250-253 Administration of Veritas Cluster Server 6.0 Test Set 6

What are three benefits that data loss prevention solutions provide that other security technologiesor tools do not? (Select three.)A. Give visibility into where sensitive data is storedB. Give insight into capacity planning for sensitive dataC. Identify who has access to sensitive dataD. Indicate where sensitive data is being sentE. Measure encryption strength for sensitive data


Options are :

  • BAC
  • DCA
  • CAB
  • ACD

Answer : ACD

Which three functions of the communications architecture ensure that the system is able toautomatically recover should a network connectivity failure occur between the detection serversand the Enforce Server? (Select three.)A. Database backupB. Autonomous monitoringC. Automatic synchronizingD. Incident queuingE. Alert archiving


Options are :

  • A,C,B
  • B,C,D
  • C,A,B
  • A,B,C

Answer : B,C,D

What are three valid reasons for adding comments to incidents? (Select three.)A. To provide detail to the next responder when escalating an incidentB. To allow the next responder to more quickly prioritize incidents for reviewC. To allow the next responder to more quickly understand the incident historyD. To provide detail when closing an incidentE. To provide detail for report filtering


Options are :

  • A,B,C
  • A,C,D
  • C,A,B
  • B,A,C

Answer : A,C,D

ST0-135 Symantec Network Access Technical Assesment Exam Set 2

What is the recommended deployment location for Network Monitor?


Options are :

  • Inside the secured corporate LAN
  • In its own isolated virtual LAN (VLAN)
  • On the WAN side of the corporate router
  • Within the demilitarized zone (DMZ)

Answer : Within the demilitarized zone (DMZ)

Which database does Symantec Data Loss Prevention 9.0 support for incident and policy storage?


Options are :

  • Microsoft SQL Server
  • Oracle 10g version 10.2.0.4
  • Oracle 10g version 10.2.0.1
  • any version of Oracle 10g

Answer : Oracle 10g version 10.2.0.4

In a Veritas cluster, when all high priority links fail, the low priority links are promoted to highpriority in which manner?


Options are :

  • all simultaneously regardless of number
  • in order as they appear in /etc/llttab
  • one at a time as required
  • in order by NIC name

Answer : all simultaneously regardless of number

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 5

Which file is created by vxfen startup script when I/O fencing starts?


Options are :

  • vxfenmode
  • vxgabtab
  • vxfendg
  • vxfentab

Answer : vxgabtab

An administrator wants to change the name of an existing NIC resource from net0nic to net4nic.The resource is configured in the websg service group.What is the most efficient method to rename the NIC resource?


Options are :

  • hares -duplicate net0nic net4nic hares -delete net0nic
  • hares -ren net0nic net4nic
  • hares -copy net0nic net4nic hares -paste net4nic hares -delete net0nic
  • hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic

Answer : hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic

To cluster an application with Veritas Cluster Server, an administrator must obtain whichlicense(s)?


Options are :

  • Valid licenses to run on all cluster nodes
  • Permanent licenses tied to the system host ID
  • Demo license for at least one cluster node
  • Keyless licenses for the application

Answer : Valid licenses to run on all cluster nodes

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

Which information is recommended to be included in an Exact Data Matching (EDM) data source?


Options are :

  • Date fields
  • Column names in the first row
  • Country, state, or province names
  • Numeric fields with fewer than five digits

Answer : Column names in the first row

Which environmental factors external to the nodes represent potential single points of failure thatcan be made highly available through redundancy? (Select two.)A. Application softwareB. Operating systemC. Random access memoryD. Networking componentsE. Electrical power circuits


Options are :

  • CB
  • BC
  • DE
  • AB

Answer : DE

Which three describe an effective data loss prevention (DLP) program? (Select three.)A. DLP is a company-wide initiative.B. DLP is primarily driven by Information Security.C. DLP is primarily driven by the Incident Response Team.D. Employee participation is important.E. Business stakeholders are held accountable for risk reduction.


Options are :

  • C,A,B
  • A,D,E
  • B,A,C
  • A,B,C

Answer : A,D,E

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

What are two major functions of Low Latency Transport (LLT)? (Select two.)A. Cluster communicationsB. Traffic distributionC. Cluster membershipD. HeartbeatingE. Broadcast message


Options are :

  • AB
  • AC
  • BA
  • BD

Answer : BD

What happens when hastop -all -force is executed?


Options are :

  • HAD and all services under its control shut down
  • HAD stops and all services remain online
  • HAD remains online after shutting down the services
  • HAD forcibly stops all services and HAD shuts down

Answer : HAD stops and all services remain online

Which report helps a compliance officer understand how the company is complying with its datasecurity policies over time?


Options are :

  • Policy Trend report, summarized by policy, then severity
  • Policy report, filtered on date, and summarized by policy
  • Policy report, filtered on quarter, and summarized by policy
  • Policy Trend report, summarized by policy, then quarter

Answer : Policy Trend report, summarized by policy, then quarter

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 9

Which configuration has the lowest percentage of active nodes?


Options are :

  • 6+2 (8 nodes with two spares)
  • active-passive (2 nodes)
  • active-active (2 nodes)
  • 7+1 (8 nodes with one spare)

Answer : active-passive (2 nodes)

GAB can be configured to automatically seed the cluster through I/O fencing, even when somecluster nodes are unavailable.In which file does the autoseed_gab_timeout parameter need to be configured to enable thisfeature?


Options are :

  • vxfenmode
  • gabtab
  • vxfentab
  • main.cf

Answer : vxfenmode

What is the default incident data retention behavior for Network Monitor and Network Prevent?


Options are :

  • Only messages are retained.
  • Neither messages nor attachments are retained.
  • Only messages are retained.
  • Messages and attachments are retained.

Answer : Messages and attachments are retained.

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 7

A 2-node Veritas Cluster Server cluster has two dedicated Ethernet heartbeat links and I/OFencing enabled.What will happen if both heartbeat links simultaneously fail?


Options are :

  • One node panics and the other remains running.
  • Both nodes panic and reboot into the cluster.
  • All service groups are frozen on both nodes.
  • I/O Fencing takes over as the heartbeat mechanism.

Answer : All service groups are frozen on both nodes.

Where are the installation log files created when Veritas Cluster Server is installed?


Options are :

  • /opt/VRTSvcs/install/logs/
  • /opt/VRTS/install/logs/
  • /var/VRTSvcs/install/logs/
  • /var/VRTS/install/logs/

Answer : /opt/VRTS/install/logs/

Which incidents appear in the Network Incident List when the Network Prevent Action filter is setto "Modified"?


Options are :

  • incidents in which confidential content was removed from a Web mail
  • incidents in which an SMTP email was changed to include a specified header
  • incidents in which confidential content resulted in a blocked Web mail
  • incidents in which confidential content was removed from an SMTP email

Answer : incidents in which an SMTP email was changed to include a specified header

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

Under normal conditions, Veritas Cluster Server agents are started and stopped automatically.Which command is required to manually start an agent?


Options are :

  • hatype
  • hares
  • haagent
  • hastart

Answer : haagent

What is a limitation of using the web-based installer?


Options are :

  • The web-based installer can only be used to perform standard upgrades.
  • The server where the installation is launched must be the same operating system as the target system.
  • The Veritas XPortal Server process must be started on the target server.
  • The server where the web browser is launched must be the same operating system as the target system.

Answer : The server where the installation is launched must be the same operating system as the target system.

A consultant assisted with the installation of a custom agent in the environment. They later sent afile to replace the online script for the custom agent.If the custom agent was called newapp, where would the online file be located?


Options are :

  • etc/VRTSvcs/conf/Application/online
  • opt/VRTSvcs/bin/newapp/online
  • etc/VRTSvcs/conf/newapp/online
  • opt/VRTSvcs/bin/Application/online

Answer : opt/VRTSvcs/bin/newapp/online

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 3

Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover applyfilters to?


Options are :

  • The entire .pst file
  • Attachments in the .pst file
  • Folders in the .pst file
  • Individual emails in the .pst file

Answer : The entire .pst file

Which three are examples of confidential data? (Select three.)A. National ID numbersB. Published press releasesC. Health informationD. CAD drawingsE. Manufacturing plant locations


Options are :

  • BCA
  • ACB
  • CAB
  • ACD

Answer : ACD

Which three are valid Scanned Content filter types for the Discover File System target? (Selectthree.)A. Exclude filterB. File Size filterC. Read ACL filterD. File Owner filterE. File Date filter


Options are :

  • B,A,C
  • A,B,E
  • A,B,C
  • C,B,A

Answer : A,B,E

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

Which component do all Veritas Cluster Server agents use to communicate their status?


Options are :

  • IMF
  • HAD
  • LLT
  • GAB

Answer : HAD

A power problem caused all nodes in the cluster to crash. One node has failed to reboot, andsmoke is coming from the power supply. The administrator runs gabconfig -a and notices that porta has two of three nodes registered.What should the administrator do to start Veritas Cluster Server on the running nodes?


Options are :

  • edit /etc/llttab and change the -n3 option to -x
  • run hasys -force on one of the nodes to force HAD to start
  • run gabconfig -cx on one of the running nodes
  • run gabconfig -cx on both of the running nodes

Answer : run gabconfig -cx on one of the running nodes

When resolving or dismissing incidents, Symantec recommends that an incident respondercompletes which action?


Options are :

  • Delete incidents
  • Add comments
  • Export incidents
  • Set severity

Answer : Add comments

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions