When can the online partition compression task fail? (Select two.)
A. when the partition being compressed is too old
B. when events are inserted into the partition that is being compressed
C. when the compression task takes more than two hours to complete
D. when the partition compressor does not have the necessary file permissions
When specifying the attributes of a new Active List, you can set TTL days, hours, and minutes. What is TTL?
A. Total Time Lag
B. Time Threshold Lag
C. Time To Live
D. Total Time Left
How are ESM Global Variables created?
A. from within the Manager's server.properties file by using the System Global Variable link
B. from the Fields and Global Variable tab in the Field SetResource or by promoting a Local Variable
C. from the System Tools menu by using the Create System Global Variable option
D. from the Local Variables tab of the Filter Resource and only by promoting a Local Variable
If a username and password are used for authenticating a remote peer, when would you need to use those credentials a second time?
A. if credential caching expires and the auto-refresh option is not enabled
B. only if the peer relationship is broken and you need to authenticate the peer again
C. only for a content management subscriber manual synchronization
D. every time a distributed search is run and results are exported to the remote peer
What do the start and end times associated with a notification destination indicate?
A. the period of time the system will wait for a notification response
B. the period of time during which the destination is expected to respond
C. the period of time during which the notification can be sent
D. the period of time during which the notification can be received
Using SSL technology, information can be communicated over an encrypted channel. What is SSL?
A. Secure Sockets Layer
B. Security Standards Layer
C. Smart Stealth Layer
D. Standard Security Layer
Which visualization display functions are possible with Dashboards? (Select two.)
A. fade in/out
B. slide show
C. annotate
D. zoom in/out
E. crop
Which functions does a non-event based Data Monitor perform?
A. evaluates the event stream and creates Correlation events when anomalies are discovered
B. monitors and displays rule and filter data flow thresholds and latencies
C. summarizes and displays event-based Data Monitor statistics
D. monitors and displays ArcSight ESM system and platform status
Which ArcSight Foundation should you use to identify traffic and bandwidth usage?
A. Configuration Monitoring
B. Intrusion Monitoring
C. ArcSight Administration
D. Network Monitoring
Which command is used to check the status of the TNS Listener?
A. lsnrctl status
B. listener status
C. tnsstat
D. oralistener status