You execute the command ps –ef | grep vxatd.
What is the expected output of this command?
A. The command verifies the Fully Qualified Host Name.
B. The command verifies the status of Symantec Authentication service.
C. The command verifies the status of Root Broker.
D. The command verifies the status of Authentication Broker.
Which interface provides single sign-on access for the purpose of administering Data Loss Prevention servers, managing policies, and remediating incidents?
A. Symantec Information Manager
B. Symantec Protection Center
C. Symantec Data Insight
D. Symantec Messaging Gateway
An administrator needs to deploy a Symantec Data Loss Prevention solution that will monitor network traffic. Which traffic type is excluded from inspection when using the default configuration?
A. HTTP-get
B. NNTP
C. FTP-put
D. HTTP-post
You are the administrator for the Veritas Volume Manger. You notice that the size of the disk group's configuration database in its private region is nearly full. You want to ensure that you do not loose any data from the disk group and are able to preserve the volume state.
What should you do?
A. Try to grow the private region
B. Spilt the disk groups
C. Move the disk group
D. Join the disk groups
How should an administrator determine which Database version is running?
A. run the command select database version from database;
B. right click on database folder and select version
C. run the command select * from v$version;
D. look in add/remove programs for the database program
A DLP administrator needs to decide if using Symantec Management Console (SMC) will provide additional functionality over the built-in Agent Actions that can be performed via Agents > Overview > Summary Reports. What are two of the Agent Actions that can be performed with SMC that are unable to be used with the built-in Agent Actions? (Select two.)
A. Set Under Investigation
B. Get Agent Configuration
C. Toggle Print Screen
D. Set Log Level
E. Gather Endpoint detection server logs
You are planning a relayout for a 10GB RAID-5 volume with a RAID-5 log to a stripe-mirror configuration. Dirty-region logging is indicated by the volume's size. How would your plan to address the logs?
A. Remove the RAID-5 log and create a DRL prior to the relayout operation.
B. The RAID-5 log should be removed prior to the relayout and after the relayout completes, the DRL should be created separately.
C. Relayout will remove log plexes from the volume, but the DRL must be created after relayout is complete.
D. Use the "convertlogs" option of vxassist to cause the relayout job to convert the log plexes.
The vxprint command output for volume vol07 indicates that it has three plexes. How will you determine which plexes are used for data?
A. Note the lengths. Data plexes are all the same length.
B. Note the STATE field. Non-data plexes will be indicated by the valuE. LOG.
C. Note the STATE field. Data plexes will be indicated by the valuE. MIRROR.
D. Note the RECORD TYPE field. Data plexes are designated with PL.
What is the importance of using a CPU in Oracle within the DLP technology?
A. Central Processing Unit - ensures database has enough processing power
B. Command Processor Unit - lays out the commands to process for the database
C. Critical Patch Update - ensures Oracle is securely patched
D. Communications Processing Unit - sends alerts to administrator
You are responsible for administering a server with mirrored volume layouts. You noticed that the last time the server was down, the server took longer than usual to resynchronize the mirrors. You want to make configuration changes on the server to reduce resynchronization time.
Which actions will you perform?
A. Run the vxprint command, inspect the storage configuration manually, and write a plan to place dirty region logs on the three biggest volumes.
B. Run the vxse_redundancy rule and plan configuration changes to eliminate any rule violations it reports.
C. Run the vxse_rootmir rule and plan configuration changes to eliminate any rule violations it reports.
D. Run the vxse_drl1 rule and plan configuration changes to eliminate any rule violations it reports.