ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 1

How the incident the defendant to reinstate the number of cases at the same time?


Options are :

  • By selecting the Smart Response Incident list report
  • By selecting auto-reply on the Incident list report
  • Choosing Find a similar command on my Snapshot Incident
  • Choosing Smart Response incident my Snapshot
  • None

Answer : By selecting the Smart Response Incident list report

251-312 Administration of Symantec Backup Exec 12 for Exam Set 4

What are the two sources of input traffic should use Network Monitor? (Choose two.)


Options are :

  • tunneled port VPN router
  • Switched Port Analyzer (SPAN) port
  • LAN port
  • Interface (TAP)
  • trunking port hub

Answer : Switched Port Analyzer (SPAN) port Interface (TAP)

Which is characterized by a web-based installation program?


Options are :

  • It can be installed on multiple operating systems at the same time.
  • It can automate the response file.
  • It can be used with Internet Explorer, Firefox, or Safari.
  • None
  • It runs the same commands as the command-line installation program.

Answer : It runs the same commands as the command-line installation program.

During testing, the network administrator to determine the surrounding area of ??the target to identify and isolate the confidential files. The aim is to set up the Default account data that is read-only permissions on the file server. After completion of the scan and check the results, the administrator will find a number of cases from the scan, but points out that confidential files are still in their original locations, and configure the quarantine directory is empty (contains no confidential files). Which two look at the target configuration errors can cause the problem? (Choose two.)


Options are :

  • Copy option is selected.
  • Protect your account information is unspecified.
  • Default user information is incorrect.
  • The quarantine / Share Copy user information is incorrect.
  • Stock list excludes all directories scanning host

Answer : Protect your account information is unspecified. The quarantine / Share Copy user information is incorrect.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 5

The system administrator is planning to set up a new application Veritas Cluster service. In the case of application failure, a company requires the node with the least progress selected for the failover service target. Every failover policy should be an administrator to implement in order to achieve this requirement?


Options are :

  • quorum
  • priority
  • None
  • qualifications
  • Round Robin

Answer : Round Robin

Two of them by default behavior of Veritas Cluster Server service groups? (Choose two.)


Options are :

  • AutoDisable system, service groups, while all low priority links fail
  • Starts lexical service groups in order
  • AutoDisable cluster service groups immobilizer
  • Starts the sequence of service groups attribute System List
  • Move to service groups intentional system shutdown

Answer : AutoDisable cluster service groups immobilizer Move to service groups intentional system shutdown

The two can be taken, whether the application is clustered with Veritas Cluster Server (VCS) has successfully started or stopped? (Choose two.)


Options are :

  • Examine the online log file
  • View Application_A.log file
  • Examine the engine log file
  • View Log Desk from the VCS Java GUI
  • View the Security log VCS Java GUI

Answer : Examine the engine log file View Log Desk from the VCS Java GUI

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 1

Which data points should be the organization to scan first?


Options are :

  • Password-protected shares
  • regionalized archives
  • centralized archives
  • An Individual directories
  • None

Answer : centralized archives

The system administrator is responsible for the cluster divided into two different locations of data centers. Data is mirrored between the two sites. If the administrator wants to set up I / O fencing, how should the assembly be introduced to maximize resilience?


Options are :

  • Dual SCSI-3 at the primary coordinator of the plates and one plate is the secondary coordinator
  • One of the SCSI-3 at the primary coordinator of the disc and the two discs of the secondary coordinator
  • One of the SCSI-3 disk at the primary site coordinator, one coordinator disk is secondary, and Coordination Point Server-third site
  • One of the Coordination Point Server at the primary site, and one of the co-ordination Point secondary server, and one third of the Coordination Point Server site
  • None

Answer : One of the SCSI-3 disk at the primary site coordinator, one coordinator disk is secondary, and Coordination Point Server-third site

To which the system can set the UseMpathd = 1 is MultiNICB resource?


Options are :

  • AIX
  • None
  • Linux
  • HP-UX
  • Solaris

Answer : HP-UX

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 7

Although the Veritas Cluster Server supports cluster nodes are used in different hardware or operating system versions, this is possibly desirable for two reasons which? (Choose two.)


Options are :

  • Cluster upgrades
  • network interface
  • the functional complexity
  • user safety
  • Inability to handle failover load

Answer : the functional complexity Inability to handle failover load

Which two features of the application is a must, in order to make high availability using Veritas Cluster Server? (Choose two.)


Options are :

  • The ability to monitor the application in each case independently
  • The ability to disconnect users from the application
  • The ability to notify the administrator of state
  • The ability to install shared storage
  • Ability to whether the application is running

Answer : The ability to monitor the application in each case independently Ability to whether the application is running

When setting different severity levels, at what level should be set as the default?


Options are :

  • The lowest level of the policy manager wants to move
  • The lowest level of the system available
  • Highest available in the system
  • None
  • Supreme leader-level policy wants to give

Answer : The lowest level of the policy manager wants to move

250-352 Administration of Storage Foundation and HA 6.0 Test Set 1

An administrator is configuring another application service high availability. Application logic IP address of the NIC to use to use the same Cluster Service service group. Data is stored in the raw devices. What types of resources should be determined by the administrator to consider the service of a group?


Options are :

  • Application, File System, Volume, Disk Group, IP, Proxy
  • The application, Volume, Disk Group, IP, Proxy
  • The application, Volume, Disk Group, IP, Phantom
  • None
  • Application, File System, Volume, Disk Group, IP, NIC

Answer : The application, Volume, Disk Group, IP, Proxy

Given service group with all resources online, what you should do to get to the top of the resource dependency tree pose fault tolerance when it is taken offline outside the cluster?


