Which option should be used to optimize the performance of a network share Discover scan?
A. ensure that the target file system is defragmented regularly
B. use an incremental scan to only include previously unscanned items
C. configure credential prefetching to reduce delay in authentication
D. disable antivirus scanning for network shares on the detection server
You need to create a traditional third-mirror breakoff snapshot in disk group "testdg" on a volume named "testvol". You've used the vxassist command to start the creation of the snapshot, synchronizing in the background.
How do you determine whether the snapshot is ready?
A. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "ACTIVE".
B. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".
C. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPDONE".
D. Use "vxprint -g testdg testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".
An incident response team has determined that multiple incidents are resulting from the same user action of copying sensitive data to USB devices.
Which action should the incident response team take to fix this issue so only one incident per action is detected?
A. create separate policies for the different detection methods
B. combine multiple conditions into one compound rule
C. change which 'Endpoint Destinations' are monitored
D. change the monitor/ignore filters in the agent configuration
You are creating a volume and need the storage allocated in:
1.
Concatenated disks
2.
Form columns
3.
Form mirrors
You want to specify the space allocation across multiple volumes.
What should you do?
A. Use the -b storage attribute in the vxassist command.
B. Use -g diskgroup storage attribute in the vxassist command.
C. Use the -o ordered storage attribute in the vxassist command.
D. Use -P storagepool storage attribute in the vxassist command.
ou have gathered file I/O performance data from an Oracle Enterprise database. The database is using one filesystem on a striped volume. You want to use the performance data to adjust the system configuration to ensure efficient use of system resources.
Which specific activity should you should perform to adjust the system configuration?
A. All I/O activity
B. File I/O activity
C. Volume I/O activity
D. Raw disk I/O activity
A DLP administrator is writing one policy to block sensitive data from being copied to removable media. The administrator is applying two response rules to the policy: 'Endpoint Prevent: Notify' and 'Endpoint Prevent: Block'.
Why are some copies blocked while others are only notified?
A. there are different conditions for the different response actions
B. the monitor and ignore filters are defined incorrectly
C. the DLP administrator needs to fine tune the throttling options
D. the Directory Group Matching (DGM) profile has users in different groups
You are planning to install Storage Foundation 5.0 server. You need at least 70% percent of physical I/O operations to be read operations.
What type of volume should you choose to ensure that you have optimum performance improvement?
A. RAID-5
B. Mirrored
C. Striped
D. Concatenated-striped
An information security officer has detected an unauthorized tool on desktops being used to transmit data with encrypted communications.
Which Symantec Data Loss Prevention feature should the information security officer use to prevent this tool from accessing confidential data?
A. removable storage monitoring
B. network protocol monitoring
C. application path filtering
D. application monitoring
What is the default limit to the number of subdisks that can be attached to a single plex?
A. 1024
B. 2048
C. 4096
D. Unlimited
Which three are the database agents that are supported by Storage Foundation High Availability version? (Select three.)
A. Informix
B. DB/2
C. Ingress
D. Oracle
E. Sybase
F. SQL
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-513 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.