Advanced Persistent Threat (APT)?
(Multiple Choice)
4.7/5
(48)
A policy template called Customer Credit Card Numbers is being imported into the system. What is the default result for this action?
(Multiple Choice)
4.7/5
(27)
What is the purpose of creating groups for use with Data Protection?
(Multiple Choice)
4.8/5
(42)
Showing 321 - 340 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)