Options are :

  • To freeze the knot
  • freeze resource
  • None
  • Removes the dependency on the resource links
  • Set the Critical attribute of the resource 0

Answer : Set the Critical attribute of the resource 0

What is the feature of keyless licensing?


Options are :

  • It must be turned on before installing the Veritas Cluster Server
  • It requires an unobstructed Veritas Operations Manager (VOM) server.
  • None
  • It works on all versions of Veritas Cluster Server
  • It requires that at least one key installed in each cluster master.

Answer : It requires an unobstructed Veritas Operations Manager (VOM) server.

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

Log files are used to verify that a custom application is properly monitored are located in what directory?


Options are :

  • None
  • / Var / VRTSvcs / agent / log /
  • / Var / VRTSvcs / log /
  • / Opt / VRTSvcs / log /
  • / Opt / VRTSvcs / agent / log /

Answer : / Opt / VRTSvcs / log /

Symantec Operational Readiness Tools (SORT) provides what service?


Options are :

  • It automates the installation of product updates
  • None
  • It stores the operating system patches needed for the upgrade.
  • It manages notifications of changes in the patch.
  • It is necessary to maintain the common configuration files Disaster Recovery.

Answer : It manages notifications of changes in the patch.

How does an administrator to verify that the Network Monitor Server is healthy?


Options are :

  • examining the results of the Environmental Protection Act Check Utility (ECU)
  • By checking the incident message queue and the waiting time to the system overview page
  • Figuring out the system warning message to e-mails generated or received
  • None
  • By checking the details of the configuration of the System Settings page

Answer : By checking the incident message queue and the waiting time to the system overview page

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

Which feature of Veritas Cluster Server attributes using the public interface is different for each cluster systems?


Options are :

  • None
  • local
  • custom
  • global
  • power of attorney

Answer : local

What must be taken into account before allowing the blocking Concurrency breach (ProPCV) attribute of the service group?


Options are :

  • MonitorProcesses attribute is set to Application publication category.
  • Monitor Program attribute is set to Application publication category.
  • Status value of the IMF feature in the application type resource is set to 1.
  • ProPCV attribute prevent change when the service group is active.
  • None

Answer : MonitorProcesses attribute is set to Application publication category.

What type of resources to consider when deciding on Veritas Cluster Server service group is online?


Options are :

  • None
  • Nothing
  • OnOnly
  • persistent
  • OnOff

Answer : OnOff

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 2

Every detection method is used for fingerprinting and protect unstructured data, such as source documents or merger and acquisition documents?


Options are :

  • Indexed Document Matching (IDM)
  • Described content matching (DCM)
  • None
  • Directory Group Matching (DGM)
  • Exact matching data (EDM)

Answer : Indexed Document Matching (IDM)

Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?


Options are :

  • HAD
  • LLT
  • GAB
  • The IMF
  • None

Answer : HAD

Every resource type attribute enables Veritas Cluster Server to bring the resource online after it goes offline unexpectedly before faulting the resource?


Options are :

  • AutoRestartLimit
  • None
  • RestartLimit
  • Automatic restart
  • RetryLimit

Answer : RestartLimit

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

Two of which are features of Veritas Cluster Server Resource? (Choose two.)


Options are :

  • Allows only permanent resources to be older
  • Enables cyclic dependencies without a clear starting point
  • There is a single point of contact that the agent used to control the resource
  • Reply to this part of the hardware or software
  • It is a unique name for the entire cluster

Answer : Reply to this part of the hardware or software It is a unique name for the entire cluster

The system administrator is planning to move locally hosted application high availability. For data transfer is the shared storage has been correctly completed.Which two actions are carried out by the storage administrator to complete the application service? (Choose two.)


Options are :

  • unconfigure the operating system automatically connect to a file networks
  • Specify the mount point, Block Device, fstype and FsckOpt attributes of all files included
  • Page application resource file system resources, the appropriate dependencies
  • configure the operating system automatically connect to a file networks
  • to set up a proper mechanism to file claims in the correct order

Answer : unconfigure the operating system automatically connect to a file networks Specify the mount point, Block Device, fstype and FsckOpt attributes of all files included

When you run a two-node cluster, which makes lltstat -nvv command displays?


Options are :

  • Only the CBM node information command has been dismissed
  • None
  • LLT information for any cluster nodes connected to the same switch
  • LLT information on all configured nodes in the cluster
  • Only LLT information nodes to check Veritas Cluster Server to be active

Answer : LLT information on all configured nodes in the cluster

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 3

Which of the two requirements for configuring disk-based I / O fencing supported storage systems? (Choose two.)


Options are :

  • LUN validated by hacf to ensure the accuracy of the information command
  • Panels, SCSI3-PR use
  • Cluster File System Option Off
  • LUN visible vxdisk list output
  • At least two private heartbeat links

Answer : Panels, SCSI3-PR use LUN visible vxdisk list output

Veritas Cluster Server (VCS) includes a disk-based I / O fencing mechanism. Thinking specifically for data discs, two of which cluster configuration must be completed to implement this? (Choose two.)


Options are :

  • Application using the plates need to take care VCS Application publication category.
  • The disks must have Veritas Volume Manager disk group.
  • The disks must be at least one of the * .dbf file.
  • The service, which includes plates must be on the IP resource.
  • The wafers are treated VCS Disk Group resource type.

Answer : The disks must have Veritas Volume Manager disk group. The wafers are treated VCS Disk Group resource type.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions