Certbus > Symantec > Symantec Certifications > 250-513 > 250-513 Online Practice Questions and Answers

250-513 Online Practice Questions and Answers

Questions 4

You execute the command ps –ef | grep vxatd.

What is the expected output of this command?

A. The command verifies the Fully Qualified Host Name.

B. The command verifies the status of Symantec Authentication service.

C. The command verifies the status of Root Broker.

D. The command verifies the status of Authentication Broker.

Browse 305 Q&As
Questions 5

You are auditing a current storage environment that is utilizing storage tiering. Based on the collected information from the audit, you want to define a policy to take into account that enterprise accounting, security, and regulatory compliance for specific set of files.

Which policy factor should you use for the above scenario?

A. Availability

B. Business considerations

C. Expected access patterns

D. Load Balancing

Browse 305 Q&As
Questions 6

You are administering the Storage Foundation 5.0 environment in your organization. There is one particular file system that continually shows a high level of fragmentation.

What should you do to prevent fragmentation?

A. Use the df command regularly to monitor free space.

B. Schedule regular defragmentation runs using the cron command.

C. Set the initial_extent_size tunable VxFS I/O parameter.

D. Allocate the space available in the file system that best fits the data.

Browse 305 Q&As
Questions 7

You administer storage for an application "myapp" on server QA1, with a file system dedicated to code and configuration data for that myapp. Part of the testing discipline is to return myapp's file system to a known initial state prior to each test activity, and to run a series of tests beginning with the same initial state. The traditional approach to preparing for each test involves restoring the file system from a backup image prior to each test, which imposes an hour's delay between the end of one test run and the beginning of the next.

A typical testing session lasts only two to three hours, the hour of restore delay between tests reduces the availability of the server for testing by about 30%.

What kind of Storage Foundation mechanism would work best to reduce the delay required between tests?

A. Third-mirror breakoff snapshots are the best fit.

B. Space-optimized instant snapshots are the best fit.

C. File system snapshots are the best fit.

D. Storage checkpoints are the best fit.

Browse 305 Q&As
Questions 8

You administer storage for multiple hosts supporting a large OLTP application. Host Mkt operates both within the secure intranet, and host Store operates in a DMZ environment. Store stages detailed transaction logs on a volume named s_detail in a disk group named s_data. You need to deliver large batches of transaction data history from host Store to host Mkt for market analysis, and to receive the results of that analysis, as part of a weekly routine.

To deliver sales history to the marketing host, what sequence of actions must you carry out? Place the following actions in order.

1.

Use vxdg to deport the snapshot volume's disk group from host Store.

2.

Use vxdg to import the snapshot volume into host Mkt.

3.

Use vxsnap to create a snapshot of s_detail on s_data.

4.

Use the vxsnap command to enable FastResync on s_detail.

5.

Use vxdg to split the snapshot volume away from s_data, into a separate disk group.

A. 4,2,5,3,1

B. 5,4,1,2,3

C. 4,5,2,1,3

D. 5,2,4,1,3

Browse 305 Q&As
Questions 9

You are responsible for administering the Storage Foundation for Sybase server. You want to remove a mounted volume. What should you do first to ensure you are able to remove the mounted volume?

A. Remove the snapshot from the associated volume.

B. Recursively remove all plexes and subdisks.

C. Disassociate the snapshot from the associated volume.

D. Unmount the file system.

Browse 305 Q&As
Questions 10

A DLP administrator has determined that a Network Discover server is unable to scan a remote file server. Which action should the administrator take to successfully scan the remote file server?

A. restart the discover scan

B. verify that the target file server is a Windows 2008 server

C. use the fully qualified name (FQDN) of the server

D. verify that the file server has .NET services running

Browse 305 Q&As
Questions 11

An administrator needs to remove an agent and its associated events from a specific Endpoint Server. Which Agent Task does the administrator need to perform to disable its visibility in the Enforce UI?

A. delete action from the Agent Summary page

B. disable action from Symantec Management Console

C. change Endpoint Server action from the Agent Overview page

D. delete action from the Agent Health dashboard

Browse 305 Q&As
Questions 12

An Oracle Enterprise database is having I/O performance issues. You need to determine the exact location of a data block on a disk that is a hot spot slowing down I/O performance.

Which feature of Storage Foundation 5.0 for Oracle will you use to perform this task?

A. Veritas Extension for Oracle Disk Manager

B. Veritas Storage Checkpoint feature

C. Veritas Database FlashSnap feature

D. Veritas Storage Mapping feature

Browse 305 Q&As
Questions 13

Which two locations can the administrator verify a newly created policy was loaded on a detection server? (Select two.)

A. System > Servers > Overview

B. System > Servers > Server Detail

C. Manage > Policies > Policy List

D. System > Servers > Overview > Configure Server

E. System > Servers > Events

Browse 305 Q&As
Questions 14

You are the administrator for the Veritas Storage Foundation. Using Veritas Volume Manager, you want to migrate an internal boot disk to a SAN boot disk. Given the following steps:

1.

Add the target SAN disk to the boot disk group.

2.

Create a mirror of the root disk on the target disk.

3.

Verify that the Hardware Compatibility List for the target SAN disk being supported for SAN booting.

4.

Boot from the mirror disk to verify that the system is bootable. What are the sequential steps you need to follow to accomplish this?

A. 4,1,2,3

B. 3,1,4,2

C. 4,2,1,3

D. 2,3,1,4

Browse 305 Q&As
Questions 15

What is the minimum percentage of spare disks in a disk group?

A. 10%

B. 15%

C. 20%

D. 25%

Browse 305 Q&As
Questions 16

Which function does the Email Prevent server provide when integrating into an existing email environment?

A. inspects, stores, and blocks confidential emails as a Mail Transfer Agent (MTA)

B. integrates with a Mail Transfer Agent (MTA) to inspect SMTP email messages

C. maintains each inbound SMTP message transaction until the outbound is inspected

D. processes and inspects outbound SMTP messages until the email transaction has been closed

Browse 305 Q&As
Questions 17

A DLP administrator needs to improve the reporting performance of the Symantec Data Loss Prevent deployment by archiving incidents. What happens to incidents as a result of using the Incident Archive Flag feature?

A. they are moved to offline storage

B. they are moved from reporting status

C. they are moved to the archive table

D. they are moved to the archive database

Browse 305 Q&As
Questions 18

You have executed the vxdg -g diskgroup adddisk disk_name= command.

Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A. -force

B. -k

C. -f

D. -assign

Browse 305 Q&As
Exam Code: 250-513
Exam Name: Administration of Symantec Data Loss Prevention 12
Last Update: Mar 16, 2025
Questions: 305 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99