ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

What are the two organization's recommendations must be followed when deploying Endpoint prevented? (Pick one.)


Options are :

  • Settings lock once deployed agents
  • Enable monitoring of many directions and protocols simultaneously
  • Configuration, testing and tuning of the filters
  • test agent of several images of the end users
  • Activate monitoring of the local file system of the first

Answer : Configuration, testing and tuning of the filters test agent of several images of the end users

What happens when hastop -All -Force performed?


Options are :

  • I and all the services under his control closed
  • Had it stopped, and all services are online
  • HAD remain online after the closing service
  • None
  • HAD stops with the strength of all the services and had off

Answer : Had it stopped, and all services are online

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 7

What is the point of entry agent are used to working with a virtual fire drill for a specific resource?


Options are :

  • Information
  • None
  • monitor
  • on line
  • act

Answer : act

What is the default behavior of retention of data on accidents for the network and prevent network monitor?


Options are :

  • Only attachments are stored.
  • Only the messages are stored.
  • The messages and attachments are stored.
  • The message or attachments are not saved
  • None

Answer : The messages and attachments are stored.

What are the three description of the program for effective prevention of data loss (DLP)? (Choose three.)


Options are :

  • DLP is the whole initiative of the company.
  • DLP is mainly due to information security.
  • Business stakeholders have a responsibility to reduce the risk
  • Employee participation is important.
  • DLP is mainly due to the Group to respond to unforeseen situations.

Answer : DLP is the whole initiative of the company. Business stakeholders have a responsibility to reduce the risk Employee participation is important.

ST0-135 Symantec Network Access Technical Assesment Exam Set 5

What are three good reasons to add comments about the incident? (Choose three.)


Options are :

  • To enable the next defendant understand the faster incident history
  • In order to ensure that the next item to the defendant the incident escalation
  • To enable the next defendant more quickly prioritize incidents for review
  • In order to provide parts for filtering reports
  • In order to provide details of the incident to the closure

Answer : To enable the next defendant understand the faster incident history In order to ensure that the next item to the defendant the incident escalation In order to provide details of the incident to the closure

The consultant helped with the installation of a user agent in the environment. Later, they sent the file to replace the on-line script to a user agent. If the user agent was called newapp, which will be located on-line file?


Options are :

  • etc / VRTSvcs / CONF / newapp / online
  • None
  • Opt / VRTSvcs / bin / Application / Online
  • Opt / VRTSvcs / bin / newapp / online
  • etc / VRTSvcs / CONF / Application / Online

Answer : Opt / VRTSvcs / bin / newapp / online

What database does not support Symantec Data Loss Prevention 9.0 for accidents and conservation policies?


Options are :

  • any version of Oracle 10g
  • Microsoft SQL Server
  • None
  • Oracle 10g version 10.2.0.1
  • Oracle 10g version 10.2.0.4

Answer : Oracle 10g version 10.2.0.4

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 5

As part of all Veritas Cluster Server agents use to communicate their status?


Options are :

  • LLT
  • GAB
  • I HAD
  • IMF
  • None

Answer : I HAD

If the system administrator can set the option in the throttling page Particular Endpoint Server?


Options are :

  • Section Monitoring Agent
  • Section Listener agent
  • None
  • filtering agent
  • CATEGORY agent configuration

Answer : CATEGORY agent configuration

What information should include the exact line data (EDM) The source of the data?


Options are :

  • name of the country, state or province
  • None
  • Numeric fields with less than five digits
  • date field
  • The column names in the first row

Answer : The column names in the first row

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

Refer to the following information: OnlineTimeoutInterval = 60 = 2 = 120 OnlineRetryLimit MonitorInterval RestartLimit = 0 What happens if an application requires 70 seconds to come online during the online process?


Options are :

  • The application will come online without any problems.
  • The application can not be brought into line and will try to switch to another node in the cluster.
  • None
  • The application will not work and try again.
  • Application Monitor timeout and cause an application fault-tolerant.

Answer : The application will not work and try again.

What is the position that can be monitored as the Network Endpoint Monitor and prevent?


Options are :

  • Employee use Internet Explorer 7 to send sensitive data from your Gmail account
  • Employee use AIM to send an instant message, and outside the corporate network.
  • Employee uses Skype to send an instant message to a friend on a competitor's website.
  • None
  • 2're using the Chrome browser, to publish sensitive data newsgroup

Answer : Employee use Internet Explorer 7 to send sensitive data from your Gmail account

What are the two attributes of the resource must be installed correctly to avoid an unplanned outage due to an incorrect configuration that may cause errors during the online process, the new resource? (Pick one.)


