250-253 Administration of Veritas Cluster Server 6.0 Unix Set 4

Which Veritas Cluster Server command is used to override static resource type attribute values for a specific resource?


Options are :

  • hares
  • hagrp
  • hatype
  • haclus

Answer : hares

An application is experiencing failures. The application administrator wants Veritas Cluster Server to take all resources offline after failure. The application should remain offline. Which attribute can accomplish this?


Options are :

  • AutoFailover
  • Critical
  • ManageFaults
  • FailOverPolicy

Answer : AutoFailover

An administrator stopped Veritas Cluster Server (VCS) on the sym1 node to remove it from the cluster. When attempting to do this with the hasys -delete command from sym2, an error message is displayed. What is the likely cause of this error?


Options are :

  • VCS must be completely shut down on all nodes.
  • The vxfen daemon on sym1 is still running.
  • The GAB daemon on sym1 is still running.
  • One or more SystemList attributes still contains sym1.

Answer : One or more SystemList attributes still contains sym1.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

Which two are default behaviors of Veritas Cluster Server service groups? (Select two.)


Options are :

  • Start the service groups in the order of the attribute SystemList
  • Migrate service groups from a system on intentional system shutdown
  • Start the service groups in lexical order
  • AutoDisable the service groups on a system when all low priority links fail
  • AutoDisable the service groups on cluster startup

Answer : Migrate service groups from a system on intentional system shutdown AutoDisable the service groups on cluster startup

Where can an incident responder view all actions that have occurred for an incident?


Options are :

  • Incident Actions
  • Auditlog Table
  • System Events
  • Incident Snapshot

Answer : Incident Snapshot

How can a system administrator obtain the log files for a detection server? (Select three.)


Options are :

  • Run the Log Collection Utility (LCU)
  • Navigate to the logs directory
  • Select Logs under Administration node
  • Click Fetch Latest on the Server Detail page
  • Download logs from the System Overview page

Answer : Run the Log Collection Utility (LCU) Navigate to the logs directory Click Fetch Latest on the Server Detail page

251-312 Administration of Symantec Backup Exec 12 for Exam Set 4

Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?


Options are :

  • Custom
  • Local
  • Global
  • Proxy

Answer : Local

Which service group attribute enables specifying preferred nodes for failover?


Options are :

  • IntentionalOnlineList
  • ClusterList
  • SystemZones
  • AutostartList

Answer : SystemZones

An installed cluster has been licensed with the keyless licensing option. The administrator has yet to configure the cluster to be managed by Veritas Operations Manager (VOM). What will happen when 60 days have passed since installation?


Options are :

  • The cluster will cease to respond if a resource faults.
  • The cluster will shut down.
  • The cluster will ignore licensing
  • The cluster will log messages related to licensing.

Answer : The cluster will log messages related to licensing.

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 9

In which two cases will the agent status remain green (good) on the Agent Events page? (Select two.)


Options are :

  • The Endpoint Server detected that the connection with the agent was lost.
  • The agent is unable to restore a database file.
  • There was agent or server authentication failure.
  • There was an agent service shutdown during machine shutdown.
  • The agent closed the connection to the Endpoint Server.

Answer : There was an agent service shutdown during machine shutdown. The agent closed the connection to the Endpoint Server.

GAB can be configured to automatically seed the cluster through I/O fencing, even when some cluster nodes are unavailable. In which file does the autoseed_gab_timeout parameter need to be configured to enable this feature?


Options are :

  • vxfenmode
  • gabtab
  • main.cf.previous
  • vxfentab

Answer : vxfenmode

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 7

Which database does Symantec Data Loss Prevention 9.0 support for incident and policy storage?


Options are :

  • Microsoft SQL Server
  • any version of Oracle 10g
  • Oracle 10g version 10.2.0.4
  • Oracle 10g version 10.2.0.1

Answer : Oracle 10g version 10.2.0.4

Which Veritas Cluster Server event trigger is always invoked on the system where the event occurred?


Options are :

  • violation
  • nofailover
  • postonline
  • sysoffline

Answer : postonline

Which type of Veritas Cluster Server service group dependency permits a parent group to be brought online when the child group is offline?


Options are :

  • Online local
  • Offline remote
  • Offline local
  • Online remote

Answer : Offline local

250-254 Administration of Symantec Cluster Server 6.1 Test Set 8

A consultant assisted with the installation of a custom agent in the environment. They later sent a file to replace the online script for the custom agent. If the custom agent was called newapp, where would the online file be located?


Options are :

  • etc/VRTSvcs/conf/Application/online
  • opt/VRTSvcs/bin/newapp/online
  • etc/VRTSvcs/conf/newapp/online
  • opt/VRTSvcs/bin/Application/online

Answer : opt/VRTSvcs/bin/newapp/online

An administrator is configuring a websg service group and a dbsg service group. The administrator needs to configure Veritas Cluster Server so websg will only come online if dbsg is online somewhere in the cluster. If dbsg faults, websg should stay online. If dbsg is unable to fail over, the websg should stay online. Which type of service group dependency does this require?


Options are :

  • Online global soft
  • Online global firm
  • Online local soft
  • Online local firm

Answer : Online global soft

The websg service group is online on node sym1. The dbsg service group is online on node sym2. No fencing is configured. One of the two heartbeat links has been down for 30 minutes. The cable is unplugged from the last working heartbeat link. What will happen to the dbsg service group?


Options are :

  • It will also start on sym1.
  • It will migrate to sym1.
  • It will go to a FAULTED state.
  • It will remain on sym2.

Answer : It will remain on sym2.

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 8

Which delimiter is unacceptable in Exact Data Matching (EDM) data sources?


Options are :

  • Comma (,)
  • Slash (/)
  • Pipe (|)
  • Tab

Answer : Slash (/)

What happens when hastop -all -force is executed?


Options are :

  • HAD stops and all services remain online
  • HAD forcibly stops all services and HAD shuts down
  • HAD and all services under its control shut down
  • HAD remains online after shutting down the services

Answer : HAD stops and all services remain online

Which type of installation requires the most additional memory on the Enforce Server machine to host multiple server instances?


Options are :

  • Two-tier
  • Stand-alone
  • Single-tier
  • Three-tier

Answer : Single-tier

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 4

The loadwarning trigger has been configured for all cluster systems, and all service groups have been configured for load. The current load on a system is 135, which is the maximum possible load on a system for this configuration, and the load has been observed for 10 minutes. The following system attributes have been set for all cluster nodes: Capacity = 150 LoadWarningLevel = 80 LoadTimeThreshold = 300 Under which condition will the loadwarning trigger be invoked?


Options are :

  • The trigger will never be invoked.
  • The trigger will be invoked after 240 seconds
  • The trigger will be invoked after 300 seconds.
  • The trigger will be invoked after 135 seconds.

Answer : The trigger will be invoked after 300 seconds.

How many levels deep can a service group dependency tree be?


Options are :

  • 7
  • 5
  • 1
  • 3

Answer : 5

Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover apply filters to?


Options are :

  • Individual emails in the .pst file
  • Attachments in the .pst file
  • Folders in the .pst file
  • The entire .pst file

Answer : The entire .pst file

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 9

The hastatus command shows the nodes are in STALE_ADMIN_WAIT state. What is the cause of this condition?


Options are :

  • The main.cf file is missing from the configuration directory.
  • The main.cf is inconsistent on the nodes in the cluster.
  • There is a syntax error in the main.cf configuration file.
  • The configuration file main.cf was left open before restarting GAB.

Answer : There is a syntax error in the main.cf configuration file.

What is a benefit of the Symantec Data Loss Prevention 9.0 security architecture?


Options are :

  • Encryption is provided for confidential information across system components.
  • Mutual authentication between servers is based on the Challenge Handshake Authentication Protocol (CHAP).
  • Communication is initiated by the detection servers inside the firewall.
  • Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (3DES).

Answer : Encryption is provided for confidential information across system components.

In a two node configuration, which option allows the administrator to form a Veritas cluster on the pair?


Options are :

  • One node runs HP-UX and the other Oracle Solaris
  • One node runs Oracle Solaris SPARC, and the other runs Oracle Solaris x86.
  • One node is an NFS client to the other node's NFS server.
  • One node is a virtual machine, and the other is physical

Answer : One node is a virtual machine, and the other is physical

250-352 Administration of Storage Foundation and HA 6.0 Test Set 6

Which information is recommended to be included in an Exact Data Matching (EDM) data source?


Options are :

  • Numeric fields with fewer than five digits
  • Column names in the first row
  • Country, state, or province names
  • Date fields

Answer : Column names in the first row

In a Veritas cluster, when all high priority links fail, the low priority links are promoted to high priority in which manner?


Options are :

  • one at a time as required
  • in order by NIC name
  • in order as they appear in /etc/llttab
  • all simultaneously regardless of number

Answer : all simultaneously regardless of number

A power problem caused all nodes in the cluster to crash. One node has failed to reboot, and smoke is coming from the power supply. The administrator runs gabconfig -a and notices that port a has two of three nodes registered. What should the administrator do to start Veritas Cluster Server on the running nodes?


Options are :

  • edit /etc/llttab and change the -n3 option to -x
  • run hasys -force on one of the nodes to force HAD to start
  • run gabconfig -cx on both of the running nodes
  • run gabconfig -cx on one of the running nodes

Answer : run gabconfig -cx on one of the running nodes

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

What must a policy manager do when working with Exact Data Matching (EDM) indexes?


Options are :

  • Index the original data source on the detection server
  • Deploy the index only to specific detection servers
  • Re-index large data sources on a daily or weekly basis
  • Create a new data profile if data source schema changes

Answer : Create a new data profile if data source schema changes

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions