1.
What does Network Monitor use to identify network traffic going to a nonstandard port?
2.
Symantec Operation Readiness Tools (SORT) provides which service?
3.
What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?

 
4.
Which detection method includes keyword rules?
5.
What information must be specified when adding a resource to a service group?
6.
What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)
7.
An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites. If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?
8.
An employee received the following email notification: *********************************************************************************** ************************************* Dear Bob, Your email to jane_smith@partner.com with subject Account Info you requested violates the companys Customer Data Protection policy. If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy. Please note that this violation has also been reported to your manager. Confidential data protection is every employees responsibility. Thank you, Corporate Information Security Team *********************************************************************************** ************************************* Which recommended item is missing from this email notification?
9.
To which file system folder does PacketCapture write reconstructed SMTP messages?
10.
How is a policy applied to files found in Network Discover scans?