250-253 Administration of Veritas Cluster Server 6.0 Test Set 5

What must a policy manager do when working with Exact Data Matching (EDM) indexes?


Options are :

  • Re-index large data sources on a daily or weekly basis
  • Deploy the index only to specific detection servers
  • Index the original data source on the detection server
  • Create a new data profile if data source schema changes

Answer : Create a new data profile if data source schema changes

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 5

What is the impact to unsaved configuration changes in Veritas Cluster Server when anadministrator stops the cluster with a force option from the command-line interface?


Options are :

  • Changes are prompted to be discarded.
  • Changes are prompted to be saved.
  • Changes are automatically discarded.
  • Changes are automatically saved.

Answer : Changes are automatically discarded.

An administrator needs to set up a service group dependency with the following characteristics:The parent group depends on the child group being online on the same system.If the child group faults, the parent group should be taken offline.If the parent group faults, then the child group should go offline.Which type of dependency is this?


Options are :

  • Online global soft
  • Online local firm
  • Online local hard
  • Online global firm

Answer : Online local hard

In a two node Veritas cluster, all Ethernet heartbeats failed simultaneously. I/O fencing and linklowpriheartbeat are yet to be configured.What is the resulting condition of this problem?


Options are :

  • Split-cluster
  • Split-brain
  • Jeopardy
  • Panic

Answer : Split-brain

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 4

Two applications can be online on any system of a cluster.


Which dependency attribute supports this relationship?


Options are :

  • Remote
  • Global
  • Local
  • Flex

Answer : Global

Which two actions must be taken to upgrade an application under Veritas Cluster Server control?(Select two.)A. Verify that the application agent supports the new versionB. Verify that the new version is supported with haagent -verifyC. Freeze the application service groupD. Freeze the application resourcesE. Stop the application agent on all systems


Options are :

  • A,C
  • B,D
  • A,B
  • B,A

Answer : A,C

On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocolrecognition?


Options are :

  • Secure tunneling protocols
  • System-defined UDP and TCP protocols
  • Pre-defined UDP protocols
  • User-configured TCP protocols

Answer : User-configured TCP protocols

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 3

What is a function of the Enforce Server?


Options are :

  • writes incidents to all detection servers
  • deploys agents to endpoint computers
  • provides a GUI for policy creation
  • detects incidents

Answer : provides a GUI for policy creation

Which three does the Environment Check Utility (ECU) provide? (Select three.)A. Software build numbersB. System events recordsC. Days remaining on the current licenseD. Operating system version of serversE. Installation configuration settings


Options are :

  • E,D,A
  • A,B,C
  • C,B,A
  • A,D,E

Answer : A,D,E

An administrator has a three-node cluster.The cluster manages an application that depends on a database.The application and database can be online on the same or a different node.If the database faults, the application must continue to be online.Which type of service group dependency should be created to ensure this behavior?


Options are :

  • Online global soft, where the database is the parent
  • Online global firm, where the application is the parent
  • Online global soft, where the application is the parent
  • Online global firm, where the database is the parent

Answer : Online global soft, where the application is the parent

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 11

Which method encrypts the Oracle password on the Enforce Server?


Options are :

  • Data Encryption Standard (DES)
  • Secure Socket Layer (SSL)
  • Rivest, Shamir, Adleman (RSA)
  • Advanced Encryption Standard (AES)

Answer : Advanced Encryption Standard (AES)

Two resources of type Process named web1proc and web2proc are configured in the failover

websg service group and are online on the sym1 cluster node. The web2proc resource is linked as

dependent on the web1proc resource, and the Critical resource attribute of the web2proc is

modified from the default value. Resource restart is set to the default value.

What are the states of the web1proc and web2proc resources on the sym1 cluster node after

shutting down the process managed by the web2proc from outside of Veritas Cluster Server?


Options are :

  • web1proc is online, and web2proc is faulted.
  • web1proc is online, and web2proc is online.
  • web1proc is faulted, and web2proc is offline.
  • web1proc and web2proc are both faulted.

Answer : web1proc is online, and web2proc is faulted.

Which two triggers can only be enabled at the resource level? (Select two.)A. resrestartB. resadminwaitC. resfaultD. resstatechangeE. resnotoff


Options are :

  • BE
  • AB
  • CA
  • BC

Answer : BE

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

Where can an incident responder find the policy rules and/or exceptions that were in effect when aparticular incident was detected?


Options are :

  • Policy page
  • Incident List
  • Policy Summary report
  • Incident Snapshot

Answer : Incident Snapshot

Which command should be used to view keyless licenses on a Veritas cluster?


Options are :

  • vxkeyless
  • vxkeydisplay
  • vxkeylist
  • vxlicdump

Answer : vxkeyless

What is one function of a Network Discover scanner?


