ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 5

Which is a limitation of using CDS disk layout under VxVM 4. 0 or above?


Options are :

  • The CDS format cannot contain a private region and a public region on a single partition.
  • The CDS format cannot be used with hardware RAID controllers.
  • The CDS format cannot be used for boot disks.
  • The CDS format cannot be used in conjunction with OS-level partitioning.

Answer : The CDS format cannot be used for boot disks.

You are the administrator for the Veritas Volume Manger. You notice that the size of the disk group's configuration database in its private region is nearly full. You want to ensure that you do not lose any data from the disk group and are able to preserve the volume state. What should you do?


Options are :

  • Move the disk group
  • Spilt the disk groups
  • Try to grow the private region
  • Join the disk groups

Answer : Move the disk group

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

How would you define virtual storage?


Options are :

  • Virtual storage is a method of accessing data attached to another host.
  • Virtual storage is the practice of accessing storage systems by means of an opaque software facade.
  • Virtual storage is the practice of storing data on large storage arrays.
  • Virtual storage is a method of increasing disk I/O bandwidth.

Answer : Virtual storage is the practice of accessing storage systems by means of an opaque software facade.

You are working on Veritas Volume Manager. You need to create volume layout from multiple regions of one or more disks, if there is not enough space available for entire volume on a single region of a disk. You want to ensure that the volume that you create provides the flexibility to extend the volume to another disk. What should you do?


Options are :

  • Use RAID-5 volume
  • Use mirrored-stripe volume
  • Use mirrored volume
  • Use concatenated volume
  • Use striped volume

Answer : Use concatenated volume

You are responsible for managing Veritas Enterprise Administrator. You are in the process of creating a new disk group. You first initialize an unitialized disk and then create a new disk group using the disk you initialized. You want to ensure that this disk is mounted when you boot the system. What should you do next?


Options are :

  • Mount the volume
  • Verify the disk name in the Object Tree
  • Add the disk to the disk group
  • Create a new volume on the disk

Answer : Create a new volume on the disk

ST0-135 Symantec Network Access Control 12 Technical Exam Set 1

After installing Veritas Volume Manager for your large number of volumes, you will configure the volumes as per your requirement. But you find the performance is very slow. You need to reconfigure the volumes to achieve significant improvement in performance when there are multiple I/O streams. What should you do?


Options are :

  • Use RAID-5
  • Use Striping
  • Use Mirroring and Striping
  • Use Mirroring

Answer : Use Mirroring

Which structures are parts of the Cross-platform Data Sharing (CDS) format?


Options are :

  • A private region
  • An Operating System-reserved area
  • A Bad Block Relocation Area
  • A public region
  • A directory area

Answer : A private region An Operating System-reserved area A public region

Which object is used as a building block for a plex?


Options are :

  • A subdisk
  • A VxVM Disk
  • A physical disk
  • A Volume

Answer : A subdisk

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 5

You are managing a Storage Foundation 5. 0 server that has Storage Foundation Management Server (SFMS) software installed. You force a placement policy to a file system using the Storage Foundation Management Server (SFMS). What is the outcome when a policy is forced to a file system?


Options are :

  • The current policies of the file system are overwritten by the SFMS policies.
  • The file system will retain its policies and discard the SFMS policies.
  • The file system will apply the SFMS policies only in the case where its own policies cannot be assigned.
  • The file system will incorporate the changes of both the policies.

Answer : The current policies of the file system are overwritten by the SFMS policies.

While you are working on Storage Foundation for DB2, you want to convert the DB2 containers by executing the qio_convertdbfiles -u command. What will be the outcome of the command?


Options are :

  • It reports the defragment level for the Quick I/O files
  • It reports the concurrent fragmentation levels for database files listed in the mkqui.dat file.
  • It converts regular files to Quick I/O files.
  • It changes the Quick I/O files back to regular files.

Answer : It changes the Quick I/O files back to regular files.

You have installed the Storage Foundation for Sybase. You want to temporarily suspend all write operations to all databases. What should you do?


Options are :

  • Use the Concurrent I/O feature.
  • Use the Cached Quick I/O feature.
  • Use the Quiesce feature.
  • Use the Quick I/O feature.

Answer : Use the Quiesce feature.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 9

You have to recommend appropriate virtual storage configurations for use by specific classes of applications, based on the details of each application's I/O requirements. Your application generates large volumes of temporary data. The RAID configuration for temporary space should aim to maximize I/O throughput. You also need to ensure that there is no unnecessary space overhead. Which RAID layout should you use?


