ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

Which command is used to show the current I/O parameters of a Veritas file system?


Options are :

  • vxtunefs (Correct)
  • vxprintfs
  • vxprint
  • vxfstune

Answer : vxtunefs

What are the advantages of layered volumes? (Choose two.)


Options are :

  • Better write performance
  • Use of more VM objects
  • Faster recovery time (Correct)
  • Higher resiliency (Correct)
  • Less disk space usage

Answer : Faster recovery time Higher resiliency

Which command can be used to initialize a disk?


Options are :

  • vxdiskstart
  • vxedit (Correct)
  • vxdiskadm
  • vxinit

Answer : vxedit

Which command is used to change the dmp_cache_open tunable?


Options are :

  • vxtunedmp_cache_open on
  • vxdmpadm tune dmp_cache_open=on
  • vxdmpadmsettunedmp_cache_open=on (Correct)
  • vxtunedmp_cache_open=on

Answer : vxdmpadmsettunedmp_cache_open=on

What is an advantage of the Veritas Storage Foundation 6.1 for UNIX checkpoint visibility feature?


Options are :

  • ensures checkpoint is automatically deleted under certain conditions
  • automatically creates new checkpoints as changes are made to the file system
  • specifies verbose mode, which displays extensive statistical information
  • eliminates the need for manually mounting storage checkpoints (Correct)

Answer : eliminates the need for manually mounting storage checkpoints

Which region stores the information that manages virtual devices when a LUN is brought under Veritas Storage Foundation 6.1 for UNIX control?


Options are :

  • public region
  • virtual region
  • VTOC region
  • private region (Correct)

Answer : private region

When creating a policy to check outbound messages for inappropriate dissemination of credit card numbers, which policy resource should be leveraged in the policy?


Options are :

  • Annotations
  • Patterns (Correct)
  • Dictionaries
  • Smart identifiers

Answer : Patterns

Which three are options for invalid recipient handling? (Select three.)


Options are :

  • Drop invalid recipients (Correct)
  • Quarantine invalid recipients
  • Accept all recipients (Correct)
  • Reject invalid recipients (Correct)

Answer : Drop invalid recipients Accept all recipients Reject invalid recipients

A user creates a 10 MB file, which is then compressed using vxcompress to reduce the file size to 1MB. Another user copies this file to a different Veritas File System (VxFS) on the same host using cp. What is the resulting file size of the copy?


Options are :

  • 9MB
  • 1MB
  • 10MB (Correct)
  • 11MB

Answer : 10MB

Which command will print information for Dynamic Multi-pathing nodes on a system?


Options are :

  • vxdmpadmconfig show
  • vxdmpadm list dmpnode all (Correct)
  • vxdmpadm stat dmpnode
  • vxdmpadmiostat show

Answer : vxdmpadm list dmpnode all

What is the default inbound action for a suspected virus?


Options are :

  • Delete the message in virus quarantine
  • Bounce the message back to the sender
  • Strip the message's attachment
  • Strip and hold the message in virus quarantine (Correct)

Answer : Strip and hold the message in virus quarantine

Which command resizes the file system without changing the volume size?


Options are :

  • fsadm (Correct)
  • vxfsadm
  • tunefs
  • vxresize

Answer : fsadm

Which three are true regarding the 'Premium' and 'Basic' dictionaries that ship with the product? (Select three.)


Options are :

  • Basic dictionary includes a list of racially insensitive terms. (Correct)
  • Administrators can delete predefined terms in a Premium dictionary.
  • The dictionaries are case insensitive. (Correct)
  • Both dictionaries ship with pre-populated terms (Correct)

Answer : Basic dictionary includes a list of racially insensitive terms. The dictionaries are case insensitive. Both dictionaries ship with pre-populated terms

Portions of the same disk group were imported onto several systems at the same time resulting in conflicting configuration copies. Which command should be used to resolve the conflict?


Options are :

  • vxconfigrestore
  • vxreattach
  • vxrecover
  • vxsplitlines (Correct)

Answer : vxsplitlines

What is a key consideration when deploying a scanner with IM filtering in production?


Options are :

  • ensuring that the Symantec appliance points to an internal DNS server to route traffic to the public network
  • installing Symantec IM Setup wizard on each client desktop in the organization
  • adjusting internal DNS records to route internal IM traffic to the SMS Scanner that is configured for IM filtering (Correct)
  • allocating 4 externally routable IP addresses for each IM Scanner

Answer : adjusting internal DNS records to route internal IM traffic to the SMS Scanner that is configured for IM filtering

Which product level is licensed with the deduplication functionality?


Options are :

  • Veritas Storage Foundation Basic Edition
  • Veritas Storage Foundation Standard Edition
  • Veritas Dynamic Multi-Pathing Native Support
  • Veritas Storage Foundation Enterprise Edition (Correct)

Answer : Veritas Storage Foundation Enterprise Edition

Which command upgrades the datadg disk group from version 50 to the current disk group version?


Options are :

  • vxdg 50 currvers datadg
  • vxdg upgrade datadg (Correct)
  • vxdg currvers datadg
  • vxdg -T 50 upgrade datadg

Answer : vxdg upgrade datadg

Which two volume layouts does Veritas Volume Manager (VxVM) support? (Select two.)


Options are :

  • RAID-3
  • RAID-5 (Correct)
  • RAID-6
  • RAID-1 (Correct)
  • RAID-2
  • RAID-4

Answer : RAID-5 RAID-1

A Storage Checkpoint is created with the command: fsckptadm -R create thu_8pm /data1 Which statement about this checkpoint is correct if the file system runs out of space?


Options are :

  • It is removed even if it is mounted.
  • It is removed only if the checkpoint is unused.
  • This and all subsequent checkpoints are recursively removed.
  • It can only be removed manually because it is a non-removable checkpoint. (Correct)

Answer : It can only be removed manually because it is a non-removable checkpoint.

Which statement is true about adding a mirror to an existing striped volume?


Options are :

  • You can use any disks in the disk group to contain the new plex
  • A concatenated plex is added to the volume by default
  • Synchronization of the new plex is required. (Correct)
  • You should add the new plex to a different disk group for redundancy.

Answer : Synchronization of the new plex is required.

How are shrunk spaces reclaimed on shrinking Veritas Volume Manager (VxVM) volumes based on thin reclaimable LUNs?


Options are :

  • manually, by the administrator using the fsadm command
  • through aggressive reclamation
  • through automatic reclamation asynchronously (Correct)
  • by using Veritas Operations Manager (VOM)

Answer : through automatic reclamation asynchronously

Which commands display plex, volume, and kernel states? (Choose two.)


Options are :

  • vxdisplay
  • vxprint (Correct)
  • vxstate
  • vxinfo (Correct)
  • vxcat

Answer : vxprint vxinfo

What is the default Dynamic Multi-Pathing (DMP) path restoration policy?


Options are :

  • check_disabled (Correct)
  • check_all
  • check_periodic
  • check_alternate

Answer : check_disabled

Which command removes the datadg02 disk from the datadg disk group?


Options are :

  • vxdg datadg rmdisk datadg02 (Correct)
  • vxassist datadg rmdisk datadg02
  • vxdg datadg remove datadg02
  • vxassist datadg remove disk datadg02

Answer : vxdg datadg rmdisk datadg02

Which languages are supported by system locales?


Options are :

  • English, French, Traditional Chinese, and Italian
  • English, German, and Simplified Chinese
  • English, French, Japanese, Korean, Traditional Chinese, and Simplified Chinese (Correct)
  • English, German, and Korean

Answer : English, French, Japanese, Korean, Traditional Chinese, and Simplified Chinese

Which two statements are true about renaming a disk object? (Choose two.)


Options are :

  • Subdisks names will remain the same (Correct)
  • The new disk name must be unique within the system.
  • New disk names must be unique within the disk group. (Correct)
  • All subdisks will be renamed together with the disk.
  • The disk group needs to be offline.

Answer : Subdisks names will remain the same New disk names must be unique within the disk group.

Which three are used in the sender and body sections of a notification? (Select three.)


Options are :

  • Policy violated
  • Recipient (Correct)
  • Subject (Correct)
  • Attachment names (Correct)

Answer : Recipient Subject Attachment names

Which command grows the datavol volume by an additional 30 MB and resizes the file system at the same time?


Options are :

  • vxassist -g datadg growby datavol 30m
  • vxresize -g datadg datavol 30m
  • vxassist -g datadg growto datavol 30m
  • vxresize -g datadg datavol +30m (Correct)

Answer : vxresize -g datadg datavol +30m

What will be the effect of reducing the compression block size by 50% when using vxcompress to compress files?


Options are :

  • Half the amount of compressed data per compressed extent
  • Double the amount of logical data per compressed extent
  • Double the amount of compressed data per compressed extent
  • Half the amount of logical data per compressed extent (Correct)

Answer : Half the amount of logical data per compressed extent

The disks in a disk group containing multiple volumes with mounted file systems become temporarily unavailable and are flagged as DGDISABLED. The disks become available again and automatic Dynamic Multi-Pathing (DMP) recovery has occurred. What is the first step in the recovery process?


Options are :

  • Deport the disk group.
  • Reattach the disks.
  • Unmount the file systems. (Correct)
  • fsck the file systems.

Answer : Unmount the file systems.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions