ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 11

What are the three advantages that data loss prevention solutions by other security techniques or tools are not? (Choose three.)


Options are :

  • To measure the strength of the encryption of sensitive data
  • Give insight into capacity planning of sensitive information
  • Enter the visibility of where sensitive data is stored
  • Identify who has access to confidential information
  • Indicates where sensitive information is sent

Answer : Enter the visibility of where sensitive data is stored Identify who has access to confidential information Indicates where sensitive information is sent

All users, regardless of their role permissions can configure which of the two reporting options? (Choose two.)


Options are :

  • The ability to choose to display reports
  • The ability to eliminate safety hazards
  • The ability to print reports in PDF
  • The ability to set a default report
  • The ability to search your own attributes

Answer : The ability to choose to display reports The ability to set a default report

What two pieces of information from the database operators should be aware of when placing an administrator of the database under the Veritas Cluster Server (VCS) monitoring? (Choose two.)


Options are :

  • They can be installed manually with the operating system software distribution utilities
  • Agent-specific types of files are automatically added to the VCS configuration after the system administrator to install agents manually.
  • They are included in VRTSdbed supplied with the installation options.
  • They will be automatically installed if the system administrator selects a "recommended" or "all the package" series.
  • They must be installed on all the failover target systems regardless of whether they are run in the database.

Answer : They can be installed manually with the operating system software distribution utilities They will be automatically installed if the system administrator selects a "recommended" or "all the package" series.

ST0-135 Symantec Network Access Controls Technical Exam Set 5

In Veritas Cluster, after all the high-priority links fail, the low-priority links promoted to priority, in what way?


Options are :

  • one at a time as needed
  • to name Nic
  • the order in which they appear in the / etc / llttab
  • all at the same time regardless of the number
  • None

Answer : all at the same time regardless of the number

Where is the Endpoint Server Detail page to the system administrator to determine the throttling option?


Options are :

  • None
  • Agent Monitoring section
  • Agent Configuration section
  • Agent Listener section
  • Agent Filtering section

Answer : Agent Configuration section

What is the consideration for NFS properly settled under the Veritas Cluster Server (VCS) monitoring?


Options are :

  • NFS daemon restart may be required from time to time
  • Major device numbers must be the same in all clustered nodes.
  • The logical IP addresses must be only one system.
  • NFS daemon must be started with VCS.
  • None

Answer : Major device numbers must be the same in all clustered nodes.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

A 2-node Veritas Cluster Server cluster has two dedicated Ethernet heartbeat connections and I / O Fencing in use. What happens if both of the heartbeat links simultaneously fail?


Options are :

  • All Groups service will be suspended in both nodes.
  • Both the nodes and the panic started cluster.
  • I / O Fencing power as the heartbeat mechanism.
  • None
  • One node panics and other remnants of progress

Answer : All Groups service will be suspended in both nodes.

Why Network Monitor is arranged to filter out the low-threat traffic?


Options are :

  • For any other traffic will be monitored until this has been completed
  • Since the product is able to filter out high-threat traffic
  • None
  • In order to ensure that the filtering process is actually working
  • To ensure that the CPU cycles consumed in processing high-threat traffic

Answer : To ensure that the CPU cycles consumed in processing high-threat traffic

Websg service group is a network node sym1. Dbsg service group is a network node sym2. No fencing is determined. One of the two heartbeat links are down to 30 minutes. The cable is disconnected from the last heartbeat link. What happens dbsg service group?


Options are :

  • None
  • It goes to the fault state
  • It remains sym2.
  • It moved sym1
  • It also begins sym1.

Answer : It remains sym2.

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 6

Which of the three products support virtualization and virtual machines can be run? (Choose three.)


Options are :

  • Network Monitor
  • Discover network
  • Endpoint Discover
  • Network Prevent (Web)
  • Network Prevent (Email)

Answer : Discover network Network Prevent (Web) Network Prevent (Email)

Every command allows the administrator to leave the services currently Veritas Cluster Server running control mode, the performance of lineup changes?


Options are :

  • haconf -All -evacuate
  • haconf -All -Force
  • None
  • hastop -All -evacuate
  • hastop -All -Force

Answer : hastop -All -Force

What are two answers to the rule action should be avoided Exact Data Matching (EDM) policy? (Choose two.)


Options are :

  • Protect: The quarantine files
  • Endpoint: Block
  • Online: Block HTTP / HTTPS
  • Endpoint: Report
  • Network: Remove HTTP/HTTPS Content
  • Protect: Copy the file

Answer : Endpoint: Block Endpoint: Report

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 13

Which type of installation requires the most additional memory to force the server machine to host multiple server instances?


Options are :

  • two-stage
  • one-storeyed
  • None
  • Three-tier
  • Separate

Answer : one-storeyed

When configured by default Veritas Cluster Server Notifier to receive a schedule of queued messages every how many minutes?


Options are :

  • Three
  • Ten
  • Five
  • None
  • One

Answer : Three

What are two reasons to implement SCSI-3 I / O fencing? (Choose two.)


Options are :

  • membership of the Arbitration
  • the lock plate
  • data protection
  • Disk-based heart rate
  • cluster communication

Answer : membership of the Arbitration data protection

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 6

Those two products needed to replace the coordinator disk when the cluster is online? (Choose two.)


Options are :

  • Run vxfenadm command replaces the deleted LUN
  • Change the LUN and create a disk Veritas Volume Manager (VxVM) Disk
  • Run installvcs -fencing remove command to replace LUN
  • Change the LUN and create a disk Logical Volume Manager (LVM) Disk
  • Change the LUN and create a slide either VxVM or LVM Disk

Answer : Change the LUN and create a disk Veritas Volume Manager (VxVM) Disk Run installvcs -fencing remove command to replace LUN

According to which the left-hand side of the high-level node administrators can find the System Events report?


Options are :

  • reports
  • administration
  • policy
  • System Health
  • None

Answer : administration

Two clusters are both running the same operating system and the version of Veritas Cluster Server. a group of service in one cluster, depends on the service group in another cluster. What method can manage the service group relationship?


Options are :

  • Cross Cluster trigger
  • Remote trigger Group
  • Remote agent Group
  • Remote Cluster agent
  • None

Answer : Remote agent Group

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 1

Application Header resource is configured to monitor the Intelligent Monitoring System. By the resource attribute would be determined solely in order to prevent Concurrency property of the resource type Application?


Options are :

  • MonitorProcesses
  • pid-files
  • Start Program
  • None
  • Monitor Program

Answer : MonitorProcesses

The administrator stopped Veritas Cluster Server (VCS) is a node sym1 remove it from the cluster. When you are trying to make this hasys -Delete sym2 command, an error message will be displayed. What is the likely cause of this error?


Options are :

  • GAB sym1 daemon is still running.
  • VCS is completely shut down all nodes.
  • One or more System List contains the attributes still sym1
  • None
  • Vxfen sym1 daemon is still running.

Answer : One or more System List contains the attributes still sym1

The procedure to make changes to the Veritas Cluster Server (VCS) cluster communication includes stopping the communications stack components, by editing configuration files, and reboot the stack. In what order should be parts of the discontinued?


Options are :

  • VCS I / O fencing, GAB, LLT
  • CBM, GAB, the I / O fences
  • None
  • I / O fences, VCS, GAB, LLT
  • VCS, the I / O fences, LLT, GAB

Answer : VCS I / O fencing, GAB, LLT

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 8

Which of the three options to the response to treatment, where the removal to select events? (Choose three.)


Options are :

  • Remove the incident completely
  • Delete the original message and to preserve case
  • Delete event and export the details of the case .csv
  • Remove the non-violation of attachments or files and to preserve case
  • Remove from happening and to keep violates attachments or files

Answer : Remove the incident completely Delete the original message and to preserve case Remove the non-violation of attachments or files and to preserve case

Which two features are not the Veritas Cluster Manager Java console to offer with when using Veritas Cluster Server (VCS) simulator and the simulated cluster that are not available when using the Veritas Cluster Manager Java console with a live cluster configuration? (Choose two.)


Options are :

  • Remove the system
  • The system turns on and off
  • fault resource
  • Copy service group
  • Run virtual firedrill

Answer : The system turns on and off fault resource

How to count as a successful case of the new system in order to avoid overwhelming Incident Response team?


Options are :

  • Cases are automatically filtered to hide false positives.
  • The match count setting.
  • Many of the cases the respondents are allowed access to the system
  • None
  • More than one policy is enabled.

Answer : The match count setting.

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 1

When you make changes offline configuration, which command should take care to ensure the main.cf file is the correct syntax?


Options are :

  • haconf "check
  • hagrp "check
  • None
  • hacf "check
  • haclus "check

Answer : hacf "check

How many levels deep can be of service group dependencies?


Options are :

  • None
  • 7
  • 5
  • 3
  • 1

Answer : 5

The service group named websg currently online is sym3 node. All other nodes are running. Consider the following partial main.cf definition: Group websg (System List = {sym1 = 0, sym2 = 1, sym3 = 2} Auto Start List = {sym2, sym3} FailOverPolicy = Priority) The operator mistakenly shuts down a critical resource websg service group outside the Veritas Cluster Server. Based on the data, what happens websg service group?


Options are :

  • It remains as part of the network is sym3 node.
  • It moves sym1 node.
  • None
  • It moves sym2 node.
  • It sym3 departure node.

Answer : It moves sym1 node.

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 6

Postoffline the trigger is activated websg service group for