Summer Special Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

VCS-324 Questions and Answers

Question # 6

A Veritas Enterprise Vault 12.3 administrator activated Auditing at the Directory level. During this process, the administrator created the audit database and can log onto the SQL server without errors. When checking the content of the audit database, the administrator notices that nothing is being audited.

How should the administrator resolve this issue?

A.

after enabling on the Enterprise Vault Directory, restart the Enterprise Vault Admin Service level

B.

enable Auditing in the Exchange Server properties in the VAC and select the auditing options

C.

enable Auditing in the Enterprise Vault Server properties in the VAC and select the auditing options

D.

enable Auditing in the Enterprise Vault Site properties in the VAC and select the auditing options

Full Access
Question # 7

Which two pre-requisites are necessary for installing Enterprise Vault Operations Manager? (Select two.)

A.

the Active Directory account used for monitoring requires an Exchange Mailbox

B.

the Active Directory account used for monitoring must have the password set to "Never Expire"

C.

the Active Directory account used by Operations Manager must be part of the Exchange Administrators group

D.

configure the SMTP server to relay monitoring messages from the Enterprise Vault server

E.

Enterprise Vault services must exist on the server you wish to install Operations Manager on

Full Access
Question # 8

Which two functionalities are available after enabling the FSA Agent on a Windows file server? (Select two.)

A.

Internet Shortcuts

B.

File Blocking

C.

Mac interoperability

D.

FSA Placeholders

E.

Retention Folders

Full Access
Question # 9

Which Veritas Enterprise Vault 12.3 classification property should an administrator use to ensure items from a specific email domain are tagged for review in Compliance Accelerator?

A.

evaction.discard

B.

evtag.inclusion

C.

evtag.category

D.

evtag.exclusion

Full Access
Question # 10

An Enterprise Vault administrator intends to secure IMAP connections using SSL. What are two requirements for the SSL certificate? (Select two.)

A.

A certificate signing request (CSR) must be sent to Veritas VeriSign.

B.

The certificate must be in PEM format.

C.

It must be a Subject Alternate Name (SAN) certificate.

D.

The certificate must be Base64 encoded.

E.

The certificate must be in p7b format.

Full Access
Question # 11

Which two values are configurable in Veritas Enterprise Vault 12.3 Monitoring? (Select two.)

A.

Threshold

B.

Size

C.

Frequency

D.

End time

E.

Capacity

Full Access
Question # 12

Which two storage types are supported for use as Vault Store partitions? (Select two.)

A.

Network Attached Storage using NFS protocol

B.

Network Attached Storage using CIFS protocol

C.

directly attached disks formatted with the EXT3 filesystem

D.

directly attached disks formatted with the NTFS filesystem

E.

directly attached disks formatted with the FAT32 filesystem

Full Access
Question # 13

How should an administrator eliminate automated out-of-office messages from the mailbox archives?

A.

remove the “IPM.Note.Rules.Oof.TemplateMicrosoft” message class in the Enterprise Vault Directory properties

B.

set a classification rule using the “evaction.discard” property and a short retention category

C.

click on the “do not archive pending reminder” setting in the Enterprise Vault Mailbox archiving policy

D.

define the “TAG=IPM.Note.Rules.Oof.Template.Microsoft” property in the Custom Properties.xml file

Full Access
Question # 14

A Veritas Enterprise Vault 12.3 administrator wants to view how often items are read or retrieved after configuring Enterprise Vault Auditing.

Which two Enterprise Vault Operation Reports require Auditing to be enabled? (Select two.)

A.

Archive Quota Usage

B.

Items Archival Rate

C.

Archived Items Access

D.

Exchange Server Journal Mailbox Archiving Trends

E.

Archived Items Access Trends

Full Access
Question # 15

An administrator has edited the ApproachingArchiveQuotaLimit.msg and the ArchiveQuotaLimitReached.msg files in the C:\Program Files (x86)\Enterprise Vault\Languages\Mailbox Messages\en folder.

Which task should the administrator perform next to ensure users are alerted when their archives are approaching or have exceeded their quota?

A.

copy the edited ApproachingArchiveQuotaLimit.msg and the ArchiveQuotaLimitReached.msg files to the C:\Program Files (x86)\Enterprise Vault\Languages\Mailbox Messages

B.

configure the SMTP endpoint and run the provisioning task

C.

copy the edited ApproachingArchiveQuotaLimit.msg and the ArchiveQuotaLimitReached.msg files to the C:\Program Files (x86)\Enterprise Vault

D.

configure Send As permissions on the Exchange server

Full Access
Question # 16

What is the Veritas recommended amount of memory required for Veritas Enterprise Vault 12.3 ?

