ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 4

See the following example of service groups: websg (SystemList sym1 = {= 0, Sym2 = 1} = 0 Automatic start AutoStartList = {} Sym2) webdg disc (Circular = webdg) IP webip (Device = eth0 address = 169.254.128.12 "NetMask =" 255.255.255.0 ") Monte webmnt (MountPoint =" / web1 "BlockDevice =" / DEV / vx / DSK / webdg / webvol "fsType = VxFS MountOpt FsckOpt = RW =" -y ") webnic NIC (Device = eth0) webproc Application (MonitorProgram = "/ usr / local / bin / web -monitor" StartProgram = "/ usr / local / bin / web -start" StopProgram = "transfers / usr / local / bin / web") requires webip webproc webproc requires webip webmnt requires webmnt webnic requires webdg What resource will start on the Internet for the last time?


Options are :

  • webproc
  • None
  • webdg
  • webmnt
  • webip

Answer : webip

Which three statements relate to the relationship between the server and the Apply Discovery servers? (Choose three.)


Options are :

  • By default, application server and communicate detection server on port 8100.
  • Servers can be configured to use any port higher than 1024.
  • IPSec must be configured on the server or servers ENFORCE detection.
  • Port 3389 should be open between the server and the detection enforce server.
  • The same port number must be used for all discovery servers.

Answer : By default, application server and communicate detection server on port 8100. Servers can be configured to use any port higher than 1024. The same port number must be used for all discovery servers.

250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 5

During testing, the administrator configures target Network Discover to identify and quarantine sensitive files. The target set with the default credentials that allowed read-only on the file server. After starting the scan and verify the results, the administrator finds several cases of scanning, but notes that all sensitive files are still in their original position and configured quarantine is empty (does not contain any of the confidential files). What are the two target Discover configuration errors can be the cause of the problem? (Pick one.)


Options are :

  • Share Quarantine / copy account are invalid.
  • Copy option is selected.
  • The default credentials are invalid.
  • Protect your credentials are not specified.
  • Sharelist exclude all host directories to be scanned

Answer : Share Quarantine / copy account are invalid. Protect your credentials are not specified.

Hunting for a server can leave the marker files for files moved to the quarantine location. What types of files keep their extension and its corresponding icon in the Marker file?


Options are :

  • All file types that are configured in Windows Explorer on the host server discovery
  • Microsoft Office documents
  • Specified file types in the file ProtectRemediation.properties
  • The text files, including source code in Java, C, and the script
  • None

Answer : Specified file types in the file ProtectRemediation.properties

This Network Monitor used to identify network traffic occurs in the non-standard port?


Options are :

  • The total size of the package
  • domain output
  • UDP or TCP
  • Protocol of Signature
  • None

Answer : Protocol of Signature

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 3

Since the incident defendant eliminating multiple incidents at the same time?


Options are :

  • None
  • When the automatic answer to report incidents List
  • By selecting the Find command similar to the accident Snapshot page
  • Selection page Smart Response Incident Snapshot
  • When you are choosing an intelligent response to reported incidents List

Answer : When you are choosing an intelligent response to reported incidents List

What are the two requirements for configuring I / O fencing disk array based on the supported storage? (Pick one.)


Options are :

  • Cluster File System Option included
  • LUN validated with hacf team -verify
  • LUNs can be seen in vxdisk list output
  • At least two private heartbeat links
  • Array SCSI3-PR is included

Answer : LUNs can be seen in vxdisk list output Array SCSI3-PR is included

What information must be specified when you add a resource to a service group?


Options are :

  • Attribute values
  • None
  • Service Group Name
  • name system
  • cluster identifier

Answer : Service Group Name

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

As a detection method is used for fingerprints and protect unstructured data, such as source documents or merger and acquisition documents?


Options are :

  • Matching Product Group (DGM)
  • the indexed documents (IDM)
  • Current Data Match (EDM)
  • corresponding content described (DCM)
  • None

Answer : the indexed documents (IDM)

In a cluster, making the following command screen? Hares -display -ovalues


Options are :

  • all the attributes of the default resources
  • all the attributes of an Internet resource
  • all resource attributes pending
  • None
  • all the attributes of resources overwritten

Answer : all the attributes of resources overwritten

What are the two types of resources that a proxy resources can relate to? (Pick one.)


Options are :

  • IP
  • quorum
  • ElifNone
  • NIC
  • DNS

Answer : ElifNone NIC

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 6

What happens when the DLP agent can not connect to its privileged endpoint server?


Options are :

  • If any endpoint server is running, the agent will connect automatically after a certain period of time.
  • If both endpoint server is running, and if the agent is configured to recognize the agent it is attached to it, after a certain period of time.
  • If a server, and if the agent is configured to recognize, the agent is attached to it after a certain period of time it is detected.
  • If any server in the detection system operates, the agent automatically connects to it after a certain period of time.
  • None

Answer : If both endpoint server is running, and if the agent is configured to recognize the agent it is attached to it, after a certain period of time.

Only two local units that are suitable for use as coordinator disks available for mutinode local cluster. Adding (CP) server coordination point where the two properties to maximize I / O fencing configuration resilience? (Pick one.)


Options are :

  • network connection according to the CP server cluster
  • A cluster node CP server is configured only with the LLT
  • Multi-CP server cluster node
  • Fencing I / O on the CP server cluster
  • A CP node server cluster with the GAB and LLT configured

Answer : network connection according to the CP server cluster Multi-CP server cluster node

What kind of resources creates a dependency between applications that are configured in different clusters Veritas Cluster Server?


Options are :

  • None
  • RemoteGroup
  • ghost
  • authority
  • request

Answer : RemoteGroup

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

What is the main advantage of installation and use with the Symantec Management Platform to manage DLP agents?


Options are :

  • Ability to view the status of the health agents
  • The ability to easily manage remote agents
  • None
  • The ability to change the filter configuration agent
  • The ability to control how to use agents

Answer : The ability to easily manage remote agents

What to consider before engaging the services Prevent Parallelism attribute violation (ProPCV) in the band?


Options are :

  • Mode for the value of the type of application resource IMF is set to 1.
  • MonitorProgram attribute must be set for the type of application resources.
  • MonitorProcesses attribute must be configured for this type of application resources.
  • Attribute ProPCV prevented changed when the service group is active.
  • None

Answer : MonitorProcesses attribute must be configured for this type of application resources.

What are the two characteristics must be present during the preparation of the application must be configured for high availability using Veritas Cluster Server? (Pick one.)


Options are :

  • Ability to work on multiple independent servers
  • procedures for start and stop Clear
  • The data stored on internal disk
  • Upgrade opportunities after the sudden failure
  • remote monitoring

Answer : Ability to work on multiple independent servers procedures for start and stop Clear

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

What are the two operating systems supported by Veritas Cluster Server? (Pick one.)


Options are :

  • OpenSUSE
  • Red Hat Enterprise Server
  • Mac OS
  • Aix
  • fedora

Answer : Red Hat Enterprise Server Aix

When you run a two-node cluster, thus making lltstat command show -nvv?


Options are :

  • Only LLTA information for controlled nodes Veritas Cluster Server, to be active
  • None
  • LLTA information for all nodes configured in the cluster
  • Only LLTA information for the node the command is executed on
  • LLTA information for any cluster nodes that are connected to the same switch

Answer : LLTA information for all nodes configured in the cluster

What are the two movements food sources must be used for Network Monitor? (Pick one.)


Options are :

  • LAN port on the router
  • VPN tunnel port on the router
  • switch port Port Analyzer (SPAN)
  • test access port (TAP)
  • channel port on the hub

Answer : switch port Port Analyzer (SPAN) test access port (TAP)

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

Where accident defendant and see all the actions that occurred during the incident?


Options are :

  • auditlog Table
  • action fall
  • System events
  • accident Snapshot
  • None

Answer : accident Snapshot

What product can replace the confidential documents that reside on a public campaign with a marker file that explains why this document has been deleted?


Options are :

  • Discover Network
  • preventing network
  • network security
  • None
  • network monitor

Answer : network security

What kind of resources are considered Veritas Cluster Server in determining the group's network services?


Options are :

  • persistent
  • On off
  • None
  • OnOnly
  • Nobody

Answer : On off

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 10

The administrator plans to configure the new service applications in a Veritas cluster. In the event of a crash, the company requires that the node with the lowest number of service groups running to be selected as the target failover. What failover policies administrator must implement in order to meet this requirement?


Options are :

  • circularly
  • quorum
  • None
  • a priority
  • prerequisites

Answer : circularly

Which network protection feature is a system administrator can configure?


Options are :

  • The marker file contents
  • None
  • The ability to copy files
  • Location of quarantined files
  • Ability to recover files

Answer : Ability to recover files

On some systems you can install UseMpathd = 1 MultiNICB resource?


Options are :

  • On HP-UX
  • Linux
  • Aix
  • Solaris
  • None

Answer : On HP-UX

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

What is typical for a program, to be grouped with Veritas Cluster Server?


Options are :

  • He must be able to store all data and configuration information needed on shared disks.
  • None
  • He should be able to copy the configuration information between nodes in the cluster.
  • He must be able to store all the necessary data on SATA disks
  • He should be able to control.

Answer : He should be able to control.

In a file system directory does not write PacketCapture rebuilt SMTP-message?


Options are :

  • drop_pcap
  • None
  • the fall
  • drop_ttd
  • drop_discover

Answer : drop_pcap

Which statement describes the agent DLP encryption feature?


Options are :

  • The key is randomly generated for a storage agent.
  • The system administrator can create a unique authentication key.
  • DLP Link Agent server uses Secure Socket Layer (SSL).
  • key size is standard and not configurable.
  • None

Answer : The system administrator can create a unique authentication key.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 6

During the installation of various severity levels, the level of which must be installed by default?


Options are :

  • None
  • The lowest level available in the system
  • The highest level available in the system
  • The lowest level of the policy manager wants to appoint
  • The highest level of policy manager wants to appoint

Answer : The lowest level of the policy manager wants to appoint

What is the main advantage of the implementation of intelligent monitoring functions framework for resources?


Options are :

  • The prevention of violations of parallelism
  • Resource Monitor running on remote clusters
  • resource monitoring, without the need for configuration
  • None
  • Immediate notification of the change of state resources

Answer : Immediate notification of the change of state resources

What actions are necessary for the maintenance of the group to work on all systems in the cluster at the same time?


Options are :

  • Running hagrp -Change [of] 1 parallel group services team and a group of the service will be automatically restarted on all systems
  • Stop the Veritas Cluster Server, edit main.cf so AutoStartList the service group attribute includes all the cluster system, and restart the VERITAS Cluster Server
  • Take line service group, add all cluster systems AutoStartList and lead group of new online services with the option -all
  • Stop the Veritas Cluster Server, edit the main.cf, to enable parallel attribute, add the entire cluster system to restart AutoStartList and VERITAS Cluster Server
  • None

Answer : Stop the Veritas Cluster Server, edit the main.cf, to enable parallel attribute, add the entire cluster system to restart AutoStartList and VERITAS Cluster Server

ST0-135 Symantec Network Access Technical Assesment Exam Set 4

What kind of resource enables Veritas Cluster Server attribute, to bring the resource online after it goes offline unexpectedly before faulting the resource?


Options are :

  • None
  • RetryLimit
  • AUTORESTART
  • AutoRestartLimit
  • RestartLimit

Answer : RestartLimit

Which Storage Foundation functions are used to send data changes on a remote server via the IP-based network?


Options are :

  • None
  • Storage Replicator
  • Volume Replicator
  • Replication Exec
  • NetBackup

Answer : NetBackup

Since the service group with all the resources on the Internet, what should be done to avoid that the top resource dependency tree to cause a failover when it is taken out of the cluster is not?


Options are :

  • None
  • Freezing resource
  • Install critical attribute for a resource to be 0
  • Disable links to resource dependencies
  • freezing units

Answer : Install critical attribute for a resource to be 0

ST0-085 Symantec Security Information Manager 4.7 Technical Set 4

The administrator configures other service applications in high availability. Logical IP address of the application will depend on the same service group ClusterService NIC, used. Data will be stored on raw devices. What types of resources should consider the administrator to configure the service group?


