250-253 Administration of Veritas Cluster Server 6.0 Exam Set 2

Which Storage Foundation feature is used to send data changes to a remote site via an IP network?


Options are :

  • Replication Exec
  • NetBackup
  • Volume Replicator
  • Storage Replicator

Answer : NetBackup

Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?


Options are :

  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)
  • Indexed Document Matching (IDM)
  • Directory Group Matching (DGM)

Answer : Indexed Document Matching (IDM)

Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?


Options are :

  • Policy Management tab
  • Users tab
  • General tab
  • Incident Access tab

Answer : General tab

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 2

Which Network Protect feature is a system administrator unable to configure?


Options are :

  • Ability to restore files
  • Content of the file marker
  • Location of quarantined files
  • Ability to copy files

Answer : Ability to restore files

What information must be specified when adding a resource to a service group?


Options are :

  • Attribute values
  • Service group name
  • System name
  • Cluster identifier

Answer : Service group name

What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?


Options are :

  • The MonitorProcesses attribute must be configured for the Application resource type.
  • The MonitorProgram attribute must be configured for the Application resource type
  • The Mode value for the IMF attribute of the Application type resource is set to 1
  • The ProPCV attribute is prevented from being changed when the service group is active.

Answer : The MonitorProcesses attribute must be configured for the Application resource type.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 13

On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocol recognition?


Options are :

  • Secure tunneling protocols
  • Pre-defined UDP protocols
  • System-defined UDP and TCP protocols
  • User-configured TCP protocols

Answer : User-configured TCP protocols

How can an incident responder remediate multiple incidents simultaneously?


Options are :

  • By selecting an Automated Response on an Incident List report
  • By selecting a Smart Response on the Incident Snapshot page
  • By selecting the Find Similar command on the Incident Snapshot page

Answer : By selecting the Find Similar command on the Incident Snapshot page

How is a policy applied to files found in Network Discover scans?


Options are :

  • By choosing the correct detection servers to run the scans
  • By choosing the correct policies in the scan target
  • By assigning policies to the Network Discover Server
  • By assigning policy groups to the scan target

Answer : By assigning policy groups to the scan target

ST0-135 Symantec Network Access Technical Assesment Exam Set 4

Only two local disks suitable for use as coordinator disks are available for a local mutinode cluster. Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/O fencing configuration? (Select two.)


Options are :

  • One-node CP server cluster with only LLT configured
  • I/O fencing on the CP server cluster
  • Multi-node CP server cluster
  • One-node CP server cluster with GAB and LLT configured
  • Second network connection to the CP server cluster

Answer : Multi-node CP server cluster Second network connection to the CP server cluster

Which detection method includes keyword rules?


Options are :

  • Described Content Matching (DCM)
  • Indexed Document Matching (IDM)
  • Exact Data Matching (EDM)
  • Directory Group Matching (DGM)

Answer : Described Content Matching (DCM)

To which file system folder does PacketCapture write reconstructed SMTP messages?


Options are :

  • drop
  • drop_discover
  • drop_ttd
  • drop_pcap

Answer : drop_pcap

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 11

On a cluster, what does the following command display? Hares -display -ovalues


Options are :

  • all overridden resource attributes
  • all online resource attributes
  • all uncommitted resource attributes
  • all default resource attributes

Answer : all overridden resource attributes

While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)


Options are :

  • Operational complexity
  • User security
  • Network connectivity
  • Cluster upgrades
  • Inability to handle load on failover

Answer : Operational complexity Inability to handle load on failover

What are two operating systems supported by Veritas Cluster Server? (Select two.)


Options are :

  • AIX
  • Red Hat Enterprise Server
  • Fedora
  • openSuSe
  • Mac OS

Answer : AIX Red Hat Enterprise Server

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 2

What are two resource types that Proxy resources can reference? (Select two.)


Options are :

  • IP
  • Quorum
  • NIC
  • DNS
  • ElifNone

Answer : NIC ElifNone

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files). Which two Discover target configuration mistakes might be causing the problem? (Select two.)


Options are :

  • The Protect credential is unspecified.
  • The Quarantine/Copy Share credentials are invalid.
  • The Copy option is selected.
  • The Default credentials are invalid.
  • The sharelist excludes all directories on the host being scanned.

