250-513 Royal Pack Testengine pdf
100% Actual & Verified — 100% PASS
Unlimited access to the world's largest Dumps library! Try it Free Today!https://www.exambible.com/250-513-exam/
Exam Number/Code: 250-513
Exam name: Administration of Symantec Data Loss Prevention 12
n questions with full explanations
Certification: Symantec Certification
Last updated on Global synchronizing
Your success in Symantec 250-513 is our sole target and we develop all our 250-513 braindumps in a way that facilitates the attainment of this target. Not only is our 250-513 study material the best you can find, it is also the most detailed and the most updated. 250-513 Practice Exams for Symantec 250-513 are written to the highest standards of technical accuracy.
Q31. - (Topic 3)
You are using Veritas Enterprise Administrator (VEA) to create a volume set. You need to have e is a pre-requisite in place before you can create the new volume set.
What should you do?
A. Ensure that you have minimum 256 volumes to be configured in a volume set.
B. Ensure that the new volume is a /ext file system.
C. Ensure that the volume set is a raw I/O.
D. Ensure that you have at least one volume created.
Q32. - (Topic 3)
An administrator is configuring an approved Endpoint device and adding it as an exception to a policy that blocks the transfer of sensitive data. Data transfers to these approved Endpoint devices are still being blocked. Which action should the administrator take to prevent the data transfers from being blocked?
A. disable and enable the policy involved for the changes to take effect
B. verify that the proper device ID or class has been entered
C. edit the exception rule to ensure Match On is set to 'Attachments'
D. assign the Endpoint device configuration to all of the Endpoint servers
Q33. - (Topic 3)
Which command will you run to get the full path name of the file, if you only have the inode number?
Q34. - (Topic 3)
You have designed a tiered storage environment using ISP volumes, created the disk group that will be used to hold the tiered volumes, and created the storage pool in the disk group. You are now ready to install the template definition file in the ISP configuration database that you have created. What should you do next?
A. Use the vxtemplate command to install your template definition file in the ISP configuration database.
B. Use the vxdisk command to install your template definition file in the ISP configuration database.
C. Use the vxassist command to install your template definition file in the ISP configuration database.
D. Use the vxvset command to install your template definition file in the ISP configuration database.
Q35. - (Topic 1)
When working on Storage Foundation 5.0 on HP-UX, you are unable to log in to Veritas Enterprise Administrator. You have converted shadow passwords with long passwords. After converting to shadow password with long password, the users are unable to log into Veritas Enterprise Administrator. You check and ensure that the users are part of the vrtsadm group. Error" V-39-53247-3 Error while connecting to Server. The user name or password is incorrect. Please retype your user name and password, and try connecting to the server again." You want to ensure all users who are part of the vrtsadm group are able to log on to the Veritas Enterprise Administrator.
What should you do?
A. Change the Shadow password.
B. Apply appropriate patch to Veritas Enterprise Administrator.
C. Retype the username and password.
D. Restart the Volume Manager.
Q36. - (Topic 2)
What is the minimum percentage of spare disks in a disk group?
Q37. - (Topic 3)
You are working on Storage foundation for DB2. You create a file system and you want to mount the file system to enable a Quick I/O. However, you are not able to mount the file system.
What could be a probable cause? (Each correct answer presents part of the solution. Select two.)
A. The mount point path is not an absolute path name.
B. You are not logged in as a root user.
C. The file system is read-only.
D. The Quick I/O is not licensed.
Q38. - (Topic 2)
In the administration of a large storage environment, you learn that files not only have differing usages at the times they are created, but that many type of files have individual life cycles. User files do not have a defined lifecycle. You want DST capabilities to manage these files.
How does DST help address this issue?
A. DST does not have a mechanism designed to address this issue.
B. You can use DST to dynamically relocate files to reduce costs.
C. You can use DST to archives files to another file server.
D. You can use DST to remove unused files from the file system and speed access to remaining files.
Q39. - (Topic 1)
When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a Quick I/O file will return "Cannot open file ".
How should you resolve this error?
A. Ensure that the file system is ufs file system.
B. Mount the file system without "nosuid" mount option.
C. Unmount and mount the file system.
D. Reconfigure the Quick I/O.
Q40. - (Topic 2)
A DLP administrator is creating a role that contains an incident access condition that restricts users from viewing specific incidents.
Which two conditions can the administrator specify when creating the incident access condition in a role?.(Select two.)
A. file type
B. custom attribute
D. file size
E. policy group