Latest CertBus STO-052 Exam STO-052 Dumps 100% Free Download

Do not worry about that if you are stuck in the STO-052 exam difficulties, CertBus will assist you all your way through the STO-052 Symantec Backup Exec 12 for Windows(STS) exam with the most update STO-052 PDF and VCE dumps. CertBus exam STO-052 preparation materials are the most comprehensive material, covering every key knowledge of STO-052 Symantec Backup Exec 12 for Windows(STS) exam.

We CertBus has our own expert team. They selected and published the latest STO-052 preparation materials from Symantec Official Exam-Center: http://www.certgod.com/STO-052.html

QUESTION NO:167

Which Worklight pre-defined authenticators can be used to secure an application that requires the user to

login with a user ID and password?

A. Form-based authenticator or Header-based authenticator

B. Form-based authenticator or Adapter-based authenticator

C. Adapter-based authenticator or Header-based authenticator

D. Form-based authenticator, Adapter-based authenticator or Header-based authenticator

Correct Answer: B

QUESTION NO: 98

A system administrator installed the WebSphere v6 plug-in on a machine that has a Web server

and multiple application server profiles. A deployment manager was not used at this time. In this

situation, Web server can be managed from the administrative console by connecting to which

profile (s)?

A. Any of the profiles on that machine

B. The profile that was created first

C. The profile that was created last

D. The default profile

Answer: D

QUESTION NO: 120

How can the location of the IBM Tivoli Storage Manager DB2 logs be found by an offline

command?

A. Issue the DSMSERV DISPLAY LOG command to display the size of the active log.

B. Issue the QUERY DBSPACE command to view the space for the file systems or drives.

C. Issue the DSMSERV DISPLAY DBSPACE command to display the size of the database and

logs.

D. Issue the QUERY LOG command to display the total space, used space, and free space for the

active log and the locations of all the logs.

Answer: A

QUESTION NO: 41

An administrator is trying to perform Live Partition Mobility (LPM) between physical systems managed by

the same HMC. The VIO Servers (VIOS) on each physical system are connected to the same SAN. The

client LPARs will use virtual SCSI (vSCSI) disks. The SCSI adapter slot numbers are between 11 and

20.Each client LPAR has a unique name. The network used by the client LPARs use Logical Host Ethernet

adapters (LHEA).The PowerVM Enterprise edition is being used. No EtherChannel has been configured.

Why are LPM activities failing?

A. This LHEA configuration is not supported for LPM.

B. The SCSI adapter slot numbers are too high.

C. Multiple MSP (mover service partitions) were configured.

D. The ssh keys have not been exchanged between the two VIO servers.

Correct Answer: A

QUESTION NO:111

An administrator has a save file with user created program objects that were created on another system. One of the programs cannot be restored.

What is the most likely cause of the problem?

A. The restore command used specified Force Object Conversion parameter as *NO.

B. The program was being restored to a library that is missing a referenced file.

C. The program was compiled using TGTRLS(*CURRENT) on a system at a later release.

D. The program was compiled using TGTRLS specifying a release prior to the release installed on the system.

Correct Answer: C

QUESTION NO:33

A customer has a mission-critical application with redundant fabrics. The customer plans to replace older

EMC Symmetrix 8830 systems with an IBM System Storage DS8700 and an IBM SAN Volume Controller

(SVC). Which statement best describes the way to minimize the impact of data migration on the production

environment?

A. the production environment does not require an outage

B. the production environment requires an outage to install the SVC

C. the production environment requires an outage to install the DS8700

D. the production environment requires an outage to remove the EMC systems

Correct Answer: B

QUESTION NO:39

The solution implementer needs to configure the DataPower appliance to restrict user account access to

specific domains. The solution implementer implements this requirement by configuring the Domain

Restriction section of the user account. During application execution, the configured user account is able to

access a domain that is configured as restricted (no access allowed by this user). What should the solution

implementer identify as a valid source of the problem?

A. An existing access policy or RBM policy can supersede the Domain Restriction list.

B. User access cannot be restricted to a specific domain in the user account configuration.

C. The user is a member of the \’root\’ user group.

D. The RBM system was not used to restrict access, which is the only way to meet the Domain Restriction

requirement.

Correct Answer: A

QUESTION NO: 46

Which statement is true about a reference to the last element in an HTML table?

A. It will automatically overwrite any reference to previous elements in the same table.

B. It can be created by selecting “Last occurrence” in the reference properties.

C. It can be created by matching the last instance of the element tag with a regular expression.

D. It can only be captured by writing custom code to count the table elements.

Answer: B

QUESTION NO:64

Two heterogeneous business partner applications interface with each other using XML data. The

binding contract for the structure of the data between the two applications is MOST likely to be:

A. WSDL.

B. UDDI.

C. XML Schema.

D. XML Information Set.

Answer: C

QUESTION NO: 16

Which option in IBM Rational Performance Tester helps in emulating workloads?

A. datapooling

B. creating a schedule

C. resource monitoring

D. profiling and logging

Answer: B