Within a file system, mounted with -o ckptautomnt=ro and denoted by /mountpoint, in which directory will Storage Checkpoints be automatically mounted?
A. /mountpoint/lost+found/.checkpoint
B. /mountpoint/.checkpoint
C. /mountpoint/lost+found/.snapshot
D. /mountpoint/.snapshot
Which Veritas Storage Foundation 6.0 for UNIX command should be used to determine whether a SmartTier File Placement Policy has been assigned to a file system?
A. fsmap
B. fsapadm
C. fsadm
D. fsppadm
Which three are used in the sender and body sections of a notification? (Select three.)
A. Policy violated
B. Subject
C. Recipient
D. Attachment names
On a site-aware Veritas Storage Foundation 6.0 for UNIX system, which file contains the name of the site to which the host belongs?
A. /etc/sites
B. /etc/hosts
C. /etc/vx/sites
D. /etc/vx/volboot
Which two commands are used to configure the site awareness feature? (Select two.)
A. vxconfigd
B. vxdctl
C. vxdisksetup
D. vxdg
E. vxmend
What will be the effect of reducing the compression block size by 50% when using vxcompress to compress files?
A. Double the amount of logical data per compressed extent
B. Double the amount of compressed data per compressed extent
C. Half the amount of logical data per compressed extent
D. Half the amount of compressed data per compressed extent
Which Symantec Mail Security 8300 component retrieves new and updated spam filters from Symantec Security Response through secure HTTPS file transfer?
A. Conduit
B. Uplink
C. LiveUpdate
D. Sequencer
Which two could appear on a deployment checklist when integrating Symantec Mail Security 8300 in a production environment? (Select two.)
A. Ensure that the appliance is deployed at the gateway
B. Ensure that the firewall permits communication to and from Symantec over port 443
C. Ensure that the Exchange Spam Confidence Level is synchronized with suspect spam score range in the Spam Scanning settings area
D. Block outbound traffic from flowing through the Symantec Mail Security Scanners
When running vxfilesnap or deduplication on an already compressed file, what will happen to the compressed extents?
A. become uncompressed and then shared
B. remain compressed and then shared
C. a copy of the compressed data will be made
D. a copy of the uncompressed data will be made
A user creates a 10 MB file, which is then compressed using vxcompress to reduce the file size to 1MB. Another user copies this file to a different Veritas File System (VxFS) on the same host using cp.
What is the resulting file size of the copy?
A. 1MB
B. 9MB
C. 10MB
D. 11MB
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-252 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.