1.
What is a feature of keyless licensing?

 
2.
Symantec Operation Readiness Tools (SORT) provides which service?
3.
When run in a two node cluster, what does the lltstat -nvv command show?
4.
Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?
5.
What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?
6.
What information must be specified when adding a resource to a service group?
7.
What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)
8.
An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites. If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?
9.
An employee received the following email notification: *********************************************** Dear Bob, Your email to jane_smith@partner.com with subject Account Info you requested violates the companys Customer Data Protection policy. If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy. Please note that this violation has also been reported to your manager. Confidential data protection is every employees responsibility. Thank you, Corporate Information Security Team ***************************************************** Which recommended item is missing from this email notification?
10.
To which file system folder does PacketCapture write reconstructed SMTP messages?