1.
An organization needs to determine whether at least 50% of a sensitive document is being sent outside the organization. Which action should the company take to accomplish this?
2.
You want to implement Storage Foundation Enterprise in your storage environment. You want to ensure you have at least 5 GB of free space after the Storage Foundation 5.0 has been installed on your computer. You are installing Storage Foundation on the same drive where the operating system has been installed. What should be the size of the system drive to meet the requirement?
3.
You need to create a new volume. The new volume will only use disks on controller 1. You want to execute the vxassist command with the ctlr:c1 storage attribute. You want to ensure that the command provides desired output. What should you ensure to meet the required goal?
4.
A company needs to implement Data Owner Exception so that incidents are avoided when employees send or receive their own personal information. Which underlying technology should the company use?
5.
When deploying Network Monitor, an administrator needs to implement monitoring of port-based protocols. Which protocol is supported by Network Monitor?
6.
You want to install the Veritas Enterprise Administrator to manage the Veritas Storage Foundation 5.0 server installed. Before installing the Veritas Enterprise Administrator, you need to know the installation procedure. Given the following installation procedures:
1. Start the Veritas Enterprise Administrator Server on the system to be administered. 2. Start the Veritas Enterprise Administrator Client. 3. Install the Veritas Volume Manager on the system to be administered. 4. Install the Veritas Enterprise Administrator server and client on the system to be administered. What is the correct order of steps that you need to follow?
7.
You are monitoring the storage environment in the Datacenter. You want to track changes to files and directories. These files and directories are used by backup utilities and replication programs. In which location will you find the log that tracks these changes to the files and directories?
8.
An administrator needs to deploy a Symantec Data Loss Prevention solution that will monitor network traffic. Which traffic type is excluded from inspection when using the default configuration?
9.
Which incidents appear in the Network Incident List report when the Network Prevent Action filter is set to Modified?
10.
Which server encrypts the message when using a Modify SMTP Message response rule?