Which two products are required for quarantining confidential files residing inappropriately on a public file
Which two products are required for quarantining confidential files residing inappropriately on a
public file share? (Select two.)
Which two tasks must be performed to achieve this?
A customer needs to restore individual objects and attributes in Active Directory.
Which two tasks must be performed to achieve this? (Select two.)
Which information is recommended to be included in an Exact Data Matching (EDM) data source?
Which information is recommended to be included in an Exact Data Matching (EDM) data source?
Which type of rule do incident responders use to remediate an incident?
Which type of rule do incident responders use to remediate an incident?
which two cases will the agent status remain green (good) on the Agent Events page?
In which two cases will the agent status remain green (good) on the Agent Events page? (Select
two.)
Which policy setting in Symantec NetBackup 7.5 will perform the backup the fastest?
An administrator needs to protect multiple clients that contain multiple data volumes to removable
media.
Which policy setting in Symantec NetBackup 7.5 will perform the backup the fastest?
Why should Network Monitor be configured to filter out low-threat traffic?
Why should Network Monitor be configured to filter out low-threat traffic?
What is the default incident data retention behavior for Network Monitor and Network Prevent?
What is the default incident data retention behavior for Network Monitor and Network Prevent?
which other schedule can be configured as a synthetic backup?
In addition to the full backup schedule type, which other schedule can be configured as a synthetic
backup?
Which three are valid Scanned Content filter types for the Discover File System target?
Which three are valid Scanned Content filter types for the Discover File System target? (Select
three.)