Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

Symantec 250-513 Exam Actual Questions

The questions for 250-513 were last updated on April 13, 2024.
  • Viewing page 1 out of 30 pages.
  • Viewing questions 1-10 out of 305 questions

Topic 1 - Volume A

Question #1 Topic 1

When you attempt to access Quick I/O files with vxfddstat application on Veritas Storage Foundation for Oracle, you get an error: Running vxfddstat or qiostat on a
Quick I/O file will return "Cannot open file ".
How should you resolve this error?

  • A. Ensure that the file system is ufs file system.
  • B. Mount the file system without "nosuid" mount option.
  • C. Unmount and mount the file system.
  • D. Reconfigure the Quick I/O.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

You have installed Storage Foundation 5.0 Standard server with a number of hosts. You want to centrally monitor and manage the hosts. You also want to generate reports for the hosts and the storage resources that the hosts consume.
What should you do?

  • A. Install the Veritas Quick I/O option on Storage Foundation 5.0 server.
  • B. Install Veritas Storage Foundation Management Server on Storage Foundation 5.0 server.
  • C. Install Veritas Storage Foundation Management Host on Storage Foundation 5.0 server.
  • D. Upgrade Storage Foundation 5.0 Standard to Storage Foundation 5.0 Enterprise.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #3 Topic 1

You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance.
What should you do?

  • A. Create a file named quota and assign it to the finance group.
  • B. Create a file named quota and place it in the root directory of the file system.
  • C. Create a file named quota.grp and assign it to the group of users.
  • D. Create a file named quota.grp that is owned by the root of the file system.
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #4 Topic 1

What is the main difference between data loss prevention and other security technologies?

  • A. It is designed to take a content aware approach to security.
  • B. It determines the data owner of inbound sensitive information.
  • C. It quarantines adware before it is able to extract confidential information.
  • D. It is designed to give visibility into where the company’s least sensitive data is stored.
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #5 Topic 1

You are responsible for administering the Storage Foundation for Oracle server. You plan to clone a database using Database FlashSnap. When you run the dbed_vmchecksnap command you get an error "SFORA dbed_vmchecksnap ERROR V-81-5677 Could not find a mandatory, primary and valid archive destination for database PROD." You want to resolve this error.
What should you do?

  • A. Empty the full mandatory location and make free space available for the Oracle database.
  • B. Define the location of the archive logs in the UNC format.
  • C. Change the default archive location.
  • D. Set the valid archive destination.
Reveal Solution Hide Solution   Discussion  

Correct Answer: D 🗳️

Question #6 Topic 1

You move a set of files from a VxFS file system to another file system. When the files are moved, the extent attributes are not moved along with the files and are lost during the migration.
What could be a possible cause for this problem?

  • A. The target file system is not a VxFS type file system.
  • B. There is a variation in the block size of source and target VxFS file system.
  • C. The target VxFS file system does not have enough free space to accommodate the extent attributes.
  • D. The target VxFS file system uses mixed block size.
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #7 Topic 1

What causes the majority of data loss prevention violations?

  • A. hackers exploit vulnerabilities and exfiltrate confidential data
  • B. companies lack security policies to prevent loss of confidential data
  • C. employees unintentionally expose confidential data
  • D. system backups are performed improperly
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #8 Topic 1

You execute the command ps ef | grep vxatd.
What is the expected output of this command?

  • A. The command verifies the Fully Qualified Host Name.
  • B. The command verifies the status of Symantec Authentication service.
  • C. The command verifies the status of Root Broker.
  • D. The command verifies the status of Authentication Broker.
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #9 Topic 1

What is the default naming format for a plex?

  • A. volume_name-xx
  • B. volume_namexx
  • C. volumename-xx
  • D. volumenamexx
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #10 Topic 1

What is the minimum number of plexes required for true mirroring to provide redundancy of data?

  • A. One
  • B. Two
  • C. Three
  • D. Four
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...