1.
What is a content filtering capability of Symantec Mail Security 8300?
2.
How are shrunk spaces reclaimed on shrinking Veritas Volume Manager (VxVM) volumes based on thin reclaimable LUNs?
3.
What is a key consideration when deploying a scanner with IM filtering in production?
4.
Portions of the same disk group were imported onto several systems at the same time resulting in conflicting configuration copies. Which command should be used to resolve the conflict?
5.
The volume datavol has yet to be started, its kernel state is DISABLED, and its plexes are synchronized. The volume datavol is in which state?
6.
What is the key purpose of the Alerts feature of the Control Center?
7.
How can an administrator uninstall the Veritas Operations Manager (VOM) management server prior to upgrade?
8.
When creating a policy to check outbound messages for inappropriate dissemination of credit card numbers, which policy resource should be leveraged in the policy?
9.
How should an administrator configure a Veritas Operations Manager (VOM) management server after installation?
10.
For disaster recovery purposes, data is mirrored between arrays at two sites. Which volume read policy preferentially reads from plexes at the locally defined site?