Tips to Pass 250-513 Exam (81 to 90)

Proper study guides for Most up-to-date Symantec Administration of Symantec Data Loss Prevention 12 certified begins with Symantec 250-513 preparation products which designed to deliver the Guaranteed 250-513 questions by making you pass the 250-513 test at your first time. Try the free 250-513 demo right now.

2016 Jun 250-513 Study Guide Questions:

Q81. – (Topic 3) 

What is the importance of using a CPU in Oracle within the DLP technology? 

A. Central Processing Unit – ensures database has enough processing power 

B. Command Processor Unit – lays out the commands to process for the database 

C. Critical Patch Update – ensures Oracle is securely patched 

D. Communications Processing Unit – sends alerts to administrator 

Answer: C 

Q82. – (Topic 3) 

You have installed Storage Foundation 5.0 on the Unix platform and need to add licenses. You want to ensure that the licenses are correctly installed on the system. 

What should you do? 

A. Add the valistat package. 

B. Add the VRTSvlic package. 

C. Add the vxlicrep package. 

D. Add the VRTSspt package. 

Answer: B 

Q83. – (Topic 2) 

While working under VxVM control, you execute a command:vxassist –g hrdg mirror payvol hrdg03 

What will be the expected result of this command? 

A. This command will mirror the user volumes to the destination disk. 

B. This command will not execute. 

C. This command will list the disk under disk group hrdg. 

D. This command will mirror the volume payvol from the disk group hrdg, using the disk hrdg03. 

Answer: D 

250-513  exam cost

Regenerate 250-513 brain dumps:

Q84. – (Topic 2) 

You need to create a storage checkpoint that contains file system metadata and data blocks. You want to ensure that the storage checkpoint that you create can be mounted, accessed, and written in Veritas File System. The storage checkpoint that you create must represent an image of the active file system. 

Which type of storage checkpoint should you create to meet this goal? 

A. Create removable storage checkpoint. 

B. Create non-mountable storage checkpoint. 

C. Create data storage checkpoint. 

D. Create nodata storage checkpoint. 

Answer: C 

Q85. – (Topic 3) 

Refer to the exhibit. 

A DLP administrator is planning the deployment of the Symantec Data Loss Prevention with Mobile Email Monitor. Where should the administrator place the Mobile Email Monitor? 

A. 1 

B. 2 

C. 3 

D. 4 

Answer: C 

Q86. – (Topic 3) 

You need to create a new volume that bears the failure of one enclosure and provides greater reliability. To meet the required goal, you type the following command on the command line: 

vxassist -g diskgroup -P storagepool make strpvol 2g layout=mirror \\ nmir=2 mirror=enclosure options 

What should be the expected outcome of this command? 

A. The new 2GB mirrored volume will have mirrors on separate enclosures with 2 mirrors. 

B. The new 2GB mirrored volume will have mirrors on separate controllers with 2 mirrors. 

C. The new 2GB mirrored volume will have mirrors on a single enclosure with 2 mirrors. 

D. The new 2GB mirrored volume will have mirrors on separate enclosures with 2 mirrors on each enclosure. 

Answer: A

Vivid 250-513 tutorials:

Q87. – (Topic 3) 

You are monitoring a file system on a Solaris operating system using Veritas Volume Manager when the following kernel message appears: WARNING. msgcnt x: mesg 069: V-2-69: memory usage specified by the vxfs:vxfs_ninode and vxfs:vx_bc_bufhwm parameters exceeds available memory; the system may hang under heavy load. 

You need to resolve this error. What should you do? 

A. Increase the value of one or both parameters to 100% of physical memory or to 100% of kernel virtual memory 

B. Remove either the physical memory parameter or the kernel virtual memory parameter. 

C. Leave the parameters at current levels and disregard the system message because it is a false message. 

D. Reduce the value of one or both parameters to less than 50% of physical memory or to 66% of kernel virtual memory 

Answer: D 

Q88. – (Topic 2) 

A compliance officer needs to understand how the company is complying with its data security policies over time. Which report should the compliance officer generate to obtain the compliance information? 

A. Policy Trend report, summarized by policy, then quarter 

B. Policy Trend report, summarized by policy, then severity 

C. Policy report, filtered on quarter, and summarized by policy 

D. Policy report, filtered on date, and summarized by policy 

Answer: A 

Q89. – (Topic 2) 

In the administration of a large storage environment, you learn that files not only have differing usages at the times they are created, but that many type of files have individual life cycles. User files do not have a defined lifecycle. You want DST capabilities to manage these files. 

How does DST help address this issue? 

A. DST does not have a mechanism designed to address this issue. 

B. You can use DST to dynamically relocate files to reduce costs. 

C. You can use DST to archives files to another file server. 

D. You can use DST to remove unused files from the file system and speed access to remaining files. 

Answer: B 

Q90. – (Topic 1) 

When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a Quick I/O file will return "Cannot open file ". 

How should you resolve this error? 

A. Ensure that the file system is ufs file system. 

B. Mount the file system without "nosuid" mount option. 

C. Unmount and mount the file system. 

D. Reconfigure the Quick I/O. 

Answer: B 

About 250-513 Information: 250-513 Dumps