IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Symantec 250-513덤프공부

Pass4Test의 완벽한 Symantec 250-513 (Administration of Symantec Data Loss Prevention 12) 덤프는 고객님이 Symantec 250-513 (Administration of Symantec Data Loss Prevention 12) 시험을 패스하는 지름길입니다. 시간과 돈을 적게 들이는 반면 효과는 십점만점에 십점입니다. Pass4Test의 Symantec 250-513 (Administration of Symantec Data Loss Prevention 12) 덤프를 선택하시면 고객님께서 원하시는 시험점수를 받아 자격증을 쉽게 취득할수 있습니다.



NO.1 You need to create a traditional third-mirror breakoff snapshot in disk group "testdg" on a


volume named "testvol". You've used the vxassist command to start the creation of the snapshot,


synchronizing in the background.


How do you determine whether the snapshot is ready?


A. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of


the vxprint output; if the snapshot plex is ready, its state will be "ACTIVE".


B. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of


the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".


C. Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of


the vxprint output; if the snapshot plex is ready, its state will be "SNAPDONE".


D. Use "vxprint -g testdg testvol" to display the status of testvol, and check the STATE column of the


vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".


Answer: C





NO.2 What causes the majority of data loss prevention violations?


A. hackers exploit vulnerabilities and exfiltrate confidential data


B. companies lack security policies to prevent loss of confidential data


C. employees unintentionally expose confidential data


D. system backups are performed improperly


Answer: C





NO.3 Which two operating systems are supported for Symantec Data Loss Prevention 12 servers?


(Select two.)


A. Windows 2003 Enterprise Edition 64-bit


B. Red Hat Linux 5 Enterprise 64-bit


C. Windows 2008 Server 32-bit


D. Red Hat Linux 6 Enterprise 64-bit


E. Windows 2008 R2 Enterprise Edition 64-bit


Answer: B,E





NO.4 You are auditing a current storage environment that is not utilizing storage tiering. The


information gained from the audit is to be used in a new storage tiering design that will have 4 tiers,


Tiers 1-4. You need to determine the location for data that is not directly related to an enterprise's


business, but nevertheless must be retained.


Where should you store this data?


A. Tier 1: High-end storage arrays with fast, reliable network connections.


B. Tier 2: High-end arrays, but performance is not a priority.


C. Tier 3: Mid-range to low-end storage arrays with fast, reliable network connections.


D. Tier 4: low-cost media, such as tape, with little consideration given to performance.


Answer: B





NO.5 While encapsulating a disk, you discover that a volume is removed as a part of the existing


configuration. You want to restore the data on the disk as it was before removal of the disk. As the


first step, you recreate the volume using the vxdg make command.


What should you do next?


A. Replace the disk


B. Restore the plexes on the volume


C. Restore the data on the volume


D. Start the hot-relocation process


Answer: C





NO.6 An administrator is attempting to add a new detection server to the Enforce UI. However, the


administrator only has the ability to add Network Monitor and Endpoint servers. The option to add


a Discover server is missing. What does the administrator need to do to add an additional server


type?


A. log in as Sys Admin/Server Administrator role


B. update the software license file


C. restart the Vontu Monitor service


D. restart Vontu Monitor Controller service


Answer: B





NO.7 When attempting to log in as administrator to the UI, the administrator receives a login error:


Invalid Username/Password or Disabled Account


The DBA verifies the account is enabled. The information provided for the environment only


includes the DLP protect database username and password as well as a username and password


called Sys Admin\Admin.


How should the administrator change the built-in 'Administrator' password?


A. log in to the Enforce UI as the Sys Admin account and go to System > Login Management > DLP


Users and reset the administrator password


B. extract the administrator password from the DatabasePassword.properties file


C. update the PasswordEnforcement.properties file with a new administrator password


D. use the AdminPasswordReset utility to update the password


Answer: D





NO.8 A DLP administrator needs to inspect HTTP traffic using a Network Monitor, including data


pushed up to the web and data pulled down from the web.


Which configuration changes should the administrator make under the advanced server settings to


include all cases?


A. L7.processGets=false, PacketCapture.DISCARD_HTTP_GET=true, L7.minSizeofGetURL=1000


B. L7.processGets=true, PacketCapture.DISCARD_HTTP_GET=true, L7.minSizeofGetURL=100


C. L7.processGets=false, PacketCapture.DISCARD_HTTP_GET=false, L7.minSizeofGetURL=10


D. L7.processGets=true, PacketCapture.DISCARD_HTTP_GET=false, L7.minSizeofGetURL=10


Answer: D


Posted 2014/5/13 13:10:44  |  Category: Symantec  |  Tag: 250-513덤프공부