250-253 Administration of Veritas Cluster Server 6.0 Unix Set 5

What are three benefits that data loss prevention solutions provide that other security technologies or tools do not? (Select three.)


Options are :

  • Identify who has access to sensitive data
  • Indicate where sensitive data is being sent
  • Give visibility into where sensitive data is stored
  • Measure encryption strength for sensitive data
  • Give insight into capacity planning for sensitive data

Answer : Identify who has access to sensitive data Indicate where sensitive data is being sent Give visibility into where sensitive data is stored

An administrator needs to set up a service group dependency with the following characteristics: The parent group depends on the child group being offline on the same system. If the child group faults and fails over to a system on which the parent is running, the parent should switch to another system. Which type of dependency is this?


Options are :

  • Offline local
  • Offline parent
  • Offline remote
  • Offline home

Answer : Offline local

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 6

Which component do all Veritas Cluster Server agents use to communicate their status?


Options are :

  • LLT
  • IMF
  • HAD
  • GAB

Answer : HAD

What occurs when the hastop -local -force command is issued on the active node in a twonode active/passive cluster?


Options are :

  • The services will continue to run on the active node while HAD is stopped.
  • The service group behavior will follow the value of the EngineShutdown attribute while HAD is stopped.
  • The services will be shut down on the active node and brought up on the passive node.
  • The online service groups on the primary node are taken offline and remain offline until started manually

Answer : The services will continue to run on the active node while HAD is stopped.

An administrator has configured Veritas Cluster Server (VCS) to periodically back up configuration files when the configuration is left open for update. What will be the resulting file name when VCS backs up the main.cf files?


Options are :

  • main.cf.bak
  • main.cf.previous
  • main.cf.autobackup
  • main.cf.backup

Answer : main.cf.autobackup

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 11

When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?


Options are :

  • Set severity
  • Delete incidents
  • Export incidents
  • Add comments

Answer : Add comments

The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured. Where will Veritas Cluster Server look for the two trigger executables?


Options are :

  • $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2
  • $VCS_HOME/bin/triggers/websg/T1action1 $VCS_HOME/bin/triggers/websg/T1action2
  • $VCS_HOME/bin/websg/postoffline/T1action1 $VCS_HOME/bin/websg/postoffline/T2action2
  • $VCS_HOME/bin/postoffline/T1action1 $VCS_HOME/bin/postoffline/T2action2

Answer : $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2

A 2-node Veritas Cluster Server cluster has two dedicated Ethernet heartbeat links and I/O Fencing enabled. What will happen if both heartbeat links simultaneously fail?


Options are :

  • I/O Fencing takes over as the heartbeat mechanism.
  • One node panics and the other remains running.
  • Both nodes panic and reboot into the cluster
  • All service groups are frozen on both nodes

Answer : All service groups are frozen on both nodes

ST0-085 Symantec Security Information Manager 4.7 Technical Set 6

Which detection server requires the use of two network card ports?


Options are :

  • Endpoint Server
  • Network Prevent Server
  • Discover Server
  • Network Monitor Server

Answer : Network Monitor Server

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)


Options are :

  • Protect: Quarantine File
  • Network: Block HTTP/HTTPS
  • Protect: Copy File
  • Endpoint: Notify
  • Network: Remove HTTP/HTTPS Content
  • Endpoint: Block

Answer : Endpoint: Notify Endpoint: Block

Which file is created by vxfen startup script when I/O fencing starts?


Options are :

  • vxfentab
  • vxfendg
  • vxgabtab
  • vxfenmode

Answer : vxfentab

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 1

What does a data loss prevention solution help an organization identify? (Select three.)


Options are :

  • Illegally obtained software on desktops
  • Employee education opportunities
  • Unprotected content on laptops
  • Encryption enforcement opportunities
  • Risk of virus infection

Answer : Employee education opportunities Unprotected content on laptops Encryption enforcement opportunities

Where are the installation log files created when Veritas Cluster Server is installed?


Options are :

  • /var/VRTSvcs/install/logs/
  • /opt/VRTSvcs/install/logs/
  • /opt/VRTS/install/logs/
  • /var/VRTS/install/logs/

Answer : /opt/VRTS/install/logs/

What should an administrator do when the License Key expires?


Options are :

  • Enter a new key on the System Settings page
  • Enter a new key on the Advanced Settings page
  • Edit the key in the VontuManager.conf file
  • Edit the key in the Protect.properties file

Answer : Enter a new key on the System Settings page

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 12

What is a limitation of using the web-based installer?


Options are :

  • The server where the installation is launched must be the same operating system as the target system.
  • The Veritas XPortal Server process must be started on the target server.
  • The web-based installer can only be used to perform standard upgrades.
  • The server where the web browser is launched must be the same operating system as the target system.

