1.
Which process is used to automatically delete expired backup sets stored on disk or in cloud-based storage?
2.
Which statement accurately depicts a benefit of using 256-bit encryption?
3.
Which encryption and/or compression combination should an administrator avoid according to Symantec Best Practices?