Options are :

  • None
  • Application, file system, volume, disk group, IP, Proxy
  • Application, volume, disk group, IP, Phantom
  • Application, volume, disk group, IP, Proxy
  • Application, File System, Volume, disk group, IP, NIC

Answer : Application, volume, disk group, IP, Proxy

The administrator is responsible for group split between two data centers in different locations. These mirror between two nodes. If an administrator wanted to install / O fencing I, as distribute the configuration to maximize sustainability?


Options are :

  • A SCSI-3 coordinator unit at the primary site, and two disks of the secondary site coordinator
  • None
  • A SCSI disk-3 on the main site coordinator, a coordinator of the drive at the secondary site, and third server coordination point
  • Two SCSI-3 coordinator disks on the primary site and the disc a coordinator in the secondary site
  • A point of coordination of the primary site server, and a coordination point server on the secondary node server and a point of coordination in third place

Answer : A SCSI disk-3 on the main site coordinator, a coordinator of the drive at the secondary site, and third server coordination point

As a detection method includes the right keywords?


Options are :

  • corresponding content described (DCM)
  • Current Data Match (EDM)
  • None
  • the indexed documents (IDM)
  • Matching Product Group (DGM)

Answer : corresponding content described (DCM)

250-371 Administration Symantec Net Backup 7.5 Windows Exam Set 8

What are the two characteristics of the resource VERITAS Cluster Server? (Pick one.)


Options are :

  • It allows only permanent resources by a parent
  • It has a single point of entry, which uses an agent to manage the resource
  • It allows circular dependencies without a clear starting point
  • Compliant hardware or software
  • It has a unique name in the whole group

Answer : Compliant hardware or software It has a unique name in the whole group

What are the service behavior of two predefined groups Veritas Cluster Server? (Pick one.)


Options are :

  • service groups migrate the system to intentionally turn off the system
  • Carpooling-Service startup cluster
  • Start of service groups in the attribute order SystemList
  • Auto-Service groups in the system, when all low-priority connection error
  • Launch of the service group in the order lexical

Answer : service groups migrate the system to intentionally turn off the system Carpooling-Service startup cluster

What roles Configuration tab is used to set user attributes that a specific role can view or change?


Options are :

  • General tab
  • Card Management Criteria
  • Access Card Case
  • board members
  • None

Answer : General tab

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

The log files are used to verify that the user application properly monitored are located in what directory?


Options are :

  • / Opt / VRTSvcs / agent / log /
  • None
  • / Var / VRTSvcs / Magazine /
  • / Var / VRTSvcs / agent / input /
  • / Opt / VRTSvcs / magazine /

Answer : / Opt / VRTSvcs / magazine /

Symantec Operations Readiness Tools (SORT) provides a service of what?


Options are :

  • It stores the operating system patches required to update.
  • It automates the installation of product updates
  • It manages the notification of the changes in the patch.
  • It supports common configuration files needed for disaster recovery.
  • None

Answer : It manages the notification of the changes in the patch.

What is characteristic of the web installer?


Options are :

  • None
  • It can be installed on different operating systems simultaneously.
  • It performs the same command-line installation commands.
  • It can be run using the Internet Explorer, Firefox or Safari.
  • This can be automated by using an answer file.

Answer : It performs the same command-line installation commands.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

The administrator is planning to move to a high availability of applications hosted locally. migration to shared storage data has been properly completed.Which two actions must be in accordance with the administrator to store to complete the setup application services? (Pick one.)


Options are :

  • customize MountPoint, BlockDevice, fstype and FsckOpt attributes for all file systems involved
  • to connect the resource application to file system resources through appropriate relationships
  • configure the operating system to automatically mount file systems involved
  • create a system of competing mechanism corresponding file in the correct sequence
  • reconfigure the operating system to automatically mount file systems involved

Answer : customize MountPoint, BlockDevice, fstype and FsckOpt attributes for all file systems involved reconfigure the operating system to automatically mount file systems involved

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions