VCS-252 5-0
VCS-252 5-0
Version 5.0
Topic 1, Volume A
QUESTION NO: 1
Which virtual storage configuration can be created with Veritas Storage Foundation 6.0 for
UNIX?
A. LVM
B. RAID
C. SVM
D. LPAR
Answer: B
QUESTION NO: 2
Which command line utility is used to view Veritas Volume Manager (VxVM) plexes?
A. vxdisk
B. vxdg
C. vxplex
D. vxprint
Answer: D
QUESTION NO: 3
Which two types of virtual storage provide data redundancy? (Select two.)
A. concatenate
B. RAID-5
C. stripe
D. mirror
E. RAID-0
Answer: B, D
QUESTION NO: 4
What are two benefits of virtual storage using Veritas Storage Foundation 6.0 for UNIX? (Select
two.)
Answer: B, C
QUESTION NO: 5
A system administrator has a large amount of inactive data on the company's storage devices.
The excess amount of data is causing slow access to the active data. The administrator needs to
set up automatic relocation of data so that data expires based on age.
How can the administrator set the threshold for automatic relocation of data?
A. use SmartMove
B. use SmartTier
C. use Virtual Data Aging Service (VDAS)
D. use Intelligent Storage Provisioning (ISP)
Answer: B
QUESTION NO: 6
Which benefit is provided when Veritas Volume Manager (VxVM) uses the SmartMove feature?
QUESTION NO: 7
What are two benefits of using Storage Checkpoints within Veritas Storage Foundation 6.0 for
UNIX instead of file system snapshots? (Select two.)
A. transient
B. read-only
C. uses free space from parent file system
D. persistent
E. uses separate volume
Answer: C, D
QUESTION NO: 8
Refer to the exhibit.
What is the disk access name for the device displayed in the vxdisk list output?
A. mydg01
B. c2t0d0
C. mydg
D. c1t0d0
Answer: B
QUESTION NO: 9
Which advantage does the Data Change Object (DCO) feature provide?
QUESTION NO: 10
What are two benefits of using the FileSnap feature? (Select two.)
Answer: A, E
QUESTION NO: 11
Refer to the exhibit.
What is the layout of the volume described in the vxprint output provided in the exhibit?
A. mirror-concat
B. mirror-stripe
C. stripe-mirror
D. concat-mirror
Answer: C
QUESTION NO: 12
A volume that contains strictly two data plexes and has four subdisks in each plex can have
which two types of layouts? (Select two.)
A. mirror-concat
B. mirror-stripe
C. stripe-mirror
D. concat-mirror
E. stripe with parity
Answer: A, B
QUESTION NO: 13
What is the correct RAID level for a layered volume layout that combines mirroring with
striping or concatenation?
A. RAID-0
B. RAID-1
C. RAID-0+1
D. RAID-1+0
Answer: A
QUESTION NO: 14
What are two advantages of a properly configured striped volume layout? (Select two.)
A. provides hot-relocation
B. provides load balancing
C. improves performance
D. provides data redundancy
E. improves reliability
Answer: B, C
QUESTION NO: 15
Where do the private and public regions of Cross-platform Data Sharing (CDS) formatted disks
reside?
Answer: B
QUESTION NO: 16
Which two items are checked on existing Veritas Storage Foundation 6.0 for UNIX systems by
the Installation and Upgrade service from Symantec Operations Readiness Tools (SORT)?
(Select two.)
Answer: A, C
QUESTION NO: 17
What is the minimum Storage Foundation release supported to upgrade directly to Veritas
Storage Foundation 6.0 for UNIX?
A. 5.0
B. 5.0MP1
C. 5.0MP3
D. 5.1
Answer: C
QUESTION NO: 18
How many days can a customer run Veritas Storage Foundation 6.0 for UNIX without entering a
valid license key during installation without receiving warning messages?