Answer : The Protect credential is unspecified. The Quarantine/Copy Share credentials are invalid.

Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?


Options are :

  • Network Monitor
  • Network Discover
  • Network Prevent
  • Network Protect

Answer : Network Protect

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)


Options are :

  • LUNs visible within the vxdisk list output
  • LUNs validated with the hacf -verify command
  • Arrays with SCSI3-PR enabled
  • Cluster File System Option enabled
  • Aminimum of two private heartbeat connections

Answer : LUNs visible within the vxdisk list output Arrays with SCSI3-PR enabled

An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices. Which types of resources should the administrator consider to configure in the service group?


Options are :

  • Application, File System, Volume, Disk Group, IP, Proxy
  • Application, File System, Volume, Disk Group, IP, NIC
  • Application, Volume, Disk Group, IP, Phantom
  • Application, Volume, Disk Group, IP, Proxy

Answer : Application, Volume, Disk Group, IP, Proxy

An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed. Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)


Options are :

  • configure the operating system to automatically mount the file systems involved
  • configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
  • unconfigure the operating system to automatically mount the file systems involved
  • link the application resource to the file system resources, with appropriate dependencies
  • set up the appropriate file system contention mechanism in the correct sequence

Answer : configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved unconfigure the operating system to automatically mount the file systems involved

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 7

Which two are characteristics of a Veritas Cluster Server resource? (Select two.)


Options are :

  • Allows only persistent resources to be a parent
  • Has a single entry point that the agent uses to control the resource
  • Corresponds to a hardware or software component
  • Has a unique name throughout the cluster
  • Allows cyclical dependencies without a clear starting point

Answer : Corresponds to a hardware or software component Has a unique name throughout the cluster

What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?


Options are :

  • All LLT node IDs must be unique across the clusters.
  • All node IDs must be unique across the clusters.
  • GAB network IDs must be unique across the clusters.
  • Cluster IDs must be unique across the clusters.

Answer : Cluster IDs must be unique across the clusters.

What does Network Monitor use to identify network traffic going to a nonstandard port?


Options are :

  • Either UDP or TCP
  • Protocol signature
  • Total packet size
  • The originating domain

Answer : Protocol signature

250-371 Administration Symantec Net Backup 7.5 Windows Exam Set 4

An administrator is responsible for a cluster split between two data centers in different locations.The data is mirrored between the two sites. If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?


Options are :

  • One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
  • Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
  • One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
  • One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site

Answer : One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site

When run in a two node cluster, what does the lltstat -nvv command show?


Options are :

  • LLT information for all configured nodes in the cluster
  • only LLT information for the node the command was run on
  • LLT information for any cluster nodes attached to the same switch
  • only LLT information for nodes verified by Veritas Cluster Server to be active

Answer : LLT information for all configured nodes in the cluster

Discover Servers can leave Marker Files for files moved to the quarantine location. Which file types retain their file extension and the corresponding icon in the Marker File?


Options are :

  • File types specified in the ProtectRemediation.properties file
  • Microsoft Office documents
  • All file types configured in Windows Explorer on the detection server host
  • Text files, including source code in Java, C, and shell script

Answer : File types specified in the ProtectRemediation.properties file

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 2

Which data locations should an organization scan first?


Options are :

  • Password protected shares
  • Regionalized repositories
  • Centralized repositories
  • Private individual directories

Answer : Centralized repositories

How does a system administrator verify that a Network Monitor Server is healthy?


Options are :

  • By verifying the configuration details of the System Settings page
  • By determining whether system alert message emails are generated or received
  • By reviewing the results of the Environmental Check Utility (ECU)
  • By checking Incident Queue and Message Wait Time on the System Overview page

Answer : By checking Incident Queue and Message Wait Time on the System Overview page

The log files used to verify that a custom application is being properly monitored are located in which directory?


Options are :

  • /var/VRTSvcs/agent/log/
  • /opt/VRTSvcs/log/
  • /opt/VRTSvcs/agent/log/
  • /var/VRTSvcs/log/

Answer : /opt/VRTSvcs/log/

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions