ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 10

What information is recommended to include Exact Data Matching (EDM) data source?


Options are :

  • Country, region, or province names
  • date fields
  • None
  • The column headings in the first row
  • Numerical fields less than five digits

Answer : The column headings in the first row

What is the situation, which can be tracked as well as Network Monitor and Endpoint block?


Options are :

  • 2 The employee is using the Chrome browser to send confidential information to a newsgroup
  • None
  • The worker uses the AIM to send instant messages while out of a corporate network.
  • Employee use Internet Explorer 7 to send confidential information in your Gmail account
  • An employee uses Skype to send an instant message to a friend's competitor's site.

Answer : Employee use Internet Explorer 7 to send confidential information in your Gmail account

Once the policy is applied for the detection of the exceptions to be evaluated?


Options are :

  • None
  • Detection exceptions to the rules ago
  • Response exceptions to the rules ago
  • Exceptions to the rules, then the answer
  • Exceptions then detection rules

Answer : Exceptions then detection rules

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

Application Partner is brought through the application offline Veritas Cluster Server using the hares command of offline. If the cluster administrator switches the application service group to another node in the cluster, which is a state when the application service group connects the nodes?


Options are :

  • None
  • Away
  • defective
  • Online
  • partial online

Answer : Away

Which of the two standards Veritas Cluster Server resource types can determine if an application has suddenly disappeared? (Choose two.)


Options are :

  • ghost
  • application
  • Process
  • FileOnOff
  • power of attorney

Answer : application Process

GAB can be automatically configured seeds through a cluster of I / O walls, although some cluster nodes are available. Where the file whether autoseed_gab_timeout parameter must be specified for this feature?


Options are :

  • vxfenmode
  • gabtab
  • advertiser. CF
  • vxfentab
  • None

Answer : vxfenmode

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Under normal circumstances, Veritas Cluster Server agents to start and stop automatically. Every command is needed to manually start the agent?


Options are :

  • hastart
  • hatype
  • hares
  • None
  • haagent

Answer : haagent

The system administrator has configured the Veritas Cluster Server (VCS) to back up configuration files on a regular basis when the assembly is open for update. What is the file name of the VCS main.cf back up your files have been obtained?


Options are :

  • main.cf.autobackup
  • main.cf.bak
  • None
  • main.cf.previous
  • main.cf.backup

Answer : main.cf.autobackup

How to write a policy manager policies that adhere to compliance regulations efficiently and easily?


Options are :

  • By creating a new, empty policy and by increasing the fitting rules
  • By copying the existing practical and editing, if necessary,
  • Using the tag policy compliance data
  • By using policy template and editing if needed
  • None

Answer : By using policy template and editing if needed

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 9

Which three of describing an effective data loss prevention (DLP) program? (Choose three.)


Options are :

  • DLP is primarily driven by Incident Response Team.
  • Business stakeholders are responsible for reducing the risks
  • Employee participation is important.
  • DLP is a company-wide initiative.
  • DLP will primarily Security Agency.

Answer : Business stakeholders are responsible for reducing the risks Employee participation is important. DLP is a company-wide initiative.

Every True Match detection method to assess the level of the substance?


Options are :

  • Indexed Document Matching (IDM)
  • Described content matching (DCM)
  • None
  • Exact matching data (EDM)
  • Directory Group Matching (DGM)

Answer : Described content matching (DCM)

What is the default case of data retention behavior of Network Monitor and network block?


Options are :

  • Only attachments are preserved.
  • None
  • Only messages remain.
  • Neither of the messages or attachments are stored
  • Messages and attachments are preserved.

Answer : Messages and attachments are preserved.

ST0-135 Symantec Network Access Controls Technical Exam Set 6

What two recommendations will be the organization complies with the introduction of Endpoint block? (Choose two.)


Options are :

  • Set up blocking when the substances are in use
  • Define, test, and tune filters
  • To test the agent in a variety of end-user images
  • the local file system can be monitored first
  • Can be monitored to many destinations and protocols at the same time

Answer : Define, test, and tune filters To test the agent in a variety of end-user images

What is the recommended place for the introduction of Network Monitor?


Options are :

  • Within the demilitarized zone (DMZ)
  • WAN side of the router business
  • None
  • In their own isolated virtual local area network (VLAN)
  • Within the secured corporate LAN

Answer : Within the demilitarized zone (DMZ)

What do all the component of Veritas Cluster Server agents use to communicate their position?


Options are :

  • GAB
  • LLT
  • The IMF
  • None
  • HAD

Answer : HAD

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

A policy manager wants to apply policies only to certain employees a certain level of classification. Every True Match detection method can help you accomplish this?


Options are :

  • Described content matching (DCM)
  • Indexed Document Matching (IDM)
  • None
  • Directory Group Matching (DGM)
  • Exact matching data (EDM)

Answer : Directory Group Matching (DGM)

Every feature is the key benefit of a notification on the screen?