A. 30
B. 45
C. 60
D. 90
Answer: C
QUESTION NO: 19
Which two operations can be performed with a Veritas Operations Manager (VOM)
Management Server (MS) with all add-ons installed? (Select two.)
Answer: B, E
QUESTION NO: 20
Which two statements are true regarding the reporting features in Symantec Mail Security 8300?
(Select two.)
Answer: C, D
QUESTION NO: 21
Which command is used to manually configure the Veritas Volume Manager (VxVM) product?
A. vxconfigd
B. vxinstall
C. vxdiskadm
D. vxdctl enable
Answer: B
QUESTION NO: 22
Which display command consolidates information from Veritas Volume Manager (VxVM) and
Veritas File System (VxFS)?
A. vxprint
B. vxadm
C. vxsfadm
D. vxlist
Answer: D
QUESTION NO: 23
Which two Veritas Storage Foundation 6.0 for UNIX commands are used to prevent and allow
multi-pathing of Veritas Volume Manager (VxVM) devices? (Select two.)
A. vxdiskadm
B. vxddladm
C. fsvoladm
D. vxdmpadm
E. vxsfadm
Answer: A, D
QUESTION NO: 24
What is the function of the Symantec Mail Security 8300 Transformation Engine?
Answer: A
QUESTION NO: 25
Which Veritas Storage Foundation 6.0 for UNIX user interface provides a menu-driven, text-
based interface for performing some disk and disk group administration?
Answer: D
QUESTION NO: 26
Which command can be run from the command line interface of a Scanner appliance to list,
backup or restore the current message audit logging logs?
A. nslookup
B. ipconfig
C. malquery
D. mallog
Answer: D
QUESTION NO: 27
Which statement is true regarding the encrypted attachment disposition in the Virus policy
settings?
Answer: D
QUESTION NO: 28
A server with one disk group is running Veritas Storage Foundation 6.0 for UNIX and suffers a
system board failure. An administrator moves the disks in that disk group to a new server. When
the administrator tries to import the disk group, the import fails.
Which command should the administrator use to successfully import the disk group?
A. vxdg -C import
B. vxdg -f import
C. vxdg -n newname import
D. vxdg -t import
Answer: A
QUESTION NO: 29
Which command can an administrator run to display all of the imported and deported disk
groups for a system?
A. vxdg
B. vxlist
C. vxddladm
D. vxconfig
Answer: B
QUESTION NO: 30
A Veritas Volume Manager (VxVM) disk named Disk_4 has been removed from the datadg disk
group.
Which command is used to remove this disk from Veritas Volume Manager (VxVM) control?
Answer: B
QUESTION NO: 31
Which component do you configure to enable the Instant Messaging security proxy?
Answer: D
QUESTION NO: 32
What is the default private region size for Veritas Volume Manager (VxVM) disks?
A. 8MB
B. 16MB
C. 32MB
D. 64MB
Answer: C
QUESTION NO: 33
A volume manager disk, EMC_10, in diskgroup appdg is used for a 30G simple volume and it is
mounted. An administrator needs to relocate the disk EMC_10 and its associated volume from
diskgroup appdg to webdg while preserving the user data.
Which command(s) should the administrator use after unmounting the file system?
Answer: C
QUESTION NO: 34
An administrator plans to move disks EMC_11 and EMC_12 from diskgroup appdg to diskgroup
webdg. There are several volumes residing on both disks, so the administrator needs a list of
volumes that will be affected for planning purposes.
Answer: D
QUESTION NO: 35
Which two commands can be used to determine the approximate amount of free space in a
diskgroup? (Select two.)
A. vxdisk
B. vxassist
C. vxdiskadm
D. vxdg
E. vxdefault
Answer: B, D
QUESTION NO: 36
What does the System Locale setting control?
Answer: C
QUESTION NO: 37
Which command-line option allows you to download the most recent version of the system
software?
A. update download
B. swupdate
C. swupdate download
D. update install
Answer: A
QUESTION NO: 38
Which command renames the testdg disk group to engdg?
Answer: C
QUESTION NO: 39
What does the command vxprint -v display?
Answer: D
QUESTION NO: 40
Which volume layout is most resilient to disk failure?
A. mirror
B. layered
C. stripe
D. concatenated
Answer: B
QUESTION NO: 41
Given the following command:
Which instruction does the !ctrl:c2 attribute prompt Veritas Storage Foundation 6.0 for UNIX to
follow?
QUESTION NO: 42
What is the default volume layout used by the vxassist command?
A. layered
B. striped
C. mirrored
D. concatenated
Answer: D
QUESTION NO: 43
An organization is trading in an array and needs to securely clean file system data.
A. vxassist
B. vxdiskunsetup
C. mkfs
D. fsadm
Answer: B
QUESTION NO: 44
When using vxassist to create a volume, what is the default unit of the parameter length?
A. bit
B. byte
C. sector
D. cylinder
Answer: A
QUESTION NO: 45
Which option allows creation of various RAID levels when using the vxassist utility?
A. raid=
B. type=
C. level=
D. layout=
Answer: D
QUESTION NO: 46
What is the recommended placement of the Symantec Mail Security 8300 product in the
network?
Answer: A
QUESTION NO: 47
Which command allows the removal of a mirror from a volume?
A. vxvol
B. vxmirror
C. vxplex
D. vxdiskadm
Answer: C
QUESTION NO: 48
In which two situations is a Data Change Log automatically created when mirroring an existing
volume? (Select two.)
QUESTION NO: 49
How do you display the default email virus policies within the Control Center?
Answer: C
QUESTION NO: 50
Refer to the exhibit.
A. 0
B. 1
C. 2
D. 6
Answer: C
QUESTION NO: 51
How does the LDAP synchronization process treat mail-enabled groups?
A. as a user list
B. as a distribution list
C. as domain groups
D. as an LDAP list
Answer: B
QUESTION NO: 52
Which two statements are true regarding the LiveUpdate section in the Virus settings area?
(Select two.)
Answer: A, B
QUESTION NO: 53
Refer to the exhibit.
A. concat-mirror
B. mirror-stripe
C. mirror-concat
D. stripe-mirror
Answer: B
QUESTION NO: 54
Which vxassist parameter is used to set the number of data plexes in a non-layered mirrored
volume?
A. nplex
B. nmirror
C. plex
D. ndisk
Answer: D
QUESTION NO: 55
What does the following command do?
Answer: C
QUESTION NO: 56
Refer to the exhibit.
The appvol volume contains a Veritas File System (VxFS) file system and is mounted to /app.
The volume has experienced multiple disk failures.
A. unavailable
B. corrupted
C. partially available
D. fully accessible
Answer: D
QUESTION NO: 57
An administrator only has the inode number of a file.
Which command should the administrator run to get the full path name for the file?
A. fsadm
B. fsmap
C. fsapadm
D. ff
Answer: D
QUESTION NO: 58
Which command updates a Veritas File System (VxFS) layout from version 7 to version 8?
A. vxrelayout
B. vxupgrade
C. fsadm
D. vxfsconvert
Answer: B
QUESTION NO: 59
A system with a single, locally mounted file system loses power and is subsequently restarted.
All hardware is functioning properly and the intent log is valid. The administrator then mounts
the file system using the mount command.
Answer: A
QUESTION NO: 60
What is the default block size for a 2TB file system?
A. 1024
B. 2048
C. 4096
D. 8192
Answer: D
QUESTION NO: 61
Which command is used to grow a Veritas File System (VxFS)?
A. fsmigadm
B. fsadm
C. fsppadm
D. vxfsconvert
Answer: B
QUESTION NO: 62
Veritas File System (VxFS) is an extent based file system.
Which two pieces of information form the basis of an extent? (Select two.)
A. inode number
B. offset
C. length
D. owner's UID
E. block size
Answer: B, C
QUESTION NO: 63
Which two Veritas Storage Foundation 6.0 for UNIX components are required to perform thin
reclamation on a thin provision capable array? (Select two.)
