You are working on Veritas Storage Foundation for Oracle RAC and want to create a disk group on the shared disks. You execute the command vxdctl -c mode on a node.
What will be the output of this command?
A. The command will display whether the node is a master or slave.
B. The command will change the node from master to slave.
C. The command will change the node from slave to master.
D. The command will create a disk group on the shared disk.
How should an administrator export all policies from a test environment to a production environment?
A. choose the option to 'export all' on the Manage > Policies > Policies List page
B. export one policy template at a time
C. navigate to System > Settings > Export and select 'All'
D. locate the 'policy' folder under 'SymantecDLP' and copy all of the .XML files
You have large number of mirrored volumes, and the resynchronization process on mirrored volumes will take lot of time. You want to address enable Dirty Region Logging (DRL) and find out the cause why it takes a long time for resynchronization. You want to check the status of DRL logging to see if it is already enabled.
How will you accomplish this task?
A. Use the vxprint command with the –F%drllogging $DCOVOL option
B. Use the vxprint command with the –F%drllogging $DRLVOL option
C. Use the vxprint command with the –F%dcologging $DCOVOL option
D. Use the vxprint command with the –F%drllogging $$DCONAME option
Which two locations can the administrator verify a newly created policy was loaded on a detection server? (Select two.)
A. System > Servers > Overview
B. System > Servers > Server Detail
C. Manage > Policies > Policy List
D. System > Servers > Overview > Configure Server
E. System > Servers > Events
While working on the Storage Foundation 5.0 server, you execute the following commanD. fsckptadm -n create sat_8pm /mnt0
What is the expected outcome of this command?
A. This command will create a nodata storage checkpoint.
B. This command will create a removable storage checkpoint.
C. This command will convert the storage checkpoint to the nodata storage checkpoint.
D. This command will create a storage checkpoint, but not the nodata storage checkpoint.
What is the most efficient policy so that incidents are generated only when a specific user under investigation sends encrypted files?
A. a policy that has one condition
B. a policy that has one exception
C. a policy that has two conditions
D. a policy that has two exceptions
While administrating the Veritas Volume Manager for Veritas Storage Foundation, you have accidentally destroyed the disk group. You now need to recover the destroyed disk group. You are sure that disk group have not been modified or reused before recovering the disk group.
What step do you need to perform to recover the destroyed disk groups?
A. Use the vxdg import command to import the disk group with the disk group id.
B. Use vxdarestore command to restore the disk group.
C. Use vxrecover disk group command to recover the disk group.
D. Use vxconfigrstore to recover the disk group.
An incident responder is viewing a discover incident snapshot and needs to determine which information to provide to the next level responder. Which information would be most useful in assisting the next level responder with data clean-up?
A. Incident Details: Message Body content
B. Custom Attributes: Most Active User from Data Insight
C. Incident Details: File Owner metadata
D. Access Information: File Permissions
Which two options are available when selecting an incident for deletion? (Select two.)
A. delete the incident completely
B. delete the original message and retain the incident
C. delete the incident and retain the original message
D. delete the incident and export incident details to .CSV file
E. delete all attachments or files and export incident to .XML file
A DLP administrator is creating a role that contains an incident access condition that restricts users from viewing specific incidents.
Which two conditions can the administrator specify when creating the incident access condition in a role? (Select two.)
A. file type
B. custom attribute
C. recipient
D. file size
E. policy group
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-513 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.