250-253 Administration of Veritas Cluster Server 6.0 Test Set 4

What should a system administrator do to stop a detection server?


Options are :

  • Access the services panel and stop the VontuMonitorController service
  • Access the Server Detail page and select "Stop"
  • Access a command prompt and enter the command "net stop service VontuMonitor"
  • Access the Enforce Server Detail page and select "Done"

Answer : Access the Server Detail page and select "Stop"

When making offline configuration changes, which command should be run to ensure the main.cffile has the correct syntax?


Options are :

  • haconf –verify
  • haclus –verify
  • hacf –verify
  • hagrp –verify

Answer : hacf –verify

What does a data loss prevention solution help an organization identify? (Select three.)A. Employee education opportunitiesB. Risk of virus infectionC. Unprotected content on laptopsD. Illegally obtained software on desktopsE. Encryption enforcement opportunities


Options are :

  • A,C,E
  • C,B,A
  • A,B,C
  • B,C,A

Answer : A,C,E

ST0-085 Symantec Security Information Manager Technical Exam Set 3

Where are configured Veritas Cluster Server triggers found using $VCS_HOME as the mainVeritas Cluster Server directory?


Options are :

  • $VCS_HOME/triggers
  • $VCS_HOME/bin/triggers
  • $VCS_HOME/bin
  • $VCS_HOME

Answer : $VCS_HOME

How many levels deep can a service group dependency tree be?


Options are :

  • 1
  • 3
  • 5
  • 7

Answer : 5

What is a likely outcome of filtering network traffic in Network Monitor?


Options are :

  • increase in Network Monitor demand for RAM
  • decrease in the detection accuracy
  • monitoring of outbound traffic before inbound traffic
  • monitoring of traffic important to the customer

Answer : monitoring of traffic important to the customer

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 3

Two clusters are both running the same operating system and version of Veritas Cluster Server. Aservice group in one cluster depends on a service group in the other cluster.Which method can be used to manage the service group relationship?


Options are :

  • RemoteGroup agent
  • RemoteCluster agent
  • RemoteGroup trigger
  • CrossCluster trigger

Answer : RemoteGroup agent

Which Veritas Cluster Server (VCS) utility is used to verify a configuration file and can also beused by the VCS engine to load a configuration file at runtime?


Options are :

  • haconf
  • hacf
  • haclus
  • haverify

Answer : haconf

Which delimiter is unacceptable in Exact Data Matching (EDM) data sources?


Options are :

  • Comma (,)
  • Tab
  • Slash (/)
  • Pipe (|)

Answer : Slash (/)

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 10

What is an advantage of using a Dashboard report?


Options are :

  • Incident responders can see the history of each incident.
  • Incident reponders can execute Smart Responses from them.
  • They allow incidents to be viewed across multiple products.
  • They can be used as work queues for incident responders.

Answer : They allow incidents to be viewed across multiple products.

An administrator is adding a node to a running cluster. The administrator has successfully installedVeritas Cluster Server and has configured and started LLT.Which command will allow the new node to start communicating with the cluster?


Options are :

  • gabconfig -c
  • hastart -force
  • sh /etc/gabconfig
  • hastart

Answer : gabconfig -c

Which Veritas Cluster Server command is used to override static resource type attribute values fora specific resource?


Options are :

  • hatype
  • haclus
  • hares
  • hagrp

Answer : hares

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 7

Offline configuration changes made to Veritas Cluster Server (VCS) are missing when viewing it inone of the GUIs or the CLI.What is the likely cause of this issue?


Options are :

  • VCS was started on the node without the changes being made.
  • VCS was started on the node where the changes were made.
  • VCS was started on the node with the lowest priority in the SystemList.
  • VCS was started on the node with the highest priority in the SystemList.

Answer : VCS was started on the node without the changes being made.

Which Preferred Fencing policy should be configured to ensure that the node with the preferredapplication survives a fencing event?


Options are :

  • PreferredFencingPolicy = Site
  • PreferredFencingPolicy = System
  • PreferredFencingPolicy = Disabled
  • PreferredFencingPolicy = Group

Answer : PreferredFencingPolicy = Group

Which command allows the administrator to leave services currently under Veritas Cluster Servercontrol in a running state while performing configuration changes?


Options are :

  • hastop -all -force
  • haconf -all -evacuate
  • haconf -all -force
  • hastop -all -evacuate

Answer : hastop -all -force

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

An administrator needs to manually add a new resource type to a running cluster.What should the administrator do after installing the agent software on each Veritas Cluster Server(VCS) node?


Options are :

  • Use the hares command to add the new resource type to the cluster
  • Generate the appropriate hatype commands with hacf -addtype
  • Use the hatype command to add the new resource type
  • Stop and restart VCS so that the new resource type is recognized as valid

Answer : Use the hatype command to add the new resource type

What is the first step when upgrading the operating system on a single node in a running multinodeVeritas Cluster Server (VCS) cluster?


Options are :

  • Freeze the service groups
  • Shut down VCS on all nodes
  • Migrate parallel service groups
  • Offline service groups on the node

Answer : Offline service groups on the node

The Veritas Cluster Server (VCS) notifier resource and VCS triggers can be configured togenerate messages to assist in VCS administration.Which other facility can be a source of notifications within a comprehensive VCS implementation?


Options are :

  • Cluster Manager Java console
  • Veritas Enterprise Manager
  • Storage Foundation Manager
  • Veritas Operations Manager

Answer : Veritas Operations Manager

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 5

A resource of type Application is configured to be monitored by the Intelligent MonitoringFramework.Which resource attribute should be exclusively configured in order to enable the ProactivePrevention of Concurrency feature for the resource of type Application?


Options are :

  • PidFiles
  • StartProgram
  • MonitorProcesses
  • MonitorProgram

Answer : MonitorProcesses

Which detection server requires the use of two network card ports?


Options are :

  • Discover Server
  • Network Monitor Server
  • Endpoint Server
  • Network Prevent Server

Answer : Network Monitor Server

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies?(Select two.)A. Endpoint: NotifyB. Protect: Copy FileC. Network: Block HTTP/HTTPSD. Protect: Quarantine FileE. Endpoint: BlockF. Network: Remove HTTP/HTTPS Content


Options are :

  • C,D
  • B,A
  • A.E
  • A,B

Answer : A.E

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

Where does an incident responder find the exact matches that triggered an incident?


Options are :

  • Dashboard report
  • Incident Snapshot
  • Incident List
  • System Events report

Answer : Incident Snapshot

An administrator stopped Veritas Cluster Server (VCS) on the sym1 node to remove it from thecluster. When attempting to do this with the hasys -delete command from sym2, an error messageis displayed.What is the likely cause of this error?


Options are :

  • VCS must be completely shut down on all nodes.
  • The GAB daemon on sym1 is still running.
  • One or more SystemList attributes still contains sym1.
  • The vxfen daemon on sym1 is still running.

Answer : One or more SystemList attributes still contains sym1.

Which Veritas Cluster Server event trigger is always invoked on the system where the eventoccurred?


Options are :

  • sysoffline
  • violation
  • nofailover
  • postonline

Answer : postonline

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 6

An administrator needs to set up a service group dependency with the following characteristics:The parent group depends on the child group being offline on the same system.If the child group faults and fails over to a system on which the parent is running, the parent shouldswitch to another system.Which type of dependency is this?


Options are :

  • Offline parent
  • Offline remote
  • Offline home
  • Offline local

Answer : Offline local

An administrator is configuring a websg service group and a dbsg service group. The administratorneeds to configure Veritas Cluster Server so websg will only come online if dbsg is onlinesomewhere in the cluster.If dbsg faults, websg should stay online. If dbsg is unable to fail over, the websg should stayonline.Which type of service group dependency does this require?


Options are :

  • Online local firm
  • Online global soft
  • Online global firm
  • Online local soft

Answer : Online global soft

An administrator has removed a system from a running Veritas Cluster Server cluster so that thecluster now only has seven nodes. The administrator must ensure the cluster will start successfullyafter a complete cluster shutdown.Which line should be in the /etc/gabtab file to successfully start the cluster?


Options are :

  • gabconfig start seed=7
  • clust -c -n 7
  • clust start seed=7
  • gabconfig -c -n 7

Answer : clust start seed=7

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

An installed cluster has been licensed with the keyless licensing option. The administrator has yetto configure the cluster to be managed by Veritas Operations Manager (VOM).What will happen when 60 days have passed since installation?


Options are :

  • The cluster will ignore licensing.
  • The cluster will log messages related to licensing.
  • The cluster will shut down.
  • The cluster will cease to respond if a resource faults.

Answer : The cluster will log messages related to licensing.

Which two capabilities does the Veritas Cluster Manager Java console provide when used with theVeritas Cluster Server (VCS) Simulator and a simulated cluster that are unavailable when usingthe Veritas Cluster Manager Java console with a live cluster configuration? (Select two.)A. System power on and offB. Remove a systemC. Fault a resourceD. Run a virtual firedrillE. Copy a service group


Options are :

  • C.D
  • A.C
  • A.B
  • B,A

Answer : A.C

The loadwarning trigger has been configured for all cluster systems, and all service groups havebeen configured for load. The current load on a system is 135, which is the maximum possibleload on a system for this configuration, and the load has been observed for 10 minutes. Thefollowing system attributes have been set for all cluster nodes:Capacity = 150LoadWarningLevel = 80LoadTimeThreshold = 300Under which condition will the loadwarning trigger be invoked?


Options are :

  • The trigger will be invoked after 135 seconds.
  • The trigger will never be invoked.
  • The trigger will be invoked after 240 seconds.
  • The trigger will be invoked after 300 seconds.

Answer : The trigger will be invoked after 300 seconds.

ST0-135 Symantec Network Access Controls Technical Exam Set 7

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions