250-513 Actual Exam Questions

Last updated on Nov. 16, 2024.
Vendor:Symantec
Exam Code:250-513
Exam Name:Administration of Symantec Data Loss Prevention 12
Exam Questions:300
 

Topic 1 - Volume A

Question #1 Topic 1

When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a
Quick I/O file will return "Cannot open file ".
How should you resolve this error?

  • A. Ensure that the file system is ufs file system.
  • B. Mount the file system without "nosuid" mount option.
  • C. Unmount and mount the file system.
  • D. Reconfigure the Quick I/O.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

You have installed Storage Foundation 5.0 Standard server with a number of hosts. You want to centrally monitor and manage the hosts. You also want to generate reports for the hosts and the storage resources that the hosts consume.
What should you do?

  • A. Install the Veritas Quick I/O option on Storage Foundation 5.0 server.
  • B. Install Veritas Storage Foundation Management Server on Storage Foundation 5.0 server.
  • C. Install Veritas Storage Foundation Management Host on Storage Foundation 5.0 server.
  • D. Upgrade Storage Foundation 5.0 Standard to Storage Foundation 5.0 Enterprise.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #3 Topic 1

You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance.
What should you do?

  • A. Create a file named quota and assign it to the finance group.
  • B. Create a file named quota and place it in the root directory of the file system.
  • C. Create a file named quota.grp and assign it to the group of users.
  • D. Create a file named quota.grp that is owned by the root of the file system.
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #4 Topic 1

What is the main difference between data loss prevention and other security technologies?

  • A. It is designed to take a content aware approach to security.
  • B. It determines the data owner of inbound sensitive information.
  • C. It quarantines adware before it is able to extract confidential information.
  • D. It is designed to give visibility into where the company’s least sensitive data is stored.
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #5 Topic 1

You are responsible for administering the Storage Foundation for Oracle server. You plan to clone a database using Database FlashSnap. When you run the dbed_vmchecksnap command you get an error "SFORA dbed_vmchecksnap ERROR V-81-5677 Could not find a mandatory, primary and valid archive destination for database PROD." You want to resolve this error.
What should you do?

  • A. Empty the full mandatory location and make free space available for the Oracle database.
  • B. Define the location of the archive logs in the UNC format.
  • C. Change the default archive location.
  • D. Set the valid archive destination.
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #6 Topic 1

You move a set of files from a VxFS file system to another file system. When the files are moved, the extent attributes are not moved along with the files and are lost during the migration.
What could be a possible cause for this problem?

  • A. The target file system is not a VxFS type file system.
  • B. There is a variation in the block size of source and target VxFS file system.
  • C. The target VxFS file system does not have enough free space to accommodate the extent attributes.
  • D. The target VxFS file system uses mixed block size.
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #7 Topic 1

What causes the majority of data loss prevention violations?

  • A. hackers exploit vulnerabilities and exfiltrate confidential data
  • B. companies lack security policies to prevent loss of confidential data
  • C. employees unintentionally expose confidential data
  • D. system backups are performed improperly
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #8 Topic 1

You execute the command ps ef | grep vxatd.
What is the expected output of this command?

  • A. The command verifies the Fully Qualified Host Name.
  • B. The command verifies the status of Symantec Authentication service.
  • C. The command verifies the status of Root Broker.
  • D. The command verifies the status of Authentication Broker.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #9 Topic 1

What is the default naming format for a plex?

  • A. volume_name-xx
  • B. volume_namexx
  • C. volumename-xx
  • D. volumenamexx
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #10 Topic 1

What is the minimum number of plexes required for true mirroring to provide redundancy of data?

  • A. One
  • B. Two
  • C. Three
  • D. Four
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

file Viewing page 1 out of 30 pages.
Viewing questions 1-10 out of 300 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago