Virtual of ST0-237 answers materials and training materials for Symantec certification for candidates, Real Success Guaranteed with Updated ST0-237 pdf dumps vce Materials. 100% PASS Symantec Data Loss Prevention 12 Technical Assessment exam Today!

2021 Oct ST0-237 study guide

Q171. You execute the qio_convertdbfiles command to convert the database files to use Quick I/O. The command results with an error that the database files are not on a VxFS file system. You need to convert the database files to use Quick I/O. 

What should you do? 

A. Run the qio_getdbfiles command to get the database files on the VxFS file system. 

B. Remove the files from the mkgio.dat file. 

C. Predefine the DB2 environment variable $DB2DATABASE. 

D. Set the database type to DB2. 

Answer:


Q172. An administrator is applying a newly created agent configuration to an Endpoint server. Upon inspection, the new configuration is unassigned in the Endpoint Server Details. 

What is a possible cause for the new configuration failing to be assigned? 

A. the system default settings were saved to the new agent configuration 

B. the server that the new agent configuration was applied to needs to be recycled 

C. the new agent configuration was saved without applying it to the Endpoint server 

D. the new agent configuration was copied and modified from the default agent configuration 

Answer:


Q173. An administrator running a company's first Discover scan needs to minimize network load. The duration of the scan is unimportant. Which method should the administrator use to run the Discover scan? 

A. ignore smaller than 

B. ignore larger than 

C. throttling 

D. date last accessed 

Answer:


Q174. What are two reasons why a company should implement data loss prevention? (Select two.) 

A. To prevent the threat of malware 

B. To demonstrate regulatory compliance 

C. To protect the CISO from liability due to a security breach 

D. To prevent employee malicious activity 

E. To protect brand and reputation 

Answer: B,E 

272. Which three Enterprise Security Manager policy-run options can be configured in Symantec Control Compliance Suite 9.0? (Select three.) 

A. Collect data from last policy run 

B. Run policy before collecting data 

C. Collect data from last n policy runs 

D. Run policy n days before collecting data 

E. Run policy if data is older than n days 

Answer: A,B,E 


Q175. Which structure records are stored in the private region? (Each correct answer presents part of the solution. Select three.) 

A. Disk group configuration 

B. Disk and disk group ID 

C. File system metadata 

D. Disk group kernel log 

E. Partition tables 

Answer: A,B,D 


Avant-garde ST0-237 practice:

Q176. Silent installation can be performed for which component of Symantec Control Compliance Suite 9.0? 

A. directory server 

B. Data Processing Service 

C. application server 

D. Response Assessment Module 

Answer:


Q177. In System Overview, the status of a detection server is shown as 'unknown'. Examination of the detection server reveals all Vontu services are running. 

Which port is blocked and causing the server to be in the 'unknown' state? 

A. 443 

B. 8000 

C. 8100 

D. 8300 

Answer:


Q178. Which action must be performed immediately after the configuration/modification of Data Processing Service settings? 

A. register configuration 

B. refresh configuration 

C. synchronize configuration 

D. update configuration 

Answer:


Q179. You work in a Server Operations Center (SOC) with other administrators monitoring VxVM background tasks after you initiate them. You need to set up a VxVM task so that these SOC administrators can track your background tasks against the change control documentation. 

What would you do address this requirement? 

A. Use the vxtask label command to mark the task with the change control number. 

B. Use the "-n" flag to associate the task with the change control number. 

C. Use the "-t" flag to mark the task with the change control number. 

D. Use the vxtask tag command to associate the task id with the change control number. 

Answer:


Q180. Refer to the exhibit. 

An administrator needs to implement the use of a scanner, but is unfamiliar with the general, high-level process associated with scanners. Which action occurs in step 3? 

A. the scanner reviews and confirms configuration parameters 

B. the scanner connects to target and reads the content and metadata 

C. the scanner process is started by a user or scheduled event 

D. the scanner packages filtered content and posts the data to Discover server 

Answer: