Which structures are parts of the Cross-platform Data Sharing (CDS) format?
A. An Operating System-reserved area
B. A directory area
C. A private region
D. A public region
E. A Bad Block Relocation Area
An administrator needs to deploy a Symantec Data Loss Prevention solution that will monitor network traffic. Which traffic type is excluded from inspection when using the default configuration?
A. HTTP-get
B. NNTP
C. FTP-put
D. HTTP-post
An administrator is applying a newly created agent configuration to an Endpoint server. Upon inspection, the new configuration is unassigned in the Endpoint Server Details.
What is a possible cause for the new configuration failing to be assigned?
A. the system default settings were saved to the new agent configuration
B. the server that the new agent configuration was applied to needs to be recycled
C. the new agent configuration was saved without applying it to the Endpoint server
D. the new agent configuration was copied and modified from the default agent configuration
An information security officer has detected an unauthorized tool on desktops being used to transmit data with encrypted communications.
Which Symantec Data Loss Prevention feature should the information security officer use to prevent this tool from accessing confidential data?
A. removable storage monitoring
B. network protocol monitoring
C. application path filtering
D. application monitoring
A divisional executive requests a report of all incidents generated by a particular region and summarized by department. Which incident information must be populated to generate this report?
A. remediation attributes
B. custom attributes
C. sender correlations
D. status groups
You are using Veritas Enterprise Administrator (VEA) to create a volume set. You need to have e is a pre-requisite in place before you can create the new volume set.
What should you do?
A. Ensure that you have minimum 256 volumes to be configured in a volume set.
B. Ensure that the new volume is a /ext file system.
C. Ensure that the volume set is a raw I/O.
D. Ensure that you have at least one volume created.
Which rule will you use to discover disabled controllers failures in the Storage Foundation 5.0 environment?
A. vxse_host
B. vxse_disk
C. vxse_disklog
D. vxse_dc_failures
On your Storage Foundation 5.0 server, a mirror volume is no longer needed. You need to disassociate and remove a mirror named, vol01-02 from the disk group so that you can free up disk space. How will you accomplish this?
A. Use the vxassist command with the remove mirror option.
B. Use the vxedit command with the rm vol01-02 option.
C. Use the vxplex command with the rm dis vol01-02 option.
D. Use the vxplex command with the dis vol01-02 option.
Which DLP Agent task is unique to the Symantec Management Platform and is unavailable through the Enforce console?
A. Change Endpoint server
B. Restart agent
C. Pull agent logs
D. Toggle print screen
A DLP administrator needs to improve the reporting performance of the Symantec Data Loss Prevent deployment by archiving incidents. What happens to incidents as a result of using the Incident Archive Flag feature?
A. they are moved to offline storage
B. they are moved from reporting status
C. they are moved to the archive table
D. they are moved to the archive database