A. Dynamic Multi-Pathing
B. Veritas Operations Manager (VOM)
C. FlashSnap
D. Veritas File System (VxFS)
E. Intelligent Storage Provisioning (ISP)
Answer: A, D
QUESTION NO: 64
What are two benefits of SmartMove? (Select two.)
Answer: A, D
QUESTION NO: 65
Why is FastResync enabled automatically for volumes created on thin LUNs?
A. Volumes based on thin LUNs are more likely to require resync than volumes based on thick
LUNs.
B. To ensure thin LUNs remain thin should resync be required.
C. To ensure data written to volumes based on thin LUNs is persistent.
D. Resync for volumes based on thin LUNs is slower than resync for volumes based on thick
LUNs and FastResync bridges this performance gap.
Answer: B
QUESTION NO: 66
Which two commands are used for thin reclamation? (Select two.)
A. fsadm
B. vxdctl
C. vxdisk
D. vxtune
E. fsmap
Answer: A, C
QUESTION NO: 67
Which command displays thin provisioning capable devices?
A. vxdisk
B. vxdefault
C. vxddladm
D. vxdmpadm
Answer: B
QUESTION NO: 68
Which Symantec Mail Security 8300 option protects against spammers who forge mail server
names to evade discovery?
A. Spammer deviation
B. Sender policy framework
C. Discovery recognition
D. Sender authentication standard
Answer: B
QUESTION NO: 69
Which command attempts to repair a missing disk access record by finding the name of the
device in the private region and matching it to an existing disk media record?
A. vxdisk
B. vxdctl
C. vxreattach
D. vxrecover
Answer: C
QUESTION NO: 70
Which switch needs to be added to the vxdg -g diskgroup adddisk disk_name command to force
Veritas Volume Manager (VxVM) to take the disk media name of the failed disk and assign it to
a replacement disk?
A. -force
B. -k
C. -f
D. -assign
Answer: B
QUESTION NO: 71
What is required when restoring a backup from one Symantec Mail Security 8300 appliance to a
different physical Symantec Mail Security 8300 appliance?
Answer: A
QUESTION NO: 72
How many IP addresses are required to filter inbound and outbound mail on the same Scanner?
A. One
B. Two
C. Three
D. Four
Answer: B
QUESTION NO: 73
What is the definition of the disk status FAILING?
Answer: A
QUESTION NO: 74
What does the TEMPRMSD plex state indicate?
A. The plex is synchronized.
B. The plex is removed.
C. The plex is detaching.
D. The plex is synchronizing.
Answer: D
QUESTION NO: 75
File system write performance starts to be affected on mirrored volumes assigned to a specific
disk array. A path failure is suspected.
Which two commands could be used to determine the controllers to the specified disk array?
(Select two.)
A. vxlist
B. vxdisk
C. vxddladm
D. vxprint
E. vxdmpadm
Answer: B, E
QUESTION NO: 76
The file system Storage Checkpoint Visibility feature is configured when mounting the primary
fileset.
A. ro, off, rw
B. auto, ondemand
C. ondemand, remove
D. yes, no, error
Answer: A
QUESTION NO: 77
What can be done while deporting a disk group using Veritas Operations Manager (VOM)?
A. some of the disks can be assigned to a new disk group
B. the disk group version can be upgraded to the latest version available
C. the name of the host, which will import the disk group at reboot, can be specified
D. the disk group can be split into two new disk groups
Answer: C
QUESTION NO: 78
Which two Veritas Operations Manager (VOM) add-ons are deployed by default? (Select two.)
Answer: B, D
QUESTION NO: 79
What is the namespace extension required to perform FileSnap over NFS?
A. ::clone:vxfs:
B. ::snap:vxfs:
C. ::filesnap:vxfs:
D. ::ckptfile:vxfs:
Answer: B
QUESTION NO: 80
Which option can be selected for the log level from the Veritas Operations Manager (VOM)
Management Server setting page?
A. Critical
B. Error
C. Warning
D. Notice
Answer: C
QUESTION NO: 81
Which two Symantec Mail Security 8300 Control Center components can be used to store email
security violations? (Select two.)
Answer: A, D
QUESTION NO: 82
Which command is used to display current file system I/O parameters for a Veritas File System
(VxFS)?
A. vxtune
B. vxtunefs
C. vxfsio
D. fsadm
Answer: B
QUESTION NO: 83
An administrator suspects that file creation performance is degraded in several directories on a
Veritas File System (VxFS).
A. fsadm
B. fiostat
C. fsapadm
D. fsppadm
Answer: A
QUESTION NO: 84
A file is compressed using vxcompress with a strength of 3. The owner subsequently needs to
change it to a strength of 9.
Answer: C
QUESTION NO: 85
Which Storage Foundation utility is used to generate random read and random write workloads
so that the performance of a file system can be analyzed?
A. vxbench
B. vxtrace
C. vxstat
D. vmstat
Answer: D
QUESTION NO: 86
What is the primary purpose of Compliance Folders?
Answer: B
QUESTION NO: 87
Which command is used to gather buffer cache statistics for a Veritas File System (VxFS)?
A. fiostat
B. vxstat
C. vxfsstat
D. vxmemstat
Answer: C
QUESTION NO: 88
A disk group with four disks contains a two-column striped and mirrored volume.
Which step must be performed first to change the volume to have three columns without losing
the redundancy?
Answer: D
QUESTION NO: 89
The vxassist convert command can be used to convert between which two volume layouts?
(Select two.)
A. mirror-stripe to stripe-mirror
B. mirror-stripe to RAID-5
C. concat-mirror to concat
D. mirror-stripe to stripe
E. concat-mirror to mirror-concat
Answer: A, E
QUESTION NO: 90
Which firewall port should be opened to download antispam rulesets from Symantec?
A. 80
B. 443
C. 41025
D. 41443
Answer: B
QUESTION NO: 91
On which two areas on the Control Center can you view license expiration status? (Select two.)
Answer: A, B
QUESTION NO: 92
What is a restriction for the volume relayout operation?
Answer: D
QUESTION NO: 93
What happens when a mirrored volume is converted to RAID-5?
Answer: B
QUESTION NO: 94
If a system fails during a volume relayout, what happens to the transformation after the system is
restored?
A. Transformation continues after the system is restored.
B. Volume configuration can be restored from config copy backed up by vxconfigdbackupd.
C. Transformation is reversed and may have to be repeated manually.
D. Data may become corrupted and may have to be restored from backup.
Answer: A
QUESTION NO: 95
Which command should be used to manage the contents of volboot?
A. vxvolboot
B. vxdctl
C. vxedit
D. vxconfigd
Answer: B
QUESTION NO: 96
Which setting adjustment can improve LDAP performance?
A. changing the default LDAP port from the standard port (389) to the Global Catalog Port
(3268)
B. always enforcing a full synchronization
C. setting the LDAP replication frequency to 4 hours
D. clearing the 'Ignore LDAP Referrals' check box
Answer: A
QUESTION NO: 97
Which component of the Dynamic Multi-Pathing (DMP) architecture allows DMP to properly
claim devices and defines the array class (e.g., A/A, A/P, APF, ALUA)?
QUESTION NO: 98
A system administrator has been notified by Symantec Operations Readiness Tools (SORT) that
a new version of the Array Support Library/Array Policy Modules package is available. The
administrator first removes the old VRTSaslapm package and then installs the new one.
What is the final command that must be executed to complete the upgrade?
Answer: B
QUESTION NO: 99
When should an administrator use the remount option with the mount command on a local
Veritas File System (VxFS)?
Answer: B
Answer: C
Answer: A, B, D
A. 2
B. 3
C. 4
D. 5
Answer: D
Answer: A, B
A. use the remount option to the mount command without specifying cio
B. unmount the file system and then mount it again without specifying cio
C. run vxtunefs
D. run vxtune
Answer: B
A. vxprint
B. vxddladm
C. vxdmpadm
D. vxcheckasl
Answer: B
Answer: C
A. vxdmpadm
B. vxdctl
C. vxtune
D. vxddladm
Answer: A
Answer: B, C
Answer: B
A. Host
B. Port
C. Name (Bind DN)
D. Password
E. Username
Answer: A, B
A. ACTIVE
B. SNAPTMP
C. SNAPDONE
D. SNAPATT
Answer: C
A. nodisable
B. wdisable
C. mwdisable
D. mdisable
Answer: A
Answer: B
Answer: C, E
Topic 2, Volume B
What is the snapshot plex state after the server has come completely online?
A. SNAPCOMPLETE
B. SNAPATT
C. SNAPDONE
D. SNAPRECOVER
Answer: C
A. file system
B. disk group
C. directory
D. volume
Answer: A
A. vxdmpadm
B. vxdmptune
C. vxtune
D. vxdefault
Answer: D
Answer: A
This argument will initiate an actual deduplication run when the metric reaches which given
value?
A. SMTP Routes
B. External relay
C. System locale
D. Local relay
Answer: D
A. enabling SMTP traffic shaping, rejecting Zombie connections in Sender Groups, configuring
invalid recipient configuration
B. deleting all spam messages, deleting all virus attachments, configuring sender authentication
C. enabling LDAP authentication, quarantining all spam and suspected spam, and increasing
concurrent MTA connections
D. controlling maximum attachment sizes, setting a lower recursion limit for ZIP files, enabling
bad message handling
Answer: A
A. Groupwise
B. Open LDAP
C. Active Directory
D. Lotus Domino
Answer: C, D
QUESTION NO: 124
What is the proper function of the Symantec Mail Security 8300 IM Scanner?
A. The proxy establishes the connection. The scanner accepts the instant message connection,
encrypts the transmission, and connects the instant message to the internal network.
B. The scanner accepts the instant message connection and connects instant messaging to the
external network.
C. The proxy establishes the connection. The scanner accepts the instant message connection,
encrypts the transmission, and connects instant messaging to the external network.
D. The scanner accepts the instant message connection and connects the instant message to the
internal network.
Answer: B
A. 1K
B. 2K
C. 32K
D. 256K
Answer: C
A. checks for viruses, mass-mailing worms, spyware, adware, and suspicious attachments
B. checks for viruses, mass-mailing worms, spam, and suspected spam
C. checks for internal and external mass-mailings and suspicious attachments
D. checks for spyware, adware, and all message attributes
Answer: A
Answer: B
Answer: B, D
Answer: D
A. Administrator password
B. LDAP server
C. Internal mail host
D. Group policies
Answer: A
Which command should the administrator execute to break off one of the sites to verify the
configuration?
A. vxdiskadm
B. vxfiredrill
C. vxdg detachsite
D. vxsite detach
Answer: C
Answer: D
Answer: B, C, D
A. US phone number
B. social security number
C. ABA routing numbers
D. valid social security number
Answer: D
Answer: B
A. 3xx
B. 4xx
C. 5xx
D. 6xx
Answer: B
A. 8320
B. 8340
C. 8360
D. 8380
Answer: D
Using Veritas Operation Manager (VOM) to configure SmartTier, which Canned File Placement
Policy should be configured to optimize the use of solid state disks?
A. Access age-based
B. Update age-based
C. I/O activity-based
D. Access age-based with preferred files
Answer: C
A. volume
B. plex
C. subdisk
D. disk group
Answer: D
Answer: A
Answer: A, B
Answer: D
Answer: A
Answer: D
Answer: A, D
A. Virus
B. Email firewall
C. Spam
D. Compliance
Answer: D
A. Notices
B. All
C. Information
D. Errors
E. Warnings
Answer: E
Answer: B
A. RAID-0
B. RAID-0+1
C. RAID-1
D. RAID-1+0
Answer: D
QUESTION NO: 151
Which scanner log would you consult if you suspect that antispam rules are not being updated?
A. MTA
B. Conduit
C. Filter hub
D. Transmission
Answer: B
A. Available linked compound conditions include AND, OR, XOR, and NOT.
B. They are evaluated in the order listed on the main page of the Compliance tab.
C. There is a set limit to the number of conditions per compliance policy.
D. The order of conditions in a filter is important when a filter matches a message.
Answer: B
A. striped
B. striped-mirror
C. striped with parity
D. concatenated with hot standby disk
E. striped with hot standby disk
Answer: B, C
Answer: B
A. Only the target systems must be running the same operating system.
B. The installation server and all target systems must be running the same operating system.
C. All systems must be running the same operating system patch level.
D. Only one system can be installed at a time.
Answer: B
A. vxsvc
B. vxconfigd
C. xprtld
D. sfmcswd
Answer: C
A. vxdisksetup
B. vxbootadm
C. vxrootadm
D. vxdmpadm
Answer: C
QUESTION NO: 158
A disk has been initialized for use in Veritas Volume Manager (VxVM).
Which command is used to create a disk group named datadg on a device shown as device_tag
and using a disk media name of datadg01?
Answer: D
Answer: A, B, C
A. document training
B. pre-built policy templates
C. incident management
D. structured data matching
E. message level encryption
Answer: B, D
A. The appdg disk group is automatically imported; all volumes in the disk group are
automatically started.
B. The appdg disk group is automatically temporarily imported; all volumes in the disk group are
automatically started.
C. The appdg disk group remains deported; only host01 can import the disk group using the vxdg
import appdg command.
D. The appdg disk group remains deported; any host that can access the appdg disk group can
import it.
Answer: D
If a user’s email address happens to be contained in both groups, how could you ensure the Sales
department’s group policy is enforced?
Answer: C
Which command should the administrator use to move the data volumes?
A. The destroy operation retains the on-disk disk group ID, which makes the disk group
recoverable.
B. The destroy operation clears the on-disk disk group ID, which makes recovery impossible.
C. The destroy operation clears the on-disk disk group name and makes disks available for use in
other disk groups.
D. The destroy operation clears the on-disk disk group name and re-initializes all of the disks.
E. The destroy operation deports the disk group and re-formats all of the disks.
Answer: A, C
Answer: D
A. vxdmpadm
B. vxassist
C. vxdisksetup
D. vxdiskadm
Answer: D
QUESTION NO: 167
Which best describes address masquerading?
A. rewriting the domain name in the address of inbound and outbound mail
B. expanding an email address to one or more other email addresses
C. encrypting outgoing email to ensure the sender information is concealed
D. email fraud tactic where the sender maliciously alters the From: headers
Answer: A
A. vxdiskconfig
B. vxdisksetup
C. vxdg
D. vxdmpadm
Answer: B
A. 20 through 89
B. 25 through 89
C. 90 through 100
D. 1 through 100
Answer: B
A. vxtask
B. vxplex
C. vxtrace
D. vxstat
Answer: A
Answer: C
A. vxedit
B. vxvol
C. vxdiskpr
D. vxdiskadm
Answer: D
Answer: B
Answer: C
A. tunefs
B. vxresize
C. fsadm
D. vxfsadm
Answer: C
Answer: A
A. 250
B. Data
C. 100
D. Message
Answer: B
QUESTION NO: 178
Which two are advantages of deploying multiple Symantec Mail Security 8300 Scanners? (Select
two.)
A. redundancy
B. management of policies
C. scalability
D. inbound and outbound scanning
Answer: A, C
A. Quarantine
B. Delete
C. Defer
D. Strip and hold
Answer: B
A. array-level mirroring
B. attaching a plex
C. creating volume snapshots
D. encapsulation
Answer: B
Answer: C
Answer: A, D
A. report retention
B. log levels
C. quarantine retention
D. compliance incident size
Answer: A, B, C
A. vxattachd
B. vxrelocd
C. vxconfigd
D. vxcached
Answer: B
Answer: A
Answer: A
Answer: A
A. ensuring that the Symantec appliance points to an internal DNS server to route traffic to the
public network
B. allocating 4 externally routable IP addresses for each IM Scanner
C. adjusting internal DNS records to route internal IM traffic to the SMS Scanner that is
configured for IM filtering
D. installing Symantec IM Setup wizard on each client desktop in the organization
Answer: C
A. vxreattach
B. vxsplitlines
C. vxrecover
D. vxconfigrestore
Answer: B
A. READY
B. WAIT
C. INIT
D. CLEAN
Answer: D
Answer: C
A. Smart identifiers
B. Patterns
C. Dictionaries
D. Annotations
Answer: B
Answer: A, B
QUESTION NO: 195
Which three are options for invalid recipient handling? (Select three.)
Answer: A, B, C
Answer: C
Which volume read policy preferentially reads from plexes at the locally defined site?
A. select
B. prefer
C. siteread
D. local
Answer: C
Answer: D
A. vxdmpadm iostat
B. vxtrace
C. vxmemstat
D. vxstat
E. vxbench
Answer: A, D
Answer: A
Answer: A
QUESTION NO: 202
What is only configured during the Site Setup wizard?
A. Local domains
B. Policy configuration
C. Add administrator accounts
D. Appliance role
Answer: A
Answer: A
A. Spam tab
B. Administration tab
C. Virus tab
D. Status tab
Answer: A
Answer: B
A. vxdisk
B. vxdctl
C. vxconfigd
D. vxinfo
Answer: A
A. vxconfigd -k -x 0
B. vxconfigd -k -x 6
C. vxconfigd -k -x 9
D. vxconfigd -k -x 10
Answer: C
A. LDAP server
B. DNS server
C. Default gateway
D. Internal mail server
Answer: C
Answer: A, C, D
Answer: D
A. minimumq
B. priority
C. round-robin
D. adaptive
Answer: A
A. check_all
B. check_alternate
C. check_periodic
D. check_disabled
Answer: D
Answer: B
Answer: D
A. a list of sender groups, sender authentication profiles, and scan settings for an organization
B. disposition configuration, user email addresses, and quarantine settings
C. an LDAP source and a local domain
D. conditions, a set of actions, and groups to whom the policy applies
Answer: D
Answer: B
A. within the same directory, original has another owner with 0400 permissions
B. between two different directories on the same file system
C. within the same directory over an NFS exported Veritas File System (VxFS)
D. between two different Veritas File Systems (VxFS) on the same host
E. between the primary fileset and a Storage Checkpoint on the same file system
Answer: B, C
A. Spam
B. Invalid recipients
C. Reputation
D. Virus
E. Compliance
Answer: A, D, E
QUESTION NO: 220
A Storage Checkpoint is created with the command:
Which statement about this checkpoint is correct if the file system runs out of space?
Answer: A
A. 1MB
B. 9MB
C. 10MB
D. 11MB
Answer: C
Answer: A, B
A. Conduit
B. Uplink
C. LiveUpdate
D. Sequencer
Answer: A
Answer: C
A. vxconfigd
B. vxdctl
C. vxdisksetup
D. vxdg
E. vxmend
Answer: B, D
A. Policy violated
B. Subject
C. Recipient
D. Attachment names
Answer: B, C, D
A. /etc/sites
B. /etc/hosts
C. /etc/vx/sites
D. /etc/vx/volboot
Answer: D
A. fsmap
B. fsapadm
C. fsadm
D. fsppadm
Answer: D
A. /mountpoint/lost+found/.checkpoint
B. /mountpoint/.checkpoint
C. /mountpoint/lost+found/.snapshot
D. /mountpoint/.snapshot
Answer: B