What is a characteristic of the web-based installer?
A. It can be automated with a response file.
B. It can be run using Internet Explorer, Firefox, or Safari.
C. It can install on multiple operating systems at the same time.
D. It runs the same commands as the command line installer.
An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites.
If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?
A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
C. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
D. One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site
Refer to the following service group example:
group websg (
SystemList = { sym1 = 0, sym2 = 1 }
AutoStart = 0
AutoStartList = { sym2 }
)
DiskGroup webdg (
DiskGroup = webdg
)
IP webip (
Device = eth0
Address = "169.254.128.12"
NetMask = "255.255.255.0"
)
Mount webmnt (
MountPoint = "/web1"
BlockDevice = "/dev/vx/dsk/webdg/webvol"
FSType = vxfs
MountOpt = rw
FsckOpt = "-y"
)
NIC webnic (
Device = eth0
)
Application webproc (
MonitorProgram = "/usr/local/bin/web -monitor"
StartProgram = "/usr/local/bin/web -start"
StopProgram = "/usr/local/bin/web -stop"
)
webip requires webproc
webproc requires webmnt
webip requires webnic
webmnt requires webdg
Which resource will start online last?
A. webip
B. webmnt
C. webproc
D. webdg
Under which high-level node in the left navigation panel can administrators find the System Events report?
A. Reports
B. Policy
C. System Health
D. Administration
An administrator is merging two Veritas clusters that are already configured and running. The two clusters are already sharing private interconnect networks.
Which directive in the /etc/llttab file must be updated?
A. Set-cluster
B. Set-node
C. Set-mode
D. Set-system
Which report helps a compliance officer understand how the company is complying with its data security policies over time?
A. Policy Trend report, summarized by policy, then quarter
B. Policy Trend report, summarized by policy, then severity
C. Policy report, filtered on quarter, and summarized by policy
D. Policy report, filtered on date, and summarized by policy
In a Veritas cluster, when all high priority links fail, the low priority links are promoted to high priority in which manner?
A. in order as they appear in /etc/llttab
B. in order by NIC name
C. all simultaneously regardless of number
D. one at a time as required
Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover apply filters to?
A. Individual emails in the .pst file
B. The entire .pst file
C. Attachments in the .pst file D. Folders in the .pst file
Which three describe an effective data loss prevention (DLP) program? (Select three.)
A. DLP is a company-wide initiative.
B. DLP is primarily driven by Information Security.
C. DLP is primarily driven by the Incident Response Team.
D. Employee participation is important.
E. Business stakeholders are held accountable for risk reduction.
On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocol recognition?
A. Secure tunneling protocols
B. Pre-defined UDP protocols
C. User-configured TCP protocols
D. System-defined UDP and TCP protocols