Options are :

  • AutoDisabled
  • included
  • MonitorOnly
  • autostart
  • critic

Answer : included critic

ST0-135 Symantec Network Access Technical Assesment Exam Set 2

With a resolution of incidents or deviations, Symantec recommends that the incident the accused fulfills what action?


Options are :

  • Set the severity
  • None
  • remove accidents
  • Add a comment
  • Export accidents

Answer : Add a comment

Where have followed the rules of intelligent GUI response? (Pick one.)


Options are :

  • Incident Report
  • Response Rules page
  • Dashboard reports
  • Incident Summary reports
  • Instant Accident Reports

Answer : Incident Report Instant Accident Reports

For cluster application with Veritas Cluster Server, the administrator must receive what license (s)?


Options are :

  • keyless license to use
  • demo license, at least one cluster node
  • A valid license to operate on all cluster nodes
  • perpetual licenses tied to the host system ID
  • None

Answer : A valid license to operate on all cluster nodes

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

Power problems are caused by all cluster nodes to fail. One of the sites failed to restart, and the smoke is coming from the power supply. The administrator manages gabconfig -a and recorded communications that have ported two of the three nodes. The administrator has to do is to start Veritas Cluster Server running on the nodes?


Options are :

  • edit / etc / Llttab and change -n3 -x option
  • gabconfig -cx run on one of the race nodes
  • hasys -Force performed on one of the nodes to make early HAD
  • None
  • gabconfig -cx run on both nodes running

Answer : gabconfig -cx run on one of the race nodes

GAB can be configured to automatically group through the seed of fencing I / O, even if some of the cluster nodes are not available. In which file should be configured to enable this parameter autoseed_gab_timeout function?


Options are :

  • Boss. cf.
  • None
  • gabtab
  • vxfentab
  • vxfenmode

Answer : vxfenmode

In addition to creating an automatic response legislation, the effect of which should be responsible for policy make it a rule to accomplish?


Options are :

  • Click the Adjust button to perform
  • Turn the response rules from the Settings page
  • None
  • Add a rule on the appropriate policy response
  • By allowing you to eliminate episodes of privileges in their respective roles

Answer : Add a rule on the appropriate policy response

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

What are the two main functions Low Latency Transport (LLT)? (Pick one.)


Options are :

  • cluster communication
  • cluster membership
  • traffic distribution
  • Heartbeat
  • Send a message

Answer : traffic distribution Heartbeat

What are the two types of standard VERITAS Cluster Server resource, you can determine if an application suddenly left? (Pick one.)


Options are :

  • authority
  • Process
  • ghost
  • request
  • FileOnOff

Answer : Process request

What function is a key advantage of the on-screen notification?


Options are :

  • It informs the system administrator when system specified events have occurred in the system.
  • It informs users that their endpoint DLP agent to be installed on their computers.
  • None
  • It shall inform the user endpoint when you are trying to copy or transfer confidential data from the endpoint.
  • It shall inform the endpoint user while scanning Discover endpoint identifies confidential files on their computers.

Answer : It shall inform the user endpoint when you are trying to copy or transfer confidential data from the endpoint.

The administrator has configured Veritas Cluster Server (VCS) periodically create a backup copy of the backup configuration file when the configuration remains open for updates. What will happen as a result of the file name when VCS supports main.cf file?


Options are :

  • main.cf.autobackup
  • main.cf.backup
  • main.cf.previous
  • main.cf.bak
  • None

Answer : main.cf.autobackup

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

What are three examples of sensitive data? (Choose three.)


Options are :

  • CAD drawings
  • production site factory
  • Press releases published
  • National identification number
  • Health Information

Answer : CAD drawings National identification number Health Information

The configuration with two sets which option allows the administrator to create two clusters Veritas?


Options are :

  • None
  • A site is running Oracle Solaris SPARC, and the other running Oracle Solaris x86.
  • A node is a virtual machine, and the other is physical.
  • A node is a NFS client to the NFS server to another node.
  • A site is running HP-UX and other Oracle Solaris.

Answer : A node is a virtual machine, and the other is physical.

Where the log files for installation is created when you install Veritas Cluster Server?


Options are :

  • / Var / VRTSvcs / install / logs /
  • None
  • / Opt / VRTS / install / logs /
  • / Var / VRTS / install / logs /
  • / Opt / VRTSvcs / install / logs /

Answer : / Opt / VRTS / install / logs /

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 5

What incidents appear in the list of network incidents, when the network filter is set to prevent the action of change?


Options are :

  • cases where the confidential content has been removed from the SMTP mail
  • cases where the confidential content has led to web mail blocked
  • None
  • cases where the SMTP e-mail address has been changed to include the header specified
  • cases where sensitive content is removed from the webmail

Answer : cases where the SMTP e-mail address has been changed to include the header specified

That attribute can be configured so that the group of new online services after persistent resource is in error and the other components are not available?


Options are :

  • None
  • OnlineRetry
  • AutoReset
  • AUTORESTART
  • autostart

Answer : AUTORESTART

What are the external environmental factors to the nodes represent a potential single point of failure, which can be made with high availability through redundancy? (Pick one.)


Options are :

  • operating system
  • RAM
  • network components
  • electric supply circuit
  • Software

Answer : network components electric supply circuit

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 3

What are the three functions of the communication architecture to ensure that the system is able to automatically repair must connect to is a network error between the discovery server and Enforcer server? (Choose three.)


Options are :

  • incident line
  • automatic synchronization
  • self control
  • database backup
  • Storage Warnings

Answer : incident line automatic synchronization self control

What is limiting the use of web-based setup?


Options are :

  • XPortal Veritas Process servers must be running on the target server.
  • None
  • Web installer can only be used to perform standard upgrades.
  • The server running the web browser must have the same operating system as the target system.
  • The server running the installation should be the same operating system as the target system.

Answer : The server running the installation should be the same operating system as the target system.

In a cluster, Veritas, when all ties with high priority fail, priority connects low-rise high priority in what order?


Options are :

  • the order they appear in the file / etc / llttab
  • one at a time, as required
  • at the same time, regardless of the number
  • order of NIC name
  • None

Answer : at the same time, regardless of the number

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

By default, the port forces a server to connect to all detection server?


Options are :

  • None
  • $ 443
  • $ 1,293
  • $ 8,000
  • $ 8,100

Answer : $ 8,100

What is the advantage to prevent data loss, Symantec Security 9.0 architecture?


Options are :

  • Communication initiated by the server discovery inside the firewall.
  • None
  • Endpoint Agent for Endpoint Communications Server uses the Triple Data Encryption Standard (3DES).
  • Encryption provides confidentiality of information through the system components.
  • Mutual authentication between servers based called Handshake Authentication Protocol (CHAP).

Answer : Encryption provides confidentiality of information through the system components.

hastatus command displays the nodes are in the state STALE_ADMIN_WAIT. What causes this condition?


Options are :

  • Main.cf contradictory on the cluster nodes.
  • There is a syntax error in the configuration file main.cf.
  • None
  • The main.cf file does not exist in the configuration directory.
  • The main.cf configuration file has been left open before restarting the NHS.

Answer : There is a syntax error in the configuration file main.cf.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 4

Admin application has led the application in offline mode by using Veritas Cluster Server, using rabbit -VNY team. If Cluster Administrator switches application service group to another node in the cluster which is a state of the application after a group of services switching nodes?


Options are :

  • None
  • on line
  • ripped
  • disconnected
  • in partial line

Answer : disconnected

What are three advantages that the solutions to prevent data loss require other security technologies or tools do not? (Choose three.)


Options are :

  • Give the impression that stores sensitive data
  • Specify where sensitive data is transmitted
  • To give you an idea of the capacity planning for sensitive data
  • Measurement level encryption of confidential
  • To determine who has access to confidential data

Answer : Give the impression that stores sensitive data Specify where sensitive data is transmitted To determine who has access to confidential data

Under normal circumstances, the Veritas Cluster Server agents are started and stopped automatically. Which team will have to manually start the agent?


Options are :

  • hares
  • hastart
  • None
  • haagent
  • hatype

Answer : haagent

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

What happens when the team hastop -local -force released the active node in twonode active / passive cluster?


Options are :

  • Services will be closed on the active node and raised on the passive node.
  • Services will continue to work on the active node, and they had stopped.
  • service group behavior will follow EngineShutdown attribute value until it was stopped.
  • None
  • The on-line service group on the primary node line and stay on the line until until manually started.

Answer : Services will continue to work on the active node, and they had stopped.

Which three are valid types of digitized content filter for Discover file system? (Choose three.)


