B It collects content and metadata from a variety of repositories C It sends

B it collects content and metadata from a variety of

This preview shows page 4 - 6 out of 6 pages.

B. It collects content and metadata from a variety of repositories. C. It sends collected content to the Enforce Server for processing. D. It specifies the types of repositories that can be scanned. Answer: B QUESTION: 233 What should an administrator do when the License Key expires? A. Enter a new key on the Advanced Settings page B. Enter a new key on the System Settings page C. Edit the key in the VontuManager.conf file D. Edit the key in the Protect.properties file Answer: B QUESTION: 234 Which three does the Environment Check Utility (ECU) provide? (Select three.) A. Software build numbers B. System events records C. Days remaining on the current license D. Operating system version of servers E. Installation configuration settings Answer: A, D, E QUESTION: 235 On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocol recognition? A. Secure tunneling protocols B. Pre-defined UDP protocols
Image of page 4
C. User-configured TCP protocols D. System-defined UDP and TCP protocols Answer: C
Image of page 5
For More exams visit http s ://killexams.com /vendors-exam-list Kill your exam at First Attempt .... Guaranteed!
Image of page 6

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '20
  • administrator, Instant messaging, User Datagram Protocol, Symantec, two-node Veritas Cluster

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture