A compliance officer needs to understand how the company is complying with its data security policies over time. Which report should the compliance officer generate to obtain the compliance information?
A. Policy Trend report, summarized by policy, then quarter
B. Policy Trend report, summarized by policy, then severity
C. Policy report, filtered on quarter, and summarized by policy
D. Policy report, filtered on date, and summarized by policy
A company needs to disable USB devices on computers that are generating a number of recurring DLP incidents. It decides to implement Endpoint Lockdown using Endpoint Prevent, which integrates with Symantec Endpoint Protection Manager and Symantec Management Platform. After incidents are still detected from several agents, the company determines that a component is missing.
Which component needs to be added to disable the USB devices once incidents are detected?
A. Control Compliance Suite
B. Workflow Solution
C. pcAnywhere
D. Risk Automation Suite
You are administering the Veritas Volume Manager. While working on the Veritas Volume Manager, you execute the vxprint 環vt command.
What will be the outcome of the command?
A. Command will list the stopped volume and its plexes information.
B. Command will list the free Plexes information.
C. Command will display the general information for all sub disks.
D. Command will display the volume information.
An administrator pulls the Services and Operation logs off of a DLP Agent by using the Pull Logs action. What happens to the log files after the administrator performs the Pull Logs action?
A. they are stored directly on the Enforce server
B. they are transferred directly to the Enforce Server and deleted from the DLP Agent
C. they are created on the DLP Agent then pulled down to the Enforce server
D. they are temporarily stored on the DLP Agent's Endpoint server
You have installed site awareness licenses on all hosts in the remote mirror configuration. You want the volume to be automatically mirrored across sites when it is created and you specify the allsites=on attribute with the vxassist command.
Which read policy do you need to set to accomplish this task?
A. Siteread policy
B. Round robin policy
C. Prefer policy
D. Select policy
You are administering the Volume Manager in Cluster environment in the datacenter showing a type of write failure on a slave node. You are not able to view the write failure occurred to other nodes in the cluster.
What will be the cluster behavior under the local disk detach policy? (Each correct answer presents part of the solution.) (Select two.)
A. I/O is stopped for the node that first saw the failure.
B. Application using the volume is also notified about the failure.
C. Cluster Management software moves the application to a live node.
D. Slave node continues to perform I/O operation from and to the volume.
Which two are the advantages of the Logical PITCs?
A. The PITC is available for use instantaneously.
B. Potentially less storage space is required.
C. The PITC is dependent on the original.
D. The PITC is an actual physical copy of the data.
E. The PITC requires the same amount of storage space as the original.
An administrator needs to remove an agent and its associated events from a specific Endpoint Server. Which Agent Task does the administrator need to perform to disable its visibility in the Enforce UI?
A. delete action from the Agent Summary page
B. disable action from Symantec Management Console
C. change Endpoint Server action from the Agent Overview page
D. delete action from the Agent Health dashboard
You are administering a Storage Foundation 5.0 server. You need to create a new mirrored-striped volume using the command line. What should you do?
A. Mirror several concatenated plexes.
B. Stripe several underlying mirror volumes.
C. Concatenate several underlying mirror volumes.
D. Mirror several striped data plexes.
What is the correct configuration for BoxMonitor.Channels that will allow the server to start as a Network Monitor server?
A. Packet Capture, Span Port
B. Packet Capture, Network Monitor
C. Packet Capture, Network Tap
D. Packet Capture, Copy Rule
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-513 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.