Veritas VCS-220 Exam (page: 2)
Veritas Administration of System Recovery 2013
Updated on: 12-Feb-2026

Viewing Page 2 of 15

Which two best practice tasks should be completed after installing the Symantec System Recovery (SSR) 2013 software? (Select two.)

  1. scan the computer for viruses and malware
  2. perform a LiveUpdate
  3. configure ThreatCon
  4. configure the first backup
  5. ensure Microsoft VSS service is running

Answer(s): B,D



Which two options will activate the Symantec System Recovery (SSR) 2013 evaluation period? (Select two.)

  1. beginning the SSR installation program
  2. running a drive-based or file and folder backup
  3. booting a system from the System Recovery Disk (SRD)
  4. defining a drive-based or file and folder backup
  5. completing the SSR installation program

Answer(s): B,D



What is the minimum memory that LightsOut Restore requires to run?

  1. 256 MB
  2. 512 MB
  3. 1 GB
  4. 2 GB

Answer(s): C



A virus attack has corrupted the first sector of a physical hard drivE. Fortunately, a recovery point of the system drive is available to restore with the Symantec Recovery Disk.
Which option must be selected during the restore?

  1. restore master boot record
  2. restore sector 0
  3. recover boot sector
  4. initialize disk

Answer(s): A



Which two options are required to enable booting when using the Recover Drive Wizard to restore the operating system onto a new, empty, hard disk? (Select two.)

  1. recover original sector map
  2. initialize BCD
  3. recover master boot record
  4. restore original disk signature
  5. set drive active
  6. clean and format target drive

Answer(s): D,E



An administrator is attempting a remote restore using the LightsOut Restore feature of Symantec System Recovery (SSR) 2013. After the remote system reboots into the recovery environment, the administrator is unable to connect into the remote system.
Which option did the administrator forget to select when configuring the LightsOut Restore option?

  1. start Symantec pcAnywhere
  2. start networking services
  3. connect to a thin host
  4. enable remote desktop connection

Answer(s): A



A system administrator would like to verify whether a recent virus on their network exists in an image before restoring.
What is the recommended method to make the files available for a virus scan to check for this?

  1. convert the image to a virtual machine, scan in isolated network environment
  2. mount the image in Windows and run a virus scan
  3. restore files to an isolated directory using Recovery Point Browser
  4. use the recovery disk to scan the image for virus infection

Answer(s): B



An administrator is unable to restore a Windows 2008 R2 server to a bootable state on the same hardware.
What may be the cause of this problem?

  1. the administrator neglected to back up the Boot Configuration Database volume
  2. the administrator neglected to back up the Windows system state database
  3. the administrator failed to back up the Active Directory membership configuration
  4. the administrator neglected to select the 'original hardware' option

Answer(s): A



Viewing Page 2 of 15



Share your comments for Veritas VCS-220 exam with other users:

Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous