What is the proper function of the Symantec Mail Security 8300 IM Scanner?
A. The proxy establishes the connection. The scanner accepts the instant message connection, encrypts the transmission, and connects the instant message to the internal network.
B. The scanner accepts the instant message connection and connects instant messaging to the external network.
C. The proxy establishes the connection. The scanner accepts the instant message connection, encrypts the transmission, and connects instant messaging to the external network.
D. The scanner accepts the instant message connection and connects the instant message to the internal network.
By default, how many times will Dynamic Multi-Pathing (DMP) retry a failed I/O request for a single path?
A. 2
B. 3
C. 4
D. 5
Which three are functions of the Control Center? (Select three.)
A. consolidates logging information
B. houses email Spam Quarantine messages
C. generates encrypted structured data indexes
D. executes email policies
Which command can be used to replace a failed or removed disk?
A. vxdmpadm
B. vxassist
C. vxdisksetup
D. vxdiskadm
Which command is used to mirror all volumes from one disk to another?
A. vxedit
B. vxvol
C. vxdiskpr
D. vxdiskadm
An administrator needs to provide storage for a critical database application that maximizes both database performance and protection against data loss.
Which storage configuration should the administrator select?
A. RAID-0
B. RAID-0+1
C. RAID-1
D. RAID-1+0
What is the recommended deployment location for Symantec Mail Security 8300?
A. in front of the external firewall
B. behind the existing Exchange server
C. at the SMTP gateway
D. integrated with the existing gateway SMTP server
What is the default action for an unscannable attachment?
A. Quarantine
B. Delete
C. Defer
D. Strip and hold
Which configuration setting specifies the host to which Scanners should route mail after filtering?
A. SMTP Routes
B. External relay
C. System locale
D. Local relay
Which information is required when backing up the system to a remote location using the Control Center?
A. a username and host to facilitate secure copy protocol (SCP) transfer
B. the domain, port, and path of the ftp server
C. the directory where the compressed backup should be downloaded
D. the IP address of the dedicated backup appliance
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Veritas exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your VCS-255 exam preparations and Veritas certification application, do not hesitate to visit our Vcedump.com to find your solutions here.