Answer : The server where the installation is launched must be the same operating system as the target system.

What are two major functions of Low Latency Transport (LLT)? (Select two.)


Options are :

  • Cluster communications
  • Cluster membership
  • Broadcast message
  • Heartbeating
  • Traffic distribution

Answer : Heartbeating Traffic distribution

Where are configured Veritas Cluster Server triggers found using $VCS_HOME as the main Veritas Cluster Server directory?


Options are :

  • $VCS_HOME/bin
  • $VCS_HOME/triggers
  • $VCS_HOME/bin/triggers
  • $VCS_HOME

Answer : $VCS_HOME

250-254 Administration of Symantec Cluster Server 6.1 Test Set 6

Which two capabilities does the Veritas Cluster Manager Java console provide when used with the Veritas Cluster Server (VCS) Simulator and a simulated cluster that are unavailable when using the Veritas Cluster Manager Java console with a live cluster configuration? (Select two.)


Options are :

  • Remove a system
  • Fault a resource
  • Run a virtual firedrill
  • System power on and off
  • Copy a service group

Answer : Fault a resource System power on and off

Under normal conditions, Veritas Cluster Server agents are started and stopped automatically. Which command is required to manually start an agent?


Options are :

  • hatype
  • hastart
  • haagent
  • hares

Answer : haagent

Where does an incident responder find the exact matches that triggered an incident?


Options are :

  • Incident List
  • Incident Snapshot
  • Dashboard report
  • System Events report

Answer : Incident Snapshot

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 3

Which three describe an effective data loss prevention (DLP) program? (Select three.)


Options are :

  • DLP is primarily driven by the Incident Response Team.
  • DLP is a company-wide initiative.
  • Business stakeholders are held accountable for risk reduction.
  • Employee participation is important.
  • DLP is primarily driven by Information Security.

Answer : DLP is a company-wide initiative. Business stakeholders are held accountable for risk reduction. Employee participation is important.

Which environmental factors external to the nodes represent potential single points of failure that can be made highly available through redundancy? (Select two.)


Options are :

  • Operating system
  • Application software
  • Electrical power circuits
  • Networking components
  • Random access memory

Answer : Electrical power circuits Networking components

Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to "Modified"?


Options are :

  • incidents in which an SMTP email was changed to include a specified header
  • incidents in which confidential content resulted in a blocked Web mail
  • incidents in which confidential content was removed from a Web mail
  • incidents in which confidential content was removed from an SMTP email

Answer : incidents in which an SMTP email was changed to include a specified header

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 2

What is an advantage of using Endpoint Discover over Network Discover?


Options are :

  • Ability to scan many machines in parallel
  • Ability to pause an in-progress scan
  • Ability to schedule the scans
  • Ability to scan online machines

Answer : Ability to scan many machines in parallel

Which configuration has the lowest percentage of active nodes?


Options are :

  • active-active (2 nodes)
  • 6+2 (8 nodes with two spares)
  • 7+1 (8 nodes with one spare)
  • active-passive (2 nodes)

Answer : active-passive (2 nodes)

What is a situation that can be monitored by both Network Monitor and Endpoint Prevent?


Options are :

  • An employee uses a Chrome 2 browser to post confidential data to a newsgroup.
  • An employee uses AIM to send an instant message while off the corporate network
  • An employee uses Skype to send an instant message to a friend at a competitor site.
  • An employee uses Internet Explorer 7 to send confidential data from a Gmail account.

Answer : An employee uses Internet Explorer 7 to send confidential data from a Gmail account.

251-312 Administration of Symantec Backup Exec 12 for Exam Set 1

Which report helps a compliance officer understand how the company is complying with its data security policies over time?


Options are :

  • Policy Trend report, summarized by policy, then quarter
  • Policy report, filtered on date, and summarized by policy
  • Policy Trend report, summarized by policy, then severity
  • Policy report, filtered on quarter, and summarized by policy

Answer : Policy Trend report, summarized by policy, then quarter

Which three are examples of confidential data? (Select three.)


Options are :

  • National ID numbers
  • Health information
  • Manufacturing plant locations
  • CAD drawings
  • Published press releases

Answer : National ID numbers Health information CAD drawings

What is one function of a Network Discover scanner?


Options are :

  • It specifies the types of repositories that can be scanned.
  • It scans an organization's network to identify Network Discover targets
  • It sends collected content to the Enforce Server for processing.
  • It collects content and metadata from a variety of repositories.

Answer : It collects content and metadata from a variety of repositories.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

Which relational database management system (RDBMS) does Symantec Data Loss Prevention 9.0 support?


Options are :

  • Oracle
  • MySQL
  • Sybase
  • IBM

Answer : Oracle

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions