250-253 Administration of Veritas Cluster Server 6.0 Test Set 1

Which two actions can be taken to determine whether an application clustered with Veritas ClusterServer (VCS) has been successfully started or stopped? (Select two.)A. Examine the online log fileB. Examine the engine log fileC. View the Security Log from the VCS Java GUID. View the Log Desk from the VCS Java GUIE. View the Application_A.log file


Options are :

  • D,A
  • A,B
  • B,A
  • B,D

Answer : B,D

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 3

Which statement describes a DLP Agent encryption feature?


Options are :

  • The key size is standard and unconfigurable.
  • DLP Agent-to-server communication uses Secure Socket Layer (SSL).
  • The system administrator can generate a unique authentication key.
  • The key is randomly generated for the agent store.

Answer : The system administrator can generate a unique authentication key.

The service group named websg is currently online on the sym3 node. All other nodes arerunning.Consider the following partial main.cf definition:Group websg (SystemList = { sym1=0, sym2=1, sym3=2 }AutoStartList = {sym2, sym3 }FailOverPolicy = Priority)The operator incorrectly shuts down a critical resource in the websg service group outside ofVeritas Cluster Server.Based on the information provided, what will happen to the websg service group?


Options are :

  • It will switch to the sym2 node.
  • It will restart on sym3 node.
  • It will remain partially online on the sym3 node.
  • It will switch to the sym1 node.

Answer : It will switch to the sym1 node.

When setting different severity levels, which level should be set as the default?


Options are :

  • The highest level available in the system
  • The highest level the policy manager wants to assign
  • The lowest level the policy manager wants to assign
  • The lowest level available in the system

Answer : The lowest level the policy manager wants to assign

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 9

Under which high-level node in the left navigation panel can administrators find the System Eventsreport?


Options are :

  • Reports
  • Policy
  • Administration
  • System Health

Answer : Administration

Which three products support virtualization and can be run on virtual machines? (Select three.)A. Endpoint DiscoverB. Network DiscoverC. Network Prevent (Web)D. Network MonitorE. Network Prevent (Email)


Options are :

  • A,B,C
  • B,C,E
  • A,C,B
  • C,A,B

Answer : B,C,E

What is a characteristic of the Veritas Cluster Server communication stack?


Options are :

  • LLT determines cluster membership by monitoring heartbeats over GAB.
  • The HAD processes propagates information to other nodes by way of agents.
  • Agents can communicate with each other directly over GAB.
  • Agents communicate resource status information with HAD.

Answer : Agents communicate resource status information with HAD.

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 5

A system administrator examines the results of a completed scan.Which information is available on a scan listing on the Discover Targets page? (Select three.)A. User who initiated the scanB. Elapsed time and total time for each scanC. Number of items scannedD. Number of items changed since the previous scanE. File structure and locationF. Errors encountered


Options are :

  • B,C,F
  • A,B,C
  • F,C,B
  • C,B,F

Answer : B,C,F

System capacity and service group load are the main components for which FailOverPolicy?


Options are :

  • Limit
  • Order
  • Capacity
  • Load

Answer : Load

An additional email address was added to the Veritas Cluster Server notifier resource without anyother actions being taken. All but one user is receiving notifications.How can this problem be solved?


Options are :

  • Restart the notifier resource
  • Restart the HAD daemon
  • Restart the SNMP daemon
  • Refresh the mailbox of the impacted user

Answer : Restart the notifier resource

251-312 Administration of Symantec Backup Exec 12 for Exam Set 8

What is the main benefit of installing and using the Symantec Management Platform for managingDLP Agents?


Options are :

  • The ability to easily manage agents remotely
  • The ability to supervise how agents are used
  • The ability to reconfigure the agent filters
  • The ability to view the health status of the agents

Answer : The ability to easily manage agents remotely

What are two reasons to implement SCSI-3 I/O fencing? (Select two.)A. Disk-based heartbeatB. Data protectionC. Lock diskD. Cluster communicationE. Membership arbitration


Options are :

  • B,E
  • C,A
  • A,B
  • B,A

Answer : B,E

Which Veritas Cluster Server utility can be used to prototype cluster logic using minimalhardware?


Options are :

  • Simulator
  • AgentTester
  • Fencing
  • AgentServer

Answer : Fencing

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

Which characteristic of Veritas Cluster Server attributes allows the public interface to be differentfor each of the systems in the cluster?


Options are :

  • Local
  • Proxy
  • Custom
  • Global

Answer : Local

An application is experiencing failures. The application administrator wants Veritas Cluster Serverto take all resources offline after failure. The application should remain offline.Which attribute can accomplish this?


