250-253 Administration of Veritas Cluster Server 6.0 Unix Set 2

How does a system administrator verify that a Network Monitor Server is healthy?


Options are :

  • By reviewing the results of the Environmental Check Utility (ECU)
  • By determining whether system alert message emails are generated or received
  • By verifying the configuration details of the System Settings page
  • By checking Incident Queue and Message Wait Time on the System Overview page

Answer : By checking Incident Queue and Message Wait Time on the System Overview page

250-352 Administration of Storage Foundation and HA 6.0 Test Set 5

On which system can you set UseMpathd=1 in a MultiNICB resource?


Options are :

  • Linux
  • HP-UX
  • AIX
  • Solaris

Answer : HP-UX

Which data locations should an organization scan first?


Options are :

  • Password protected shares
  • Regionalized repositories
  • Centralized repositories
  • Private individual directories

Answer : Centralized repositories

Which actions are required to enable a service group to run on all systems in a cluster simultaneously?


Options are :

  • Take the service group offline, add all cluster systems to the AutoStartList, and bring the service group back online with the -all option
  • Run the hagrp -modify [service group] Parallel 1 command and the service group will automatically restart on all systems
  • Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the AutoStartList, and restart Veritas Cluster Server
  • Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all cluster systems, and restart Veritas Cluster Server

Answer : Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the AutoStartList, and restart Veritas Cluster Server

250-352 Administration of Storage Foundation Practice Exam Set 6

To which file system folder does PacketCapture write reconstructed SMTP messages?


Options are :

  • drop
  • drop_pcap
  • drop_ttd
  • drop_discover

Answer : drop_pcap

What are two operating systems supported by Veritas Cluster Server? (Select two.)


Options are :

  • Fedora
  • openSuSe
  • Mac OS
  • Red Hat Enterprise Server
  • AIX

Answer : Red Hat Enterprise Server AIX

On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocol recognition?


Options are :

  • Secure tunneling protocols
  • Pre-defined UDP protocols
  • User-configured TCP protocols
  • System-defined UDP and TCP protocols

Answer : User-configured TCP protocols

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 10

Which two are characteristics of a Veritas Cluster Server resource? (Select two.)


Options are :

  • Allows only persistent resources to be a parent
  • Has a single entry point that the agent uses to control the resource
  • Corresponds to a hardware or software component
  • Allows cyclical dependencies without a clear starting point
  • Has a unique name throughout the cluster

Answer : Corresponds to a hardware or software component Has a unique name throughout the cluster

How is Intelligent Monitoring Framework configured?


Options are :

  • It is automatically configured on all agents.
  • It needs to be manually configured on each cluster node.
  • It is automatically configured but only on supported agents.
  • It needs to be manually configured on each agent.

Answer : It is automatically configured but only on supported agents.

Which two traffic feed sources should be used for Network Monitor? (Select two.)


Options are :

  • router LAN port
  • Switched Port Analyzer (SPAN) port
  • tunneled port on a VPN router
  • trunking port on a hub
  • Test Access Port (TAP)

Answer : Switched Port Analyzer (SPAN) port Test Access Port (TAP)

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 2

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files). Which two Discover target configuration mistakes might be causing the problem? (Select two.)


Options are :

  • The Quarantine/Copy Share credentials are invalid.
  • The sharelist excludes all directories on the host being scanned.
  • The Default credentials are invalid.
  • The Protect credential is unspecified.
  • The Copy option is selected.

Answer : The Quarantine/Copy Share credentials are invalid. The Protect credential is unspecified.

An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed. Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)


Options are :

  • configure the operating system to automatically mount the file systems involved
  • set up the appropriate file system contention mechanism in the correct sequence
  • unconfigure the operating system to automatically mount the file systems involved
  • link the application resource to the file system resources, with appropriate dependencies
  • configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved

Answer : unconfigure the operating system to automatically mount the file systems involved configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved

What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)


Options are :

  • LUNs validated with the hacf -verify command
  • Aminimum of two private heartbeat connections
  • LUNs visible within the vxdisk list output
  • Cluster File System Option enabled
  • Arrays with SCSI3-PR enabled

Answer : LUNs visible within the vxdisk list output Arrays with SCSI3-PR enabled

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

Which detection method includes keyword rules?


Options are :

  • Indexed Document Matching (IDM)
  • Directory Group Matching (DGM)
  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)

Answer : Described Content Matching (DCM)

Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offline unexpectedly before faulting the resource?


