skillhub

ST0-237 Symantec Data Prevention Technical Assessment Exam

ST0-237 Symantec Data Prevention Technical Assessment Practice Exam || Get Certification

0 (0)
Take me there!
Sample QuestionsQ) You are turning on the quota on a file system for the first time. You want to ensure you are able to establish quota for a group of users named finance. What should you do? a) Create a file named quota and assign it to the finance group. b) Create a file named quota and place it in the root directory of the file system. c) Create a file named quota.grp and assign it to the group of users. d) Create a file named quota.grp that is owned by the root of the file system. Q) What is the main difference between data loss prevention and other security technologies? a) It is designed to take a content aware approach to security. b) It determines the data owner of inbound sensitive information c) It quarantines adware before it is able to extract confidential information d) It is designed to give visibility into where the company's least sensitive data is stored. Q) You move a set of files from a VxFS file system to another file system. When the files are moved, the extent attributes are not moved along with the files and are lost during the migration. What could be a possible cause for this problem? a) The target file system is not a VxFS type file system. b) There is a variation in the block size of source and target VxFS file system c) The target VxFS file system does not have enough free space to accommodate the extent attributes. d) The target VxFS file system uses mixed block size Q) What causes the majority of data loss prevention violations? a) hackers exploit vulnerabilities and exfiltrate confidential data b) companies lack security policies to prevent loss of confidential data c) employees unintentionally expose confidential data d) system backups are performed improperly Q) You execute the command | grep vxatd. What is the expected output of this command? a) The command verifies the Fully Qualified Host Name. b) The command verifies the status of Symantec Authentication service. c) The command verifies the status of Root Broker. d) The command verifies the status of Authentication Broker