What is the default inbound action for a suspected virus?
What is the default inbound action for a suspected virus?
Which command will print information for Dynamic Multi-pathing nodes on a system?
Which command will print information for Dynamic Multi-pathing nodes on a system?
What are the key components of a group policy in Symantec Mail Security 8300?
What are the key components of a group policy in Symantec Mail Security 8300?
What is an advantage of the Veritas Storage Foundation 6.1 for UNIX checkpoint visibility feature?
What is an advantage of the Veritas Storage Foundation 6.1 for UNIX checkpoint visibility
feature?
which two situations can FileSnap be used to create a space optimized copy of a file?
In which two situations can FileSnap be used to create a space optimized copy of a file?
(Select two.)
Which three policy types can be applied at the group level?
Which three policy types can be applied at the group level? (Select three.)
Which statement about this checkpoint is correct if the file system runs out of space?
A Storage Checkpoint is created with the command:
fsckptadm -R create thu_8pm /data1
Which statement about this checkpoint is correct if the file system runs out of space?
What is the resulting file size of the copy?
A user creates a 10 MB file, which is then compressed using vxcompress to reduce the file
size to 1MB. Another user copies this file to a different Veritas File System (VxFS) on the
same host using cp.
What is the resulting file size of the copy?
what will happen to the compressed extents?
When running vxfilesnap or deduplication on an already compressed file, what will happen
to the compressed extents?
Which two could appear on a deployment checklist when integrating Symantec Mail Security 8300 in a production
Which two could appear on a deployment checklist when integrating Symantec Mail Security
8300 in a production environment? (Select two.)