Options are :

  • RAID-5
  • RAID-1
  • RAID-0
  • RAID-1+0

Answer : RAID-0

You have installed all the features for Storage Foundation for DB2. On the VxFS file system, you execute a command /opt/VRTS/bin/qiomkfile -s 500m /db01/defile. What will be the outcome of this command?


Options are :

  • The command will create a 500 MB Quick I/O capable file.
  • The command will create a concurrent I/O capable file.
  • The command will terminate without providing any result.
  • The command will resize a Quick I/O file to 500 MB.

Answer : The command will create a 500 MB Quick I/O capable file.

When working on Storage Foundation 5. 0 on HP-UX, you are unable to log in to Veritas Enterprise Administrator. You have converted shadow passwords with long passwords. After converting to shadow password with long password, the users are unable to log into Veritas Enterprise Administrator. You check and ensure that the users are part of the vrtsadm group. Error" V-39-53247-3 Error while connecting to Server. The user name or password is incorrect. Please retype your user name and password, and try connecting to the server again." You want to ensure all users who are part of the vrtsadm group are able to log on to the Veritas Enterprise Administrator. What should you do?


Options are :

  • Change the Shadow password.
  • Retype the username and password
  • Apply appropriate patch to Veritas Enterprise Administrator.
  • Restart the Volume Manager.

Answer : Apply appropriate patch to Veritas Enterprise Administrator.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 3

You are managing a Storage Foundation 5. 0 server and want to capture an image of a file system at a selected instant for use in applications. Which feature will you use to capture the image?


Options are :

  • Veritas Volume Replicator
  • Configure the Veritas Storage Checkpoint option
  • Veritas FlashSnap Point-in-Time copy
  • Configure the Veritas Quick I/O option

Answer : Veritas FlashSnap Point-in-Time copy

You need to provide storage space for database application, including permanent data, temporary space, and activity log data. You need to ensure that the storage space that you provide offers data protection against disk failures. Which storage techniques will you use? (Each correct Answer presents part of the solution. Select two.)


Options are :

  • RAID-0
  • RAID-5
  • RAID-1
  • Concatenated
  • RAID-1+0

Answer : RAID-5 RAID-1

You are administering Veritas Volume Manager on the UNIX platform, and you need to remove the volume using vxassist command. Given the following steps: 1. Remove the volume entry from the /etc/vfstab file. 2. Remove all references to the volume by application programs. 3. Stop all Activity by VxVM on the volume using vxvol stop command. 4. Unmount the volume, which is mounted as a file system. What are the necessary sequential steps you need to follow before removing the volume?


Options are :

  • 2,4,3,1
  • 1,4,3,2
  • 4,2,1,3
  • 3,1,4,2

Answer : 3,1,4,2

250-254 Administration of Symantec Cluster Server 6.1 Test Set 7

What is a collection of VxVM disks that share a common configuration and are used to hold the data for a specific application or set of applications?


Options are :

  • Plex
  • Disk Group
  • Volume
  • Subdisk

Answer : Disk Group

You have just installed Storage Foundation 5. 0 with Veritas Volume Manager and Veritas File System. You want to ensure that you are able to successfully install Veritas FlashSnap Agent for Symmetrix 5. 0 on Storage Foundation server. What should you do to ensure you meet the required goal?


Options are :

  • Install Veritas Cluster File System.
  • Install Veritas Quick I/O.
  • Install Veritas Cluster Server.
  • Install Veritas Volume Replicator.

Answer : Install Veritas Cluster Server.

How does a volume created by VxVM appear in the operating system?


Options are :

  • As simple disks
  • As SAN disks
  • As physical disks
  • As remotely-hosted disks

Answer : As physical disks

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 7

You are using Veritas Enterprise Administrator (VEA) to create a volume set. You need to have e is a pre-requisite in place before you can create the new volume set. What should you do?


Options are :

  • Ensure that you have minimum 256 volumes to be configured in a volume set.
  • Ensure that the volume set is a raw I/O.
  • Ensure that the new volume is a /ext file system.
  • Ensure that you have at least one volume created.

Answer : Ensure that you have at least one volume created.

What is the correct ratio between sub volumes and a volume that will be used as a disk drive?


