Which product can replace a confidential document residing on a public share with a Marker File explaining why
Which product can replace a confidential document residing on a public share with a Marker
File explaining why the document was removed?
Which two Discover target configuration mistakes might be causing the problem?
During testing, an administrator configures a Network Discover target to identify and
quarantine confidential files. The target is set up with a Default credential that has read-only
permissions on the file server. After running the scan and checking the results, the
administrator finds several incidents from the scan, but observes that all confidential files
are still in their original location, and the configured quarantine directory is empty (contains
none of the confidential files). Which two Discover target configuration mistakes might be
causing the problem? (Select two.)
Which two characteristics must be present when preparing an application to be configured for high availability
Which two characteristics must be present when preparing an application to be configured
for high availability using Veritas Cluster Server? (Select two.)
Which two actions must the administrator perform for the storage in order to complete the configuration of the
An administrator is planning to migrate a locally hosted application to high availability. Data
migration on the shared storage has been properly completed. Which two actions must the
administrator perform for the storage in order to complete the configuration of the
application service? (Select two.)
Which failover policy should the administrator implement to achieve this requirement?
An administrator is planning to configure a new application service in a Veritas cluster. In
the case of an application failure, the company requires that the node with the fewest
running service groups be selected as the failover target. Which failover policy should the
administrator implement to achieve this requirement?
Which data locations should an organization scan first?
Which data locations should an organization scan first?
Which detection method is used for fingerprinting and protecting unstructured data, such as source code docume
Which detection method is used for fingerprinting and protecting unstructured data, such as
source code documents or merger and acquisition documents?
which directory?
The log files used to verify that a custom application is being properly monitored are located
in which directory?
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service
What should be considered before enabling the Preventing Concurrency Violation (ProPCV)
attribute in a service group?
What are two resource types that Proxy resources can reference?
What are two resource types that Proxy resources can reference? (Select two.)