A.

8GB

B.

16GB

C.

32GB

D.

64GB

Full Access
Question # 17

What is the Veritas recommended minimum amount of memory required for Veritas Enterprise Vault 12.3 ?

A.

8 GB

B.

16 GB

C.

32 GB

D.

4 GB

Full Access
Question # 18

In which two instances is a check for secured items performed on NTFS Partitions if Use the Archive attribute is set? (Select two.)

A.

when the Backup has completed successfully

B.

when Backup Mode is set on the Vault Stores

C.

when the Storage Service is started

D.

when the trigger file is found

E.

when Backup Mode is cleared on the Vault Stores

Full Access
Question # 19

Where is an item temporarily stored when Outlook Web Access users open the archived item?

A.

in a temporary folder on the user's computer

B.

in the user's mailbox, in the Restored Items folder.

C.

in the TEMP directory on the Enterprise Vault Server

D.

in the user's mailbox, in the Deleted Items folder

Full Access
Question # 20

A Veritas Enterprise Vault (EV) implementation has been running for five years. New Vault Store partitions are created as the old Vault Store partitions become full, which is approximately every six months. The retention category is set for three years and Storage Expiry runs regularly. The open Vault Store partition is now full and all available storage devices are in use.

How should this issue be addressed with minimal impact on the EV server?

A.

set the current Vault Store Partition to Ready

B.

set the first Vault Store status to Ready

C.

open the first Vault Store Partition again

D.

migrate items older than six months

Full Access
Question # 21

An administrator checks the MSMQs and finds a large number of items on the A6 queue. What does this indicate?

A.

Scheduled archiving needs to run longer.

B.

Items are awaiting successful backups to remove safety copies.

C.

Users have moved a large number of shortcuts around in their mailboxes.

D.

There are a large number of items that need to be retried for archiving.

Full Access
Question # 22

Why would users be prompted for credentials when accessing the Enterprise Vault Office Mail App?

A.

the Enterprise Vault server needs to be listed in the Local Intranet Sites

B.

HTTPS is unconfigured at the Site level in the Vault Admin Console

C.

HTTPS is unconfigured on the Enterprise Vault server with a suitable certificate

D.

OfficeMailApp.aspx on the Enterprise Vault server needs to be signed with the Vault Service Account in IIS

Full Access
Question # 23

Which pre-requisite is necessary for installing Enterprise Vault Reporting?

A.

the Active Directory account used for reporting requires an Exchange Mailbox

B.

log in as the ReportingUser account, and run the Enterprise Vault Management Shell utility once

C.

add the Active Directory reporting account to the Exchange Administrators group

D.

Microsoft SQL Server Reporting Services

Full Access
Question # 24

An administrator is experiencing an issue that a user complains that the Virtual Vault fails to appear in the Outlook Navigation Pane. The administrator has confirmed that Virtual Vault is enabled for the user in the policy setting.

Which file on the user’s PC should the administrator check next?

A.

Webapp.ini

B.

MAPISVC.INF

C.

VC_desktop.txt

D.

web.config

Full Access
Question # 25

Following the repair of a failed Enterprise Vault server, the administrator fails the services back to the primary server. The administrator notices it takes a minimum of 15 minutes for the desktop clients to re-connect.

What could explain the delay in clients connecting to the server?

A.

the Active Directory integrated DNS zone will take 15 minutes to replicate

B.

the server DNS cache refreshes after 15 minutes

C.

the desktop client DNS cache refreshes after 15 minutes

D.

the Active Directory integrated DNS zone replication can be delayed by up to 15 minutes

Full Access
Question # 26

Which action must an administrator take to view the clustered message queues for an Enterprise Vault clustered server?

A.

the "Component Services" snap-in located in the Microsoft MMC console

B.

the ClusterCompMgmt command located in the Enterprise Vault installation folder (typicallyC:\Program Files (x86)\Enterprise Vault)

C.

the "Computer Management" snap-in located in the Microsoft MMC console

D.

the ClusterPerfMon command located in the Enterprise Vault installation folder (typicallyC:\Program Files (x86)\Enterprise Vault)

Full Access
Question # 27

Enterprise Vault client access is available for Citrix-based thin client provisioning.

Which is a valid configuration for this environment?

A.

use of the Enterprise Vault client for Outlook

B.

use of Enterprise Vault Outlook Add-in for Mac

C.

any web browser supported for Enterprise Vault IMAP access

D.

any web browser supported for Enterprise Vault administrative access

Full Access