250-253 Administration of Veritas Cluster Server 6.0 Unix Set 7

Which three functions of the communications architecture ensure that the system is able to automatically recover should a network connectivity failure occur between the detection servers and the Enforce Server? (Select three.)


Options are :

  • Automatic synchronizing
  • Database backup
  • Autonomous monitoring
  • Incident queuing
  • Alert archiving

Answer : Automatic synchronizing Autonomous monitoring Incident queuing

ST0-085 Symantec Security Information Manager Practice Exam Set 6

When architecting Coordination Point (CP) server into a Veritas Cluster Server (VCS) environment, what should be done to ensure the CP service remains online?


Options are :

  • configure multiple CP server instances on the same node
  • ensure that the CP server is backed up regularly
  • ensure that the CP server is on a reliable network
  • configure CP server as a resource in a VCS cluster

Answer : configure CP server as a resource in a VCS cluster

A newly created failover service group configured with resources remains offline when the cluster is started. Which attribute should an administrator investigate to determine why the service group remains offline?


Options are :

  • StartList
  • AutoStartPolicy
  • AutoStartIfPartial
  • AutoStartList

Answer : AutoStartList

Which attribute can be configured to allow a service group to come back online after a persistent resource has faulted and other nodes are unavailable?


Options are :

  • AutoRestart
  • AutoReset
  • AutoStart
  • OnlineRetry

Answer : AutoRestart

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

An administrator adds a new user within a cluster that is running in a non-secure mode. In which file will the user name be stored?


Options are :

  • /etc/VRTSvcs/conf/config/main.cf
  • /opt/VRTSvcs/conf/config/users.cf
  • /etc/VRTSvcs/conf/config/secure.cf
  • /etc/VRTSvcs/conf/config/types.cf

Answer : /etc/VRTSvcs/conf/config/main.cf

What is the recommended deployment location for Network Monitor?


Options are :

  • Inside the secured corporate LAN
  • On the WAN side of the corporate router
  • In its own isolated virtual LAN (VLAN)
  • Within the demilitarized zone (DMZ)

Answer : Within the demilitarized zone (DMZ)

Which agent entry point is used when running a virtual fire drill for a specific resource?


Options are :

  • Action
  • Online
  • Info
  • Monitor

Answer : Action

250-371 Administration Symantec Net Backup 7.5 Windows Exam Set 7

Where on the Endpoint Server Detail page can a system administrator configure the throttling option?


Options are :

  • Agent Listener section
  • Agent Configuration section
  • Agent Filtering section
  • Agent Monitoring section

Answer : Agent Configuration section

When a policy is applied for detection, how are exceptions evaluated?


Options are :

  • Detection rules then exceptions
  • Exceptions then response rules
  • Response rules then exceptions
  • Exceptions then detection rules

Answer : Exceptions then detection rules

Which three are valid Scanned Content filter types for the Discover File System target? (Select three.)


Options are :

  • File Size filter
  • Exclude filter
  • Read ACL filter
  • File Date filter
  • File Owner filter

Answer : File Size filter Exclude filter File Date filter

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 5

What is the default incident data retention behavior for Network Monitor and Network Prevent?


Options are :

  • Only attachments are retained.
  • Messages and attachments are retained.
  • Only messages are retained.
  • Neither messages nor attachments are retained.

Answer : Messages and attachments are retained.

A policy manager wants to apply policies only to certain employees with a specific classification level. Which TrueMatch detection method can help accomplish this?


Options are :

  • Indexed Document Matching (IDM)
  • Directory Group Matching (DGM)
  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)

Answer : Directory Group Matching (DGM)

An administrator wants to change the name of an existing NIC resource from net0nic to net4nic. The resource is configured in the websg service group. What is the most efficient method to rename the NIC resource?


Options are :

  • hares -ren net0nic net4nic
  • hares -duplicate net0nic net4nic hares -delete net0nic
  • hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic
  • hares -copy net0nic net4nic hares -paste net4nic hares -delete net0nic

Answer : hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?


Options are :

  • in the Marker File
  • in the System Event
  • in the Incident Snapshot
  • in the Discover Target configuration

Answer : in the Incident Snapshot

A system administrator can see basic incident data, but is unable to view any of the specific details of the incidents that are created. How is the role configured?


Options are :

  • The Edit option is deselected in the General tab.
  • Status and custom attributes are selected, but set to Edit.
  • The View option is selected, but Display Attributes are deselected.
  • Conditions are configured in the Incident Access tab.

Answer : The View option is selected, but Display Attributes are deselected.

There is a two-node Veritas cluster with two independent heartbeat connections, and fencing is disabled. What happens when one of the heartbeat connections is lost?


Options are :

  • The cluster will automatically configure a low-pri heartbeat over the public net
  • The cluster will disable service group failover on system fault.
  • The cluster will take all service groups offline until both heartbeats are restored.
  • The cluster will be fully functional, but will be unsupported.

Answer : The cluster will disable service group failover on system fault.

250-400 Administration Altiris Client Management Suite Exam Set 6

Which type of rule do incident responders use to remediate an incident?


Options are :

  • Smart Response rule
  • incident response rule
  • automated response rule
  • policy response rule

Answer : Smart Response rule

When should blocking of network transmissions and quarantining of exposed confidential files begin?


Options are :

  • After policies have been tuned for several months
  • Before enabling auto notifications
  • As soon as the baseline risk snapshot has been established
  • Within three months of deploying the system

Answer : After policies have been tuned for several months

The administrator is tasked with manually reconfiguring LLT heartbeats over UDP. Which two requirements must be met to make this possible? (Select two.)


Options are :

  • The VRTSvcsudp package must be installed.
  • Each NIC must have an IP address configured before configuring LLT.
  • The /etc/llttab file must be renamed to /etc/llttab.udp
  • The LLT private links must be on the same subnet.
  • Each link must have a unique, not well-known UDP port.

Answer : Each NIC must have an IP address configured before configuring LLT. Each link must have a unique, not well-known UDP port.

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 11

All users, regardless of their role permissions, are allowed to configure which two reporting options? (Select two.)


Options are :

  • Ability to set the default report
  • Ability to look up custom attributes
  • Ability to print reports to PDF
  • Ability to delete incidents
  • Ability to select reports to display

Answer : Ability to set the default report Ability to select reports to display

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions