Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
You are the administrator of Veritas Volume Manager in Veritas Storage Foundation environment. You want to remove a disk from a disk group. You execute the command vxdg -g dg01rmdisk d001. After executing the command, you are prompted with the error "VxVM vxdg ERROR V-5-552 disk diskname is used by one or more subdisks." You want to ensure you are able to remove the disk from the disk group. What should you do?
(Multiple Choice)
4.9/5
(36)
You are the administrator for the Veritas Volume Manger. You notice that the size of the disk group's configuration database in its private region is nearly full. You want to ensure that you do not loose any data from the disk group and are able to preserve the volume state. What should you do?
(Multiple Choice)
4.9/5
(29)
An administrator needs to create an image that can be used for a mass deployment in the company. Which Deployment Solution task should the administrator perform before creating the image?
(Multiple Choice)
4.9/5
(38)
An Incident Responder discovers an incident where all systems are infected with a file that has the same name and different hash. As a result, the organism view has multiple entries for the malicious file. What is causing this issue?
(Multiple Choice)
4.8/5
(38)
You are performing a move operation under VxVM control. You cannot find the disk involved in a disk group. In addition, you get the following error message: "VxVM vxconfigd ERROR V-5-1-4551 dg_move_recover: can't locate disk(s), giving up" How should you resolve this error?
(Multiple Choice)
4.8/5
(45)
An administrator is checking System Overview and all of the detection servers are showing as 'unknown'. The Vontu services are up and running on the detection servers. Thousands of .IDC files are building up in the Incidents directory on the detection servers. There is good network connectivity between the detection servers and the Enforce server when testing with the telnet command. How can the administrator bring the detection servers to a running state in the Enforce UI?
(Multiple Choice)
4.8/5
(26)
Where can an administrator locate the "Pen Number" for an email that has been quarantined by Anti-Malware?
(Multiple Choice)
4.8/5
(37)
Which agent policy contains settings to configure the alternate Notification Server URL, UNIX/Linux/Mac (ULM) settings, bandwidth throttling, and communication blockouts?
(Multiple Choice)
4.9/5
(38)
You are planning a relayout for a 10GB RAID-5 volume with a RAID-5 log to a stripe-mirror configuration. Dirty-region logging is indicated by the volume's size. How would your plan to address the logs?
(Multiple Choice)
4.9/5
(41)
Which process is acceptable for validating domain ownership within the "Add New Domain" wizard?
(Multiple Choice)
4.8/5
(34)
A customer has information about a malicious file that has NOT entered the network. The customer wants to know whether ATP is already aware of this threat without having to introduce a copy of the file to the infrastructure. Which approach allows the customer to meet this need?
(Multiple Choice)
5.0/5
(39)
After installing Veritas Enterprise Administrator, you start the VEA with the profile name that you have specified. When you click the Console View, what does it display? (Select two.)
(Multiple Choice)
4.9/5
(24)
An Incident Responder needs to remediate a group of endpoints but also wants to copy a potentially suspicious file to the ATP file store. In which scenario should the Incident Responder copy a suspicious file to the ATP file store?
(Multiple Choice)
4.7/5
(50)
Which two steps must an Incident Responder take to isolate an infected computer in ATP? (Choose two.)
(Multiple Choice)
4.9/5
(32)
Which installation package should an administrator use to install the Cloud-enabled Management services on an Internet-facing server?
(Multiple Choice)
4.9/5
(49)
Where can an administrator locate the "Pen Number" for an email quarantined by Anti-Malware?
(Multiple Choice)
4.9/5
(39)
What does it mean if WebPulse returns a URL category of "Pending"? (Choose the best answer.)
(Multiple Choice)
4.8/5
(40)
Which Symantec product is best suited for simultaneously administering a large number of ProxySG appliances? (Choose the best answer.)
(Multiple Choice)
4.8/5
(30)
A volume called datavol in the disk group named datadg has two plexes. The plexes are named P1 and P2. Due to a series of failures, the P1 plex ends up in DISABLED/RECOVER state, and the P2 plex ends up in DISABLED/STALE state. As the administrator, you are aware of the series of failures, and you know that the data on the P1 plex is still valid and has the most recent copy of your data. You want to recover the plexes. Which command will you execute to recover the plexes?
(Multiple Choice)
4.7/5
(37)
Showing 101 - 120 of 409
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)