Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two tasks must be performed after configuring the Outlook Web Access (OWA) Data Access account? (Select two.)

A.

Run the Provisioning task

B.

Run the Exchange Mailbox Archiving task

C.

Restart the Admin Service

D.

Restart the Directory Service

E.

Synchronize all mailboxes

Full Access
Question # 5

Veritas Enterprise Vault 12.3 for Exchange converts mail message attachments in order to ensure future proofing.

Which file format is used?

A.

.dvs

B.

.xml

C.

.html

D.

.tif

Full Access
Question # 6

The Enterprise Vault server is running out of disk space in a particular index location and the administrator wants to move some indexes to a new location.

How should the administrator move the indexes?

A.

manually move the Index files to the new location > run the "Synchronize" task

B.

use the "Index Volumes Browser" and choose the index volume > click the "Move" button

C.

run the "Change Location" task > manually copy the Index files to the new location

D.

manually move the Index files to the new location > change the path in the IndexServiceEntry table in the EV directory database

Full Access
Question # 7

An administrator is running a pilot installation of Veritas Enterprise Vault 12.3 and wants to copy everything that has been archived back to the original mailboxes before enabling archiving for everyone.

What is the best tool for this task according to Veritas documentation?

A.

Move Archive Utility

B.

EVSVR

C.

Export Archive Wizard

D.

Policy Manager (EVPM)

Full Access
Question # 8

The Business Retention Category has a retention period of one year. This Retention Category and the Default Exchange Mailbox policy are applied to the All Users Provisioning Group.

What will happen after the scheduled archiving task runs?

A.

previously archived items and newly archived items will be assigned a retention period of one year

B.

newly archived items will be assigned to the Business Retention Category

C.

previously archived items will be reassigned to the Business Retention Category

D.

newly archived items and previously archived items will be assigned to the Business Retention Category

Full Access
Question # 9

Which Veritas Enterprise Vault 12.3 classification property should an administrator use to ensure items from a specific email domain are tagged for review in Compliance Accelerator?

A.

evaction.discard

B.

evtag.inclusion

C.

evtag.category

D.

evtag.exclusion

Full Access
Question # 10

Which task requires the permissions of the Vault Service Account as a minimum in Veritas Enterprise Vault 12.3 ?

A.

managing and assigning custom roles

B.

defining an Exchange Mailbox Archiving Policy

C.

verifying connectivity to the SQL server

D.

restarting the Enterprise Vault 12.3 for Exchange services

Full Access
Question # 11

Which process is responsible for shortcut processing after an Archive Move to a different Veritas Enterprise Vault 12.3 site?

A.

Indexing Service on the source Enterprise Vault server

B.

Indexing Service on the destination Enterprise Vault server

C.

Archiving Task on the destination Enterprise Vault server

D.

Archiving Task on the source Enterprise Vault server

Full Access
Question # 12

Which Enterprise Vault client interface displays and provides access to more than one user's archive, if permissions are properly set on the archive?

A.

Local Cache

B.

Content Cache

C.

Virtual Vault

D.

Shared Vault

Full Access
Question # 13

Which two functionalities are enabled by installing the FSA Agent on a Windows file server? (Select two.)

A.

Internet Shortcuts

B.

File Blocking

C.

Mac interoperability

D.

FSA Placeholders

E.

Retention Folders

Full Access
Question # 14

An administrator notices the number of messages being archived per hour by the Exchange Journal Task is significantly lower than normal when compared to the baseline archiving rate. Which two explanations could be the cause of the performance reduction? (Select two.)

A.

SQL database fragmentation has occurred

B.

the journal task's archiving schedule window is too small

C.

one of the two journal tasks targeting the journal mailbox is failing to run

D.

the version of MAPISVC.inf is incompatible

E.

there is an intermittent connectivity problem between the Enterprise Vault and Exchange servers

Full Access
Question # 15

Refer to the exhibit.

When is this policy setting required?

A.

when Enterprise Vault shortcuts are required in OWA 2007 or 2010

B.

when EV Search is required in OWA 2007 or 2010

C.

when the Restore function is required in OWA 2007 or 2010

D.

when the Archive function is required in OWA 2007 or 2010

Full Access
Question # 16

Which Enterprise Vault component is impacted when an administrator enables the Metadata Store in Veritas Enterprise Vault 12.3 ?

A.

Enterprise Vault Index

B.

Vault Store Partition size

C.

MS SQL server and the space that the databases require

D.

Vault Store size

Full Access
Question # 17

Of which security group must the Vault Service Account be a member?

A.

the Application Administrators Group of the Enterprise Vault server

B.

the Exchange Administrators Group on each Exchange server

C.

the Local Administrators Group of the Enterprise Vault server

D.

the Built-in Exchange Organization Administrators Group

Full Access
Question # 18

What are two benefits of using client-driven PST migration? (Select two.)

A.

it is the fastest PST migration method

B.

corrupted PSTs are fixed automatically during migration

C.

it copies items it is loading in chunks into the local Vault Cache, avoiding extra downloads

D.

PST files bigger than 20GB are migrated in bigger chunks, avoiding the file table corruption in a PST file during migration

E.

it allows PST migration to continue while Outlook is open

Full Access
Question # 19

Which status does the Indexing Summary tool display when there are orphaned index entries found in the index volume?

A.

Missing items

B.

Failed items

C.

Deleted items

D.

Extra items

Full Access
Question # 20

A Veritas Enterprise Vault 12.3 environment contains two Enterprise Vault servers named EV1 and EV2. VaultStore1 is associated with EV1 and VaultStore2 is associated with EV2. An Enterprise Vault Indexing Service is installed on EV1, but Enterprise Vault Indexing Service is NOT installed on EV2. The administrator notices that items in VaultStore1 are being indexed, but items in VaultStore2 are NOT.

Which two complete solutions ensure both VaultStore1 and VaultStore2 are indexed? (Select two.)

A.

install the Enterprise Vault Indexing Service on EV2

B.

create an Index Administration Task on EV2

C.

Change the Site’s Indexing Level from Brief to Full

D.

change the location of the index volumes from EV1 to EV2

E.

create an Index Server Group and assign VaultStore2

Full Access
Question # 21

An administrator uses the same DTrace processes repeatedly within the Command Line tool.

How can the administrator save the parameters to run without using the Command Line tool?

A.

create a .TXT file with the DTrace parameters and save the file to the local Scripts for DTrace directory

B.

create a.TXT file to be run from the EVPM Utility

C.

create an .INI file with the DTrace parameters and save the file to the local EVserver Scripts for DTrace directory

D.

create an .INI file to run from the EVPM Utility

Full Access
Question # 22

Which administrative role allows viewing of Veritas Enterprise Vault 12.3 reports?

A.

Search Administrator

B.

Storage Administrator

C.

Power Administrator

D.

Report Administrator

Full Access
Question # 23

A user’s Search Policy is configured as shown:

Which two actions will the Search Policy allow the user to perform if the user has Full Control permissions to all relevant archives in Enterprise Vault Search? (Select two.)

A.

move an item from one File System Archive to another File System Archive

B.

move an item from an SMTP Archive to an Exchange Journal Archive

C.

copy an item from an Exchange Journal Archive to an Exchange Mailbox Archive

D.

copy an item from a File System Archive to the original file server

E.

move an item from one Exchange Mailbox Archive to another Exchange Mailbox Archive

Full Access
Question # 24

Which two configurations are valid options for Microsoft Clustering in an Enterprise Vault environment? (Select two.)

A.

Active/Active

B.

Active/Passive

C.

N+1 (Hot Standby)

D.

Failover with replica

E.

Failover with fault tolerance

Full Access
Question # 25

Which two methods can be used to populate the Vault Administration Console’s Personal Store Management Files container? (Select two.)

A.

the SQL Add-PSTFile Procedure script

B.

the Add-EVPstFile PowerShell command

C.

in the Vault Administration Console, right-click Personal Store Management > Files and select “Add”

D.

the Add-EVPstComputer PowerShell command

E.

in the Vault Administration Console, right-click Personal Store Management > Computers and select “Import”

Full Access
Question # 26

Several OWA 2010 users report an inability to access Veritas Enterprise Vault 12.3 archives from the OWA clients.

Which actions should the administrator perform first to ensure accessibility of the archives for all users?

A.

verify the Client Access Server (CAS) is included in ExchangeServers.txt and rerun owauser.wsf on the Enterprise Vault server

B.

verify the Client Access Server (CAS) is included in owausers.wsf and rerun the file on the Enterprise Vault server

C.

verify the Enterprise Vault server is included in EVServers.txt and rerun owauser.wsf on the Client Access Server (CAS)

D.

verify the users are included in owausers.wsf and rerun the file on the Client Access Server (CAS)

Full Access
Question # 27

What is the main benefit of the Indexing exclusions feature?

A.

it allows the administrator to exclude specific email domain items from being indexed

B.

it allows the administrator to remove excluded content from previously archived items

C.

it reduces the number of false positives in eDiscovery searches by excluding email footers

D.

it reduces the number of false positives in eDiscovery searches by excluding listed archives

Full Access