In which scenario should an administrator add MTA host information to the Internal Mail Host page?
A. one or more MTAs are, with respect to inbound mail flow, upstream from the Symantec Mail Security 8300 Scanners
B. the Symantec Mail Security 8300 Scanners, with respect to inbound mail flow, are deployed at the Internet gateway
C. the Symantec Mail Security 8300 is configured as a combined Scanner/Control Center during the initial bootstrap phase
D. Directory Harvest Attack prevention is enabled and the configured LDAP source is situated in the internal network
Which three are options for invalid recipient handling? (Select three.)
A. Reject invalid recipients
B. Accept all recipients
C. Drop invalid recipients
D. Quarantine invalid recipients
Which would receive a spam verdict from Symantec?
A. an unwanted account statement from an recipient's financial institution
B. unsolicited email
C. an email that has seven instances of the term 'viagra'
D. unsolicited commercial bulk email
What is the major source of IP reputation information for the Symantec Sender Reputation Service?
A. SMTP traffic shaping results
B. 3rd party real-time blacklist services
C. The Probe Network
D. customer submissions
When creating a policy to check outbound messages for inappropriate dissemination of credit card numbers, which policy resource should be leveraged in the policy?
A. Smart identifiers
B. Patterns
C. Dictionaries
D. Annotations
For disaster recovery purposes, data is mirrored between arrays at two sites.
Which volume read policy preferentially reads from plexes at the locally defined site?
A. select
B. prefer
C. siteread
D. local
What is a key consideration when deploying a scanner with IM filtering in production?
A. ensuring that the Symantec appliance points to an internal DNS server to route traffic to the public network
B. allocating 4 externally routable IP addresses for each IM Scanner
C. adjusting internal DNS records to route internal IM traffic to the SMS Scanner that is configured for IM filtering
D. installing Symantec IM Setup wizard on each client desktop in the organization
A snapshot is created under the command vxassistsnapstart and successfully completes.
The server is subsequently rebooted.
What is the snapshot plex state after the server has come completely online?
A. SNAPCOMPLETE
B. SNAPATT
C. SNAPDONE
D. SNAPRECOVER
Which two are reports provided by Symantec Mail Security 8300? (Select two.)
A. Executive Summary
B. Reputation Summary
C. Hardware Utilization Summary
D. IM Compliance Summary
E. Capacity Planning Summary
An administrator only has the inode number of a file.
Which command should the administrator run to get the full path name for the file?
A. fsadm
B. fsmap
C. fsapadm
D. ff
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Veritas exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your VCS-255 exam preparations and Veritas certification application, do not hesitate to visit our Vcedump.com to find your solutions here.