Options are :

  • 01:01
  • 01:00
  • 00:01
  • 01:02
  • 02:01

Answer : 01:01

You want to install the Veritas Enterprise Administrator to manage the Veritas Storage Foundation 5. 0 server installed. Before installing the Veritas Enterprise Administrator, you need to know the installation procedure. Given the following installation procedures: 1. Start the Veritas Enterprise Administrator Server on the system to be administered. 2. Start the Veritas Enterprise Administrator Client. 3. Install the Veritas Volume Manager on the system to be administered. 4. Install the Veritas Enterprise Administrator server and client on the system to be administered. What is the correct order of steps that you need to follow?


Options are :

  • 3,2,1,4
  • 3,4,1,2
  • 2,3,4,1
  • 2,1,4,3

Answer : 3,4,1,2

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

You have installed and configured Veritas Volume Manager on a UNIX server. You want to install and configure Veritas Enterprise Administrator (VEA) server to manage the VEA agents that you will be installing on Windows and UNIX client computers. You want to ensure you are able to successfully install VEA server. What should you do?


Options are :

  • Install VEA server on a remote server that needs to be administered.
  • Install a Windows server and install Java Runtime 1. 4 and then install VEA.
  • Install VEA on the server where Veritas Volume Manager is installed.
  • Install VEA server on each Storage Foundation 5. 0 server that needs to be administered.

Answer : Install VEA on the server where Veritas Volume Manager is installed.

An Oracle Enterprise database is having I/O performance issues. You need to determine the exact location of a data block on a disk that is a hot spot slowing down I/O performance. Which feature of Storage Foundation 5. 0 for Oracle will you use to perform this task?


Options are :

  • Veritas Extension for Oracle Disk Manager
  • Veritas Database FlashSnap feature
  • Veritas Storage Mapping feature
  • Veritas Storage Checkpoint feature

Answer : Veritas Storage Mapping feature

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 10

You are responsible for administering a server with mirrored volume layouts. You noticed that the last time the server was down, the server took longer than usual to resynchronize the mirrors. You want to make configuration changes on the server to reduce resynchronization timE. Which actions will you perform?


Options are :

  • Run the vxse_drl1 rule and plan configuration changes to eliminate any rule violations it reports.
  • Run the vxse_rootmir rule and plan configuration changes to eliminate any rule violations it reports.
  • Run the vxse_redundancy rule and plan configuration changes to eliminate any rule violations it reports.
  • Run the vxprint command, inspect the storage configuration manually, and write a plan to place dirty region logs on the three biggest volumes.

Answer : Run the vxse_drl1 rule and plan configuration changes to eliminate any rule violations it reports.

You are planning a relayout for a 10GB RAID-5 volume with a RAID-5 log to a stripe-mirror configuration. Dirty-region logging is indicated by the volume's sizE. How would you plan to address the logs?


Options are :

  • Use the "convertlogs" option of vxassist to cause the relayout job to convert the log plexes.
  • Relayout will remove log plexes from the volume, but the DRL must be created after relayout is complete.
  • Remove the RAID-5 log and create a DRL prior to the relayout operation.
  • The RAID-5 log should be removed prior to the relayout and after the relayout completes, the DRL should be created separately

Answer : The RAID-5 log should be removed prior to the relayout and after the relayout completes, the DRL should be created separately

You have designed a tiered storage environment using ISP volumes, created the disk group that will be used to hold the tiered volumes, and created the storage pool in the disk group. You are now ready to install the template definition file in the ISP configuration database that you have created. What should you do next?


Options are :

  • Use the vxdisk command to install your template definition file in the ISP configuration database.
  • Use the vxassist command to install your template definition file in the ISP configuration database.
  • Use the vxvset command to install your template definition file in the ISP configuration database.
  • Use the vxtemplate command to install your template definition file in the ISP configuration database.

Answer : Use the vxtemplate command to install your template definition file in the ISP configuration database.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 6

You need to create a traditional third-mirror breakoff snapshot in disk group "testdg" on a volume named "testvol". You've used the vxassist command to start the creation of the snapshot, synchronizing in the background. How do you determine whether the snapshot is ready?


Options are :

  • Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPDONE".
  • Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "ACTIVE".
  • Use "vxprint -g testdg testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".
  • Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPATT".

Answer : Use "vxprint -g testdg -ht testvol" to display the status of testvol, and check the STATE column of the vxprint output; if the snapshot plex is ready, its state will be "SNAPDONE".

You are auditing a current storage environment that is utilizing storage tiering. Based on the collected information from the audit, you want to define a policy to take into account that enterprise accounting, security, and regulatory compliance for specific set of files. Which policy factor should you use for the above scenario?


Options are :

  • Availability
  • Load Balancing
  • Expected access patterns
  • Business considerations

Answer : Business considerations

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions