Download Administration of Symantec Data Loss Prevention 12.250-513.PracticeTest.2018-02-14.300q.vcex

Vendor: Symantec
Exam Code: 250-513
Exam Name: Administration of Symantec Data Loss Prevention 12
Date: Feb 14, 2018
File Size: 505 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a Quick I/O file will return "Cannot open file ".
How should you resolve this error?
  1. Ensure that the file system is ufs file system.
  2. Mount the file system without "nosuid" mount option.
  3. Unmount and mount the file system.
  4. Reconfigure the Quick I/O.
Correct answer: B
Question 2
You have installed Storage Foundation 5.0 Standard server with a number of hosts. You want to centrally monitor and manage the hosts. You also want to generate reports for the hosts and the storage resources that the hosts consume. 
What should you do?
  1. Install the Veritas Quick I/O option on Storage Foundation 5.0 server.
  2. Install Veritas Storage Foundation Management Server on Storage Foundation 5.0 server.
  3. Install Veritas Storage Foundation Management Host on Storage Foundation 5.0 server.
  4. Upgrade Storage Foundation 5.0 Standard to Storage Foundation 5.0 Enterprise.
Correct answer: B
Question 3
You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance. 
What should you do?
  1. Create a file named quota and assign it to the finance group.
  2. Create a file named quota and place it in the root directory of the file system.
  3. Create a file named quota.grp and assign it to the group of users.
  4. Create a file named quota.grp that is owned by the root of the file system.
Correct answer: D
Question 4
What is the main difference between data loss prevention and other security technologies?
  1. It is designed to take a content aware approach to security.
  2. It determines the data owner of inbound sensitive information.
  3. It quarantines adware before it is able to extract confidential information.
  4. It is designed to give visibility into where the company’s least sensitive data is stored.
Correct answer: C
Question 5
You are responsible for administering the Storage Foundation for Oracle server. You plan to clone a database using Database FlashSnap. When you run the dbed_vmchecksnap command you get an error "SFORA dbed_vmchecksnap ERROR V-81-5677 Could not find a mandatory, primary and valid archive destination for database PROD." You want to resolve this error. 
What should you do?
  1. Empty the full mandatory location and make free space available for the Oracle database.
  2. Define the location of the archive logs in the UNC format.
  3. Change the default archive location.
  4. Set the valid archive destination.
Correct answer: D
Question 6
You move a set of files from a VxFS file system to another file system. When the files are moved, the extent attributes are not moved along with the files and are lost during the migration. 
What could be a possible cause for this problem?
  1. The target file system is not a VxFS type file system.
  2. There is a variation in the block size of source and target VxFS file system.
  3. The target VxFS file system does not have enough free space to accommodate the extent attributes.
  4. The target VxFS file system uses mixed block size.
Correct answer: A
Question 7
What causes the majority of data loss prevention violations?
  1. hackers exploit vulnerabilities and exfiltrate confidential data
  2. companies lack security policies to prevent loss of confidential data
  3. employees unintentionally expose confidential data
  4. system backups are performed improperly
Correct answer: C
Question 8
You execute the command ps –ef | grep vxatd. 
What is the expected output of this command?
  1. The command verifies the Fully Qualified Host Name.
  2. The command verifies the status of Symantec Authentication service.
  3. The command verifies the status of Root Broker.
  4. The command verifies the status of Authentication Broker.
Correct answer: B
Question 9
What is the default naming format for a plex?
  1. volume_name-xx
  2. volume_namexx
  3. volumename-xx
  4. volumenamexx
Correct answer: A
Question 10
What is the minimum number of plexes required for true mirroring to provide redundancy of data?
  1. One
  2. Two
  3. Three
  4. Four
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!