How to pass 251-265 exam easily with less time? CertBus provides the most valid 251-265 exam preparation material to boost your success rate in Symantec 251-265 Data Protection Administration for UNIX(NBU 6.5) exam. If you are one of the successful candidates with CertBus 251-265 PDF and VCEs, do not hesitate to share your reviews on our Symantec materials.
We CertBus has our own expert team. They selected and published the latest 251-265 preparation materials from Symantec Official Exam-Center: http://www.certbus.com/251-265.html
Which three components must be implemented when defining an authentication realm? (Choose three.)
B. Login module
C. Identity validator
ExamReal.com — 100% Real QandAs | 100% Real Pass
D. Challenge handler
E. Security certificate
F. Encryption module
G. Secure connection
Correct Answer: ABD
An administrator is using *BASIC assistance level. A new user profile is created using option 1 – Add, from the Work with User Enrollment screen. Additional special authorities need to be assigned to the profile. When creating the profile, the administrator does not see available parameters to complete this task. What must the administrator do to add the special authorities?
A. When editing the profile, press F9 to reveal additional configuration options.
B. Use the WRKUSRPRF command and select option 9-Work with Authority on the profile.
C. Finish creating the profile then, using the CHGUSRPRF command, press EIO to see additional parameters.
D. Save the user profile, then use option 2 to change the profile from the Work with User Enrollment screen.
Correct Answer: C
A customer wants to purchase an IBM System Storage DS8000. The proposed location is in a data center
on the third floor of an office building. Which document should the storage specialist consult to ensure that
the DS8000 can be installed in the proposed location?
A. IBM Announcement Letters
B. IBM DS8000 Installation Guide
C. IBM DS8000 Introduction and Planning Guide
D. IBM Systems Storage Solutions Handbook
Correct Answer: C
QUESTION NO: 50
What must be done for IBM Sterling Selling and Fulfillment Suite to allow an administrator to
specify a different set of properties for each process that is executed?
A. Have a different sandbox.cfg file for each process that is executed.
B. Have a different servers.properties and customer_overrides.properties file for each process that
C. Have the same servers.properties file but a different customer_overrides.properties file for each
process that is executed.
D. Have a different servers.properties file for each process that is executed. The
customer_overrides.properties file does not affect thisconfiguration.
A solution implementer is tasked with securing a backend web service by creating an externally
advertised web service interface that will: ?easily adapt to any backend changes. ?conform to the
backend service Web Service Description Language (WSDL) document. ?monitor and control
message traffic based on consumer and requested resources to the WSDL operation level. What
DataPower service should the solution implementer configure to satisfy these requirements?
A. Web service proxy using the WSDL with a dynamic backend.
B. Web application firewall with operations imported directly from the WSDL.
C. Multi-protocol gateway using a WSDL with a sign/verify actions.
D. Loopback XML firewall with a user agent subscribed to a WSDL.
QUESTION NO: 6
You are assigned to correct a job from another developer. The job contains 20 stages sourcing
data from two Data Sets and many sequential files. The annotation in the job indicates who wrote
the job and when, not the objective of the job. All link and stage names use the default names.
One of the output columns has an incorrect value which should have been obtained using a
lookup. What could the original developer have done to make this task easier for maintenance
A. Name all stage and links the same.
B. Name all stages and links based on what they do.
C. Indicate all stage names within the job annotation.
D. Name all stage and links with column names and ideas.
A customer recently installed new a SAN with an IBM System Storage DS8700 and several open systems
servers to address a need for storage consolidation and still provide good response time. They have asked
the Business Partner technical representative for the most complete IBM product that would allow them to
do performance reporting of the new SAN environment. What is the best solution?
A. Tivoli Storage Manager
B. Tivoli Storage Productivity Center for Disk
C. Tivoli Storage Productivity Center Basic Edition
D. Tivoli Storage Productivity Center Standard Edition
Correct Answer: D
On an IBM System Stoage DS8000 which of the following information pairs are mandatory to create a
A. extent pool id and volume id
B. extent pool id and volume name
C. volume id and extent allocation method
D. volume name and extent allocation method
Correct Answer: A
In the Configured Rules section of the Policy Editor, two request rules are listed, Rule_One,
followed by Rule_Two, and both use the same matching rule.
What occurs when a message that satisfies the matching rule is received?
A. Only Rule_One will be executed since it is the first rule that matches the request.
B. Rule_One will be executed, followed by Rule_Two, since all rules that satisfy the match are
C. This policy will fail during execution, since it cannot be determined which rule should be
D. The policy will not be applied, since the Policy Editor will not allow a configuration of rules that
have the same match.
A company has acquired a new system to handle data warehousing workload, but its IP address has not yet been added to the DNS server. The administrator added an lP address for this system into host table entry of the local system.
When attempting to connect using the host name, the connection fails. Using the IP address to connect works normally.
What will resolve this issue?
A. Add the gateway IP address to the local host table.
B. Set the name resolution to *LOCAL on the TCP/IP Domain screen.
C. Set the name resolution to *RMTONLY on the TCP/IP Domain screen.
D. Specify the fully qualified name of the remote system when attempting to communicate with it.
Correct Answer: B