Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two user configuration choices are available within the Preferences menu of Enterprise Vault Search? (Select two.)

A.

Configure multiple mailboxes to access for searching

B.

Select the position of the reading pane or turn it off

C.

Enable Hit Highlighting and specify the color

D.

Choose custom company logo to display in the results page

E.

Add additional sidebars for other archiving targets such as File System Archiving

Which action must an administrator take to view the clustered message queues for an Enterprise Vault clustered server?

A.

the "Component Services" snap-in located in the Microsoft MMC console

B.

the ClusterCompMgmt command located in the Enterprise Vault installation folder (typicallyC:\Program Files (x86)\Enterprise Vault)

C.

the "Computer Management" snap-in located in the Microsoft MMC console

D.

the ClusterPerfMon command located in the Enterprise Vault installation folder (typicallyC:\Program Files (x86)\Enterprise Vault)

An administrator wants to implement Virtual Vault for several hundred users of the Enterprise Vault Outlook Add-in. The users run Outlook on stationary desktop workstations with a wired, persistent connection to the network. The workstations have very little local storage available, and the administrator wants to enable Virtual Vault while minimizing the storage impact on the workstations.

Which Desktop Policy configuration should the administrator use?

A.

Vault Cache enabled with content strategy “Do not store any items in cache”

B.

Vault Cache enabled with content strategy “Store only items that user opens”

C.

Vault Cache disabled

D.

Vault Cache enabled with content strategy “Store all items”

A Veritas Enterprise Vault 12.x administrator activated Auditing at the Directory level. During this process, the administrator created the audit database and can log onto the SQL server without errors. When checking the content of the audit database, the administrator notices that nothing is being audited.

How should the administrator resolve this issue?

A.

after enabling on the Enterprise Vault Directory, restart the Enterprise Vault Admin Service level

B.

enable Auditing in the Exchange Server properties in the VAC and select the auditing options

C.

enable Auditing in the Enterprise Vault Server properties in the VAC and select the auditing options

D.

enable Auditing in the Enterprise Vault Site properties in the VAC and select the auditing options

Where is the Enterprise Vault system mailbox created?

A.

on active members of a Database Availability Group only

B.

on the Global Catalog server in the domain

C.

on each target Exchange server in the domain

D.

on the first Exchange server in the domain

What are two capabilities of enabling Veritas Enterprise Vault 12.x for Exchange for Outlook Web Access/App (OWA) users? (Select two.)

A.

enables remote access via OWA with Safari browser

B.

provides remote access to multiple user archives

C.

enables IMAP access for mobile devices

D.

enables Virtual Vault for OWA users

E.

enables Vault Cache for OWA users

Enterprise Vault client access is available for Citrix-based thin client provisioning.

Which is a valid configuration for this environment?

A.

use of the Enterprise Vault client for Outlook

B.

use of Enterprise Vault Outlook Add-in for Mac

C.

any web browser supported for Enterprise Vault IMAP access

D.

any web browser supported for Enterprise Vault administrative access

The 'Business' retention category has a retention period of one year. This retention category and the 'Default Exchange Mailbox policy' are applied to the All Users Provisioning Group.

What happens after the scheduled archiving task runs?

A.

"One year" will be assigned as the retention period for the archived items

B.

"Business" will be assigned as the retention category for the archived items

C.

"All Users" will be assigned as the Provisioning Group for the archived items

D.

"Default user" will be assigned as the Mailbox policy for the archived items

An administrator is conducting a server-driven PST migration. The administrator chooses to delete the PST files as part of the post migration process and runs the PST migration for several pilot users. When starting Outlook, the pilot users get the warning PST file is missing.

Which setting will prevent the warning?

A.

create a Policy Manager initialization file with "DeletePST=True"

B.

configure Remove PST entries within the Desktop policy > Advanced tab

C.

log in remotely and restart the Outlook client

D.

use a group policy to automatically remove the migrated PST files

What are two benefits of Veritas Enterprise Vault 12.x for Exchange? (Select two.)

A.

it archives directly to tape

B.

it facilitates faster backup of the messaging servers

C.

it is unnecessary to backup Exchange when Journaling is enabled

D.

it automatically duplicates archive data

E.

it provides OSIS for archived email