Options are :

  • It shall inform the administrator as they are defined in the system has occurred in the system.
  • It informs users when the endpoint Endpoint Discover the scan will identify confidential files on their computers.
  • None
  • It informs users that the endpoint DLP agent has just been installed on their computers.
  • It shall inform the end-point users when they try to copy or transmit confidential information about the endpoint.

Answer : It shall inform the end-point users when they try to copy or transmit confidential information about the endpoint.

Where are the installation log files are created when the Veritas Cluster Server is installed?


Options are :

  • / Opt / VRTSvcs / install / logs /
  • / Opt / VRTS / install / logs /
  • / Var / VRTSvcs / install / logs /
  • / Var / VRTS / install / logs /
  • None

Answer : / Opt / VRTS / install / logs /

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 3

What are the two main functions Low Latency Transport (LLT)? (Choose two.)


Options are :

  • Cluster communication
  • Cluster membership
  • Heartbeating
  • sharing traffic
  • Broadcast Message

Answer : Heartbeating sharing traffic

Which environmental factors are outside the nodes represent potential single points of failure, which can be very through dismissals? (Choose two.)


Options are :

  • network components
  • Operating system
  • The electrical power circuits
  • The application program
  • RAM

Answer : network components The electrical power circuits

What is the limitation of using a web-based installation program?


Options are :

  • Veritas XPortal server process has started the server.
  • The server is started if the body must have the same operating system as the target system.
  • None
  • Web-based installer can only use standard updates.
  • The server where the web browser is started must have the same operating system as the target system.

Answer : The server is started if the body must have the same operating system as the target system.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 2

Which two resource properties must be properly set to prevent an unplanned outage due to incorrect assembly that could result in a fault during a new online resource to process? (Choose two.)


Options are :

  • Monitor Only
  • in use
  • critical
  • automatic start
  • AutoDisabled

Answer : in use critical

Where GUI Smart Response rules are implemented? (Choose two.)


Options are :

  • Reports Snapshot reports
  • Response Policy page
  • Case Summary Reports
  • dashboard reports
  • Case List Reports

Answer : Reports Snapshot reports Case List Reports

The administrator wants to change the name of the NIC resource exists net0nic and net4nic. Resource websg specified service group. What is the most effective way to name the NIC resource?


Options are :

  • None
  • #NAME?
  • hares -ren net0nic net4nic
  • hares copy net0nic net4nic hares hares paste net4nic -Delete net0nic
  • hares -duplicate net0nic net4nic hares -Delete net0nic

Answer : #NAME?

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

failover service group configured with the new resources created will remain offline when the cluster is started. Every attribute should consider the administrator to find out why the service group remains offline?


Options are :

  • None
  • Auto Start List
  • Auto Start Policy
  • Final
  • AutoStartIfPartial

Answer : Auto Start List

There are two node configuration, which option allows the system administrator to form Veritas Cluster couple?


Options are :

  • One node is NFS client to the other node in the NFS server.
  • One node acts as HP-UX and other Oracle Solaris.
  • Each node runs Oracle Solaris SPARC, and the other runs Oracle Solaris x86.
  • None
  • One of the nodes is a virtual machine, and the other is physical.

Answer : One of the nodes is a virtual machine, and the other is physical.

the problem of the power of all nodes in the cluster to crash. One of the nodes is not born again, and the smoke coming from the power supply. The administrator works gabconfig -a and note that the port has two three knots registered. What should the administrator do to start Veritas Cluster Server running on the nodes?


Options are :

  • gabconfig drive CX one active nodes
  • gabconfig drive CX and running nodes
  • run hasys -Force one of the nodes of the force had to start
  • None
  • edit the / etc / llttab and change the option -N 3 -x

Answer : gabconfig drive CX one active nodes

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

What happens when hastop -Local -Force command is given twonode active node active / passive cluster?


Options are :

  • The service group behavior followed by the value of the attribute EngineShutdown again been stopped.
  • Services will continue to operate the active node when it was stopped.
  • The services will be shut down the active node and passive node grown.
  • None
  • The online service groups to the primary node is taken offline and remain offline until manually started.

Answer : Services will continue to operate the active node when it was stopped.

Hastatus command shows the nodes are STALE_ADMIN_WAIT mode. What is the cause of this condition?


Options are :

  • There is a syntax error in the configuration file main.cf.
  • The configuration file main.cf was left open before restarting the GAB.
  • None
  • Main.cf inconsistent on the nodes in the cluster.
  • Main.cf havent file in the directory.

Answer : There is a syntax error in the configuration file main.cf.

Which three are examples of confidential information? (Choose three.)


Options are :

  • Identity card numbers
  • The production plant locations
  • CAD drawings
  • published press releases
  • health information

Answer : Identity card numbers CAD drawings health information

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions