Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec 250-513 Exam -

Free 250-513 Sample Questions:

Q: 1
What is the default naming format for a plex?
A. volume_name-xx
B. volume_namexx
C. volumename-xx
D. volumenamexx
Answer: A

Q: 2
How many free partitions do you need to encapsulate a boot disk?
A. 1
B. 2
C. 3
D. 4
Answer: B

Q: 3
You execute the command ps 8211;ef | grep vxatd. What is the expected output of this command?
A. The command verifies the Fully Qualified Host Name.
B. The command verifies the status of Symantec Authentication service.
C. The command verifies the status of Root Broker.
D. The command verifies the status of Authentication Broker.
Answer: B

Q: 4
What causes the majority of data loss prevention violations?
A. hackers exploit vulnerabilities and exfiltrate confidential data
B. companies lack security policies to prevent loss of confidential data
C. employees unintentionally expose confidential data
D. system backups are performed improperly
Answer: C

Q: 5
You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance. What should you do?
A. Create a file named quota and assign it to the finance group.
B. Create a file named quota and place it in the root directory of the file system.
C. Create a file named quota.grp and assign it to the group of users.
D. Create a file named quota.grp that is owned by the root of the file system.
Answer: D

Q: 6
While replacing a disk containing a plex's subdisk, you discover that the contents of the plex are out-of-date with respect to the volume. What will be the state of the plex?
Answer: B

Q: 7
What is the main difference between data loss prevention and other security technologies?
A. It is designed to take a content aware approach to security.
B. It determines the data owner of inbound sensitive information.
C. It quarantines adware before it is able to extract confidential information.
D. It is designed to give visibility into where the company's least sensitive data is stored.
Answer: C

Q: 8
What is the minimum number of plexes required for true mirroring to provide redundancy of data?
A. One
B. Two
C. Three
D. Four
Answer: B

Q: 9
Which two components can perform a scan of a workstation? (Select two.)
A. Endpoint Server
B. DLP Agent
C. Network Prevent
D. Enforce Server
E. Discover Server
Answer: B, E

Q: 10
Which structures are parts of the Cross-platform Data Sharing (CDS) format?
A. An Operating System-reserved area
B. A directory area
C. private region
D. A public region
E. A Bad Block Relocation Area
Answer: A, C, D

© 2014, All Rights Reserved