Options are :

  • It collects content and metadata from a variety of repositories.
  • It scans an organization's network to identify Network Discover targets.
  • It sends collected content to the Enforce Server for processing.
  • It specifies the types of repositories that can be scanned.

Answer : It collects content and metadata from a variety of repositories.

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 9

A two-node Veritas Cluster with I/O fencing configured has two service groups running, one oneach node.What happens when all heartbeat links are lost simultaneously?


Options are :

  • All service groups remain where they are.
  • All nodes race for the coordinator disks, and one node panics.
  • All service groups fault and shut down.
  • All nodes race for the data disks, and one node panics.

Answer : All nodes race for the coordinator disks, and one node panics.

Which two types of stakeholders should be included when writing policies? (Select two.)A. ComplianceB. EducationC. Risk managementD. Messaging teamE. Marketing


Options are :

  • B,C
  • C,A
  • C,B
  • A,C

Answer : A,C

What should be used to exclude email going to any email address in the partner.com domain?


Options are :

  • L7 filter
  • IP filter
  • Sender/User Matches pattern
  • Content filter

Answer : L7 filter

250-352 Administration of Storage Foundation and HA 6.0 Test Set 8

Only the TriggerPath service group attribute value for the websg service group is set to"bin/websg" for cluster nodes where the websg service group can be online.Where will Veritas Cluster Server (VCS) look for the preonline event trigger if the preonline eventtrigger is also enabled on all cluster systems for the websg service group?


Options are :

  • $VCS_HOME/preonline/bin/websg
  • $VCS_HOME/bin/websg/preonline
  • $VCS_HOME/bin/websg/internal_triggers
  • $VCS_HOME/preonline/triggers/bin/websg

Answer : $VCS_HOME/bin/websg/preonline

There is a service group dependency configured as follows:If the child group faults, the parent group is taken offline.If the parent group faults, the child group remains online.Which type of dependency is this?


Options are :

  • Firm
  • Hard
  • Soft
  • Remote

Answer : Firm

Which product lets an incident responder see who has access to confidential files on a public fileshare?


Options are :

  • Network Prevent
  • Network Protect
  • Network Discover
  • Network Monitor

Answer : Network Discover

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

Which three protocols are system-configured and are recognized by Network Monitor by their


individual signatures? (Select three.)A. FTPB. IM: ICQC. IM: AIMD. NNTPE. TFTP


Options are :

  • C,A,D
  • A,B,C
  • B,C,A
  • A,C,D

Answer : A,C,D

What should an administrator do when the License Key expires?


Options are :

  • Enter a new key on the Advanced Settings page
  • Enter a new key on the System Settings page
  • Edit the key in the VontuManager.conf file
  • Edit the key in the Protect.properties file

Answer : Enter a new key on the System Settings page

Where can an administrator view the number of messages per protocol that have been monitoredover a given time period?


Options are :

  • Server Detail page
  • System Events page
  • Network Incident Report page
  • Traffic Detail page

Answer : Traffic Detail page

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

An administrator adds a new user within a cluster that is running in a non-secure mode.In which file will the user name be stored?


Options are :

  • /etc/VRTSvcs/conf/config/main.cf
  • /opt/VRTSvcs/conf/config/users.cf
  • /etc/VRTSvcs/conf/config/secure.cf
  • /etc/VRTSvcs/conf/config/types.cf

Answer : /etc/VRTSvcs/conf/config/main.cf

What occurs when the hastop -local -force command is issued on the active node in a two-nodeactive/passive cluster?


Options are :

  • The online service groups on the primary node are taken offline and remain offline until started manually.
  • The services will continue to run on the active node while HAD is stopped.
  • The services will be shut down on the active node and brought up on the passive node.
  • The service group behavior will follow the value of the EngineShutdown attribute while HAD is stopped.

Answer : The services will continue to run on the active node while HAD is stopped.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Which TrueMatch detection method can be evaluated at the agent level?


Options are :

  • Described Content Matching (DCM)
  • Indexed Document Matching (IDM)
  • Exact Data Matching (EDM)
  • Directory Group Matching (DGM)

Answer : Described Content Matching (DCM)

What is a benefit of the Symantec Data Loss Prevention 9.0 security architecture?


Options are :

  • Mutual authentication between servers is based on the Challenge Handshake Authentication Protocol (CHAP).
  • Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (3DES).
  • Communication is initiated by the detection servers inside the firewall.
  • Encryption is provided for confidential information across system components.

Answer : Encryption is provided for confidential information across system components.

Which attribute can be configured to allow a service group to come back online after a persistentresource has faulted and other nodes are unavailable?


Options are :

  • OnlineRetry
  • AutoStart
  • AutoReset
  • AutoRestart

Answer : AutoRestart

250-270 Administration of Symantec Net Backup 7.0 Unix Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions