1.
A DLP administrator needs to have the Email Prevent Server return inspected emails to the same MTA from which it receives the message. In which mode should the Email Prevent server be configured?
2.
You need to increase the size of an existing volume to 10 gigabytes. You also want to exclude storages on the controller c1 from being allocated. To meet the required goal, you execute the following command, but when executed, the command fails. vxassist -g mydg1 growto vol1 10g \use_storage= noneof(Controller = c1)' What could be the possible cause for the failure?
3.
The VxVM operation fails while importing a disk group and you get an error message VxVM vxdg ERROR V-5-1-2907 diskgroup: Disk group does not exist How will you solve this problem?
4.
Which valid automated response option should an administrator choose for Email Prevent?
5.
When working on Storage Foundation 5.0 on HP-UX, you are unable to log in to Veritas Enterprise Administrator. You have converted shadow passwords with long passwords. After converting to shadow password with long password, the users are unable to log into Veritas Enterprise Administrator. You check and ensure that the users are part of the vrtsadm group. Error" V-39-53247-3 Error while connecting to Server. The user name or password is incorrect. Please retype your user name and password, and try connecting to the server again. You want to ensure all users who are part of the vrtsadm group are able to log on to the Veritas Enterprise Administrator. What should you do?
6.
How should an administrator apply a policy to Network Discover scans?
7.
A DLP administrator needs to modify a Network Discover scan that has started. How should the administrator ignore files larger than 20 MB for the remaining shares?
8.
A DLP administrator is attempting to use Encryption Insight to detect confidential information in encrypted files but has been unsuccessful. It is determined that the process was unable to retrieve the appropriate PGP key because the user key was using the incorrect encryption mode. What is the correct encryption mode that must be used by the user key?
9.
What is the default limit to the number of subdisks that can be attached to a single plex?
10.
You are planning to install Storage Foundation 5.0 server. You need at least 70% percent of physical I/O operations to be read operations. What type of volume should you choose to ensure that you have optimum performance improvement?