Options are :

  • Critical
  • FailOverPolicy
  • ManageFaults
  • AutoFailover

Answer : AutoFailover

Consider the following configuration:group websg (SystemList = { sym1 = 1, sym2 = 2 }AutoStartList = { sym1 }Frozen = 1)While websg is online, all of the systems in the cluster are rebooted simultaneously. All of thesystems finish booting and successfully join the cluster.What will happen to the websg service group?


Options are :

  • It will start on sym1 in a frozen state.
  • It will unfreeze on reboot and start on sym1.
  • It will resume its state before the reboot.
  • It will remain offline on all systems.

Answer : It will remain offline on all systems.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

Refer to the following service group example:roup websg (SystemList = { sym1 = 0, sym2 = 1 }AutoStart = 0AutoStartList = { sym2 })DiskGroup webdg (DiskGroup = webdg)IP webip (Device = eth0Address = "169.254.128.12"NetMask = "255.255.255.0")Mount webmnt (MountPoint = "/web1"BlockDevice = "/dev/vx/dsk/webdg/webvol"FSType = vxfsMountOpt = rwFsckOpt = "-y")NIC webnic (Device = eth0)Application webproc (Symantec 250-253 ExamMonitorProgram = "/usr/local/bin/web -monitor"StartProgram = "/usr/local/bin/web -start"StopProgram = "/usr/local/bin/web -stop")webip requires webprocwebproc requires webmntwebip requires webnicwebmnt requires webdgWhich resource will start online last?


Options are :

  • webproc
  • webmnt
  • webdg
  • webip

Answer : webdg

How is Intelligent Monitoring Framework configured?


Options are :

  • It needs to be manually configured on each agent.
  • It is automatically configured on all agents.
  • It is automatically configured but only on supported agents.
  • It needs to be manually configured on each cluster node.

Answer : It is automatically configured but only on supported agents.

How can a system administrator obtain the log files for a detection server? (Select three.)A. Run the Log Collection Utility (LCU)B. Navigate to the logs directoryC. Click Fetch Latest on the Server Detail pageD. Select Logs under Administration nodeE. Download logs from the System Overview page


Options are :

  • C,A,B
  • A,C,B
  • B,A,C
  • A,B,C

Answer : A,B,C

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

Which Network Discover option is used to determine whether confidential data exists withouthaving to scan the entire target?


Options are :

  • File Throttling
  • Byte Throttling
  • Inventory Mode Scanning
  • Exclude Filtering

Answer : Inventory Mode Scanning

What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?


Options are :

  • If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any Endpoint Server is running, the agent automatically connects to it after a period of time.
  • If any detection server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any detection server in the system is running, the agent automatically connects to it after a period of time.

Answer : If any detection server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

A two node cluster is being brought online, but one node is unable to boot.Which command is run to manually seed GAB?


Options are :

  • gabconfig -x
  • lltconfig -n2
  • lltconfig -x
  • gabconfig -n2

Answer : gabconfig -x

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 3

Which three options can incident responders select when deleting incidents? (Select three.)A. Delete the incident completelyB. Delete the original message and retain the incidentC. Delete the incident and retain the violating attachments or filesD. Delete the incident and export incident details to .csv fileE. Delete the non-violating attachments or files and retain the incident


Options are :

  • A,B,C
  • E,B,A
  • A,B,E
  • B,E,A

Answer : A,B,E

 What should be done before removing a resource named webdg from a running service group?


Options are :

  • The service group must be disabled.
  • All parent resources of webdg must be taken offline.
  • The service group must be taken offline.
  • All child resources of webdg must be taken offline.

Answer : All parent resources of webdg must be taken offline.

What is the primary benefit of implementing the Intelligent Monitoring Framework feature forresources?


Options are :

  • Prevention of concurrency violations
  • Monitoring of resources running on remote clusters
  • Immediate notification of resource state change
  • Monitoring of resources without need of configuration

Answer : Monitoring of resources without need of configuration

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 4

When configured as default, the Veritas Cluster Server Notifier receives queued messages on aschedule every how many minutes?


Options are :

  • One
  • Three
  • Ten
  • Five

Answer : Ten

Which resource type creates a dependency between applications that are configured in differentVeritas Cluster Server clusters?


Options are :

  • Phantom
  • Application
  • Proxy
  • RemoteGroup

Answer : RemoteGroup

Which service group attribute enables specifying preferred nodes for failover?


Options are :

  • SystemZones
  • ClusterList
  • AutostartList
  • IntentionalOnlineList

Answer : SystemZones

250-400 Administration Altiris Client Management Suite Exam Set 1

On which system can you set UseMpathd=1 in a MultiNICB resource?


Options are :

  • AIX
  • Solaris
  • HP-UX
  • Linux

Answer : HP-UX

Where can an incident responder view all actions that have occurred for an incident?


Options are :

  • System Events
  • Incident Actions
  • Auditlog Table
  • Incident Snapshot

Answer : Incident Snapshot

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions