Certbus > Symantec > SCS > 250-252 > 250-252 Online Practice Questions and Answers

250-252 Online Practice Questions and Answers

Questions 4

What are two benefits of virtual storage using Veritas Storage Foundation 6.0 for UNIX? (Select two.)

A. improved deduplication for data backup

B. ability to resize storage across physical devices

C. improved disaster recovery by mirroring between arrays

D. enhanced file sharing

E. increased virtual memory

Browse 109 Q&As
Questions 5

What is the correct RAID level for a layered volume layout that combines mirroring with striping or concatenation?

A. RAID-0

B. RAID-1

C. RAID-0+1

D. RAID-1+0

Browse 109 Q&As
Questions 6

Which statement is true regarding the encrypted attachment disposition in the Virus policy settings?

A. it is a subset of the 'unscannable' disposition

B. it leverages TLS or gateway to gateway encryption

C. the default action is to delete

D. it also includes password protected files

Browse 109 Q&As
Questions 7

A server with one disk group is running Veritas Storage Foundation 6.0 for UNIX and suffers a system board failure. An administrator moves the disks in that disk group to a new server. When the administrator tries to import the disk group, the import fails.

Which command should the administrator use to successfully import the disk group?

A. vxdg -C import

B. vxdg -f import

C. vxdg -n newname import

D. vxdg -t import

Browse 109 Q&As
Questions 8

What does the System Locale setting control?

A. language to use for display and reporting

B. time zone for the region in which a Scanner is deployed

C. format of numbers, dates, and time for Symantec Mail Security 8300

D. language to use for viewing quarantine

Browse 109 Q&As
Questions 9

Which volume layout is most resilient to disk failure?

A. mirror

B. layered

C. stripe

D. concatenated

Browse 109 Q&As
Questions 10

A system with a single, locally mounted file system loses power and is subsequently restarted. All hardware is functioning properly and the intent log is valid. The administrator then mounts the file system using the mount command.

What is the expected behavior?

A. Mount will replay the intent log.

B. Mount prints an error stating that a fsck log replay will be required.

C. Mount succeeds silently as normal.

D. Mount prints an error message stating that a full fsck will be required.

Browse 109 Q&As
Questions 11

What is the default block size for a 2TB file system?

A. 1024

B. 2048

C. 4096

D. 8192

Browse 109 Q&As
Questions 12

Which command attempts to repair a missing disk access record by finding the name of the device in the private region and matching it to an existing disk media record?

A. vxdisk

B. vxdctl

C. vxreattach

D. vxrecover

Browse 109 Q&As
Questions 13

A disk group with four disks contains a two-column striped and mirrored volume.

Which step must be performed first to change the volume to have three columns without losing the redundancy?

A. use the vxassist command to relayout the volume

B. use the vxrelayout command to relayout the volume

C. use the vxassist command to convert the volume

D. use the vxdg command to add two disks to the disk group

Browse 109 Q&As
Questions 14

What is the function of the Symantec Mail Security 8300 default Email Virus Policy?

A. checks for viruses, mass-mailing worms, spyware, adware, and suspicious attachments

B. checks for viruses, mass-mailing worms, spam, and suspected spam

C. checks for internal and external mass-mailings and suspicious attachments

D. checks for spyware, adware, and all message attributes

Browse 109 Q&As
Questions 15

What is a key consideration when deploying a scanner with IM filtering in production?

A. ensuring that the Symantec appliance points to an internal DNS server to route traffic to the public network

B. allocating 4 externally routable IP addresses for each IM Scanner

C. adjusting internal DNS records to route internal IM traffic to the SMS Scanner that is configured for IM filtering

D. installing Symantec IM Setup wizard on each client desktop in the organization

Browse 109 Q&As
Questions 16

Which operation must be performed to change a layered volume to a non-layered volume?

A. Convert the volume using the vxassist command

B. Convert the volume using the vxrelayout command

C. Convert the volume using the vxedit command

D. Convert the volume using the vxcdsconvert command

Browse 109 Q&As
Questions 17

Which command is used to restart the Veritas Volume Manager (VxVM) configuration daemon with the highest level of debugging?

A. vxconfigd -k -x 0

B. vxconfigd -k -x 6

C. vxconfigd -k -x 9

D. vxconfigd -k -x 10

Browse 109 Q&As
Questions 18

What is the default Dynamic Multi-Pathing (DMP) path restoration policy?

A. check_all

B. check_alternate

C. check_periodic

D. check_disabled

Browse 109 Q&As
Exam Code: 250-252
Exam Name: Administration of Veritas Storage Foundation 6.0 for Unix
Last Update: Apr 23, 2024
Questions: 109 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99