Which two Symantec Mail Security 8300 Control Center components can be used to store email security violations
Which two Symantec Mail Security 8300 Control Center components can be used to store
email security violations? (Select two.)
Which command is used to display current file system I/O parameters for a Veritas File System (VxFS)?
Which command is used to display current file system I/O parameters for a Veritas File
System (VxFS)?
Which command should be used to analyze directory organization?
An administrator suspects that file creation performance is degraded in several directories
on a Veritas File System (VxFS).
Which command should be used to analyze directory organization?
Which steps must the owner take?
A file is compressed using vxcompress with a strength of 3. The owner subsequently needs
to change it to a strength of 9.
Which steps must the owner take?
Which Storage Foundation utility is used to generate random read and random write workloads so that the perfor
Which Storage Foundation utility is used to generate random read and random write
workloads so that the performance of a file system can be analyzed?
What is the primary purpose of Compliance Folders?
What is the primary purpose of Compliance Folders?
Which command is used to gather buffer cache statistics for a Veritas File System (VxFS)?
Which command is used to gather buffer cache statistics for a Veritas File System (VxFS)?
Which step must be performed first to change the volume to have three columns without losing the redundancy?
A disk group with four disks contains a two-column striped and mirrored volume.
Which step must be performed first to change the volume to have three columns without
losing the redundancy?
which two volume layouts?
The vxassist convert command can be used to convert between which two volume layouts?
(Select two.)
Which firewall port should be opened to download antispamrulesets from Symantec?
Which firewall port should be opened to download antispamrulesets from Symantec?