Options are :

  • AutoRestart
  • RestartLimit
  • RetryLimit
  • AutoRestartLimi

Answer : RestartLimit

An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?


Options are :

  • Prerequisites
  • Quorum
  • RoundRobin
  • Priority

Answer : RoundRobin

250-352 Administration of Storage Foundation and HA 6.0 Test Set 5

Which resource type creates a dependency between applications that are configured in different Veritas Cluster Server clusters?


Options are :

  • Proxy
  • RemoteGroup
  • Phantom
  • Application

Answer : RemoteGroup

How is a policy applied to files found in Network Discover scans?


Options are :

  • By choosing the correct policies in the scan target
  • By assigning policy groups to the scan target
  • By assigning policies to the Network Discover Server
  • By choosing the correct detection servers to run the scans

Answer : By assigning policy groups to the scan target

What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?


Options are :

  • Cluster IDs must be unique across the clusters.
  • All node IDs must be unique across the clusters.
  • All LLT node IDs must be unique across the clusters.
  • GAB network IDs must be unique across the clusters.

Answer : Cluster IDs must be unique across the clusters.

250-405 Administration of Symantec Management Platform Exam Set 6

Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?


Options are :

  • GAB
  • IMF
  • LLT
  • HAD

Answer : HAD

What should a system administrator do to stop a detection server?


Options are :

  • Access the Enforce Server Detail page and select "Done"
  • Access the Server Detail page and select "Stop"
  • Access the services panel and stop the VontuMonitorController service
  • Access a command prompt and enter the command "net stop service VontuMonitor"

Answer : Access the Server Detail page and select "Stop"

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 5

How is the incident count for a new system managed in order to avoid overwhelming the incident response team?


Options are :

  • Many incident responders are allowed access to the system.
  • Match count thresholds are set.
  • Incidents are auto-filtered to hide false positives.
  • More than one policy is enabled

Answer : Match count thresholds are set.

A system administrator examines the results of a completed scan. Which information is available on a scan listing on the Discover Targets page? (Select three.)


Options are :

  • File structure and location
  • Elapsed time and total time for each scan
  • Number of items scanned
  • User who initiated the scan
  • Number of items changed since the previous scan
  • Errors encountered

Answer : Elapsed time and total time for each scan Number of items scanned Errors encountered

Which two are valid settings for FailoverPolicy? (Select two.)


Options are :

  • Failover
  • Order
  • RoundRobin
  • Dynamic
  • Priority

Answer : RoundRobin Priority

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 5

What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?


Options are :

  • If any detection server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any Endpoint Server is running, the agent automatically connects to it after a period of time
  • If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any detection server in the system is running, the agent automatically connects to it after a period of time.

Answer : If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

Which three products support virtualization and can be run on virtual machines? (Select three.)


Options are :

  • Network Prevent (Web)
  • Network Discover
  • Endpoint Discover
  • Network Prevent (Email)
  • Network Monitor

Answer : Network Prevent (Web) Network Discover Network Prevent (Email)

A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due to network reconfiguration. What is the correct order for the cluster and heartbeat protocols to be shut down?


Options are :

  • VCS -- > Fencing -- > GAB --> LLT
  • Fencing -- > VCS -- > GAB --> LLT
  • Fencing -- > VCS -- > LLT -- > GAB
  • VCS -- > Fencing -- > LLT -- > GAB

Answer : VCS -- > Fencing -- > GAB --> LLT

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 10

The Veritas Cluster Server (VCS) notifier resource and VCS triggers can be configured to generate messages to assist in VCS administration. Which other facility can be a source of notifications within a comprehensive VCS implementation?


Options are :

  • Cluster Manager Java console
  • Veritas Enterprise Manager
  • Storage Foundation Manager
  • Veritas Operations Manager

Answer : Veritas Operations Manager

Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?


Options are :

  • Simulator
  • AgentServer
  • AgentTester
  • Fencing

Answer : Fencing

The I/O fencing configuration for a Veritas cluster uses one Coordination Point (CP) server and two local coordinator disks. There are two network connections between the cluster and the CP server. A resource of type CoordPoint has been configured in the cluster using all default resource attribute values. Which resource attribute value for the resource of type CoordPoint needs to be modified so that the resource will fault only when both network connections to the CP server fail even though the coordination disks are still accessible?


Options are :

  • FencingTolerance
  • FaultTolerance
  • FencingLimit
  • ToleranceLimit

Answer : FaultTolerance

ST0-085 Symantec Security Information Manager 4.7 Technical Set 5

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions