In addition to the full backup schedule type, which other schedule can be configured as a synthetic backup?
Answer : B
An employee recieved the following email notification:
*******************************************************************************************************
*****************
Dear Bob,
Your email to [email protected] with subject Account Info you requested violates the company's Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy.
Please note that this violation has also been reported to your manager. Confidential data protection is every employee's responsibility.
Thank you,
Corporate Information Security Team
*******************************************************************************************************
*****************
Which recommended item is missing from this email notification?
Answer : A
A UNIX client has the mount points listed below.
/var
/usr
/opt
/home
A backup policy for this client has "Allow multiple data streams" enabled and contains a backup selections list with the ALL_LOCAL_DRIVES directive. It also contains an exclude list that excludes /home.
What happens when this backup policy runs?
Answer : D
What is an accurate description of a Symantec NetBackup 7.5 domain?
Answer : B