Options are :

  • File Filter Holder
  • Read filter ACL
  • File Date Filter
  • File Filter Dimensions
  • Exclude filters

Answer : File Date Filter File Filter Dimensions Exclude filters

All users, regardless of their permissions roles are allowed to specify which two versions of statements? (Pick one.)


Options are :

  • Ability to select records to be displayed
  • The ability to print reports in PDF format
  • Possibility of eliminating accidents
  • Ability to set a default report
  • Ability to view user attributes

Answer : Ability to select records to be displayed Ability to set a default report

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

Because Network Monitor be configured to filter out the low-threat traffic?


Options are :

  • Since no other traffic will not be monitored until it is reached
  • None
  • In order to make sure that the filtration process is actually running
  • In order to ensure that CPU cycles are spent managing high traffic threats
  • Since the product is not able to filter out the high-threat traffic

Answer : In order to ensure that CPU cycles are spent managing high traffic threats

What kind of resource can be used to reflect the status of the other permanent resource?


Options are :

  • None
  • RemoteGroup
  • Mirror
  • ghost
  • authority

Answer : authority

What configuration has the lowest percentage of active nodes?


Options are :

  • an active-active (2 knots)
  • 6 + 2 (8 knots with two parts)
  • an active-passive (2 knots)
  • None
  • 7 +1 (8 knots with a spare one)

Answer : an active-passive (2 knots)

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 9

The administrator wants to change the name of an existing network adapter resource net0nic to net4nic. The resource is configured in a group websg service. What is the most effective way to rename a NIC resource?


Options are :

  • hares policeman net0nic net4nic hares -paste net4nic hares -delete net0nic
  • hares -ren net0nic net4nic
  • hares -add net4nic websg rabbits changing eth0 net4nic rabbits -Removed net0nic devices
  • None
  • hares -duplicate net0nic net4nic hares -delete net0nic

Answer : hares -add net4nic websg rabbits changing eth0 net4nic rabbits -Removed net0nic devices

As political director must write a policy to enforce the rules easily and effectively?


Options are :

  • rules Creating a new blank policy and add-set
  • The copying and editing an existing policy, if necessary
  • None
  • With the help of a model and change the necessary political
  • With the help of the matching policy data ID

Answer : With the help of a model and change the necessary political

2-node cluster Veritas Cluster Server has two dedicated Ethernet connection heart beat and I / O enabled fencing. What happens if both links heartbeat fail simultaneously?


Options are :

  • None
  • All groups of frozen services on both nodes.
  • I / O enclosure acts as a heartbeat mechanism.
  • A panic nodes and other remnants of the escape
  • Both nodes panic and reboot the computer in the cluster.

Answer : All groups of frozen services on both nodes.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

What is the reason for correct NFS clustering under the management of Veritas Cluster Server (VCS)?


Options are :

  • None
  • major number must be identical in all nodes of the cluster.
  • Logical IP address can be only one system.
  • NFS daemon must be running VCS.
  • Demon NFS can sometimes require a reboot

Answer : major number must be identical in all nodes of the cluster.

What is the recommended place for the implementation of Network Monitor?


Options are :

  • On the WAN side of the router company
  • In the demilitarized zone (DMZ)
  • None
  • In his isolated VLAN (Virtual LAN)
  • Inside the protected corporate network

Answer : In the demilitarized zone (DMZ)

Refer to the following configuration: DBSG groups (SystemList = {sym1 = 0, Sym2 = 1, sym3 = 2, sym4 = 3} SystemZones = {sym1 = 0, Sym2 = 0, sym3 = 1, sym4 = 1} autofailover = 2 ) what will the Veritas cluster Server (VCS) take DBSG fault, if it is available on SYM1?


Options are :

  • You restart the research group at a single site.
  • closed group VCS services.
  • service group fails over to another node in a different area.
  • service fails through group if another node exists in the same area.
  • None

Answer : service fails through group if another node exists in the same area.

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 11

What are the two pieces of information about database agents, if the administrator will know when the database is under the direction Veritas Cluster Server (VCS)? (Pick one.)


Options are :

  • They are set automatically, if the administrator selects the set "recommended" or "the whole package."
  • They are included in the package VRTSdbed for all installations.
  • Agent specific file type is automatically added to the VCS configuration after the administrator installs the agent manually.
  • They can be set manually using the utility distribution management software system
  • They must be installed on all fault-tolerant target systems, regardless of whether you work with the database.

Answer : They are set automatically, if the administrator selects the set "recommended" or "the whole package." They can be set manually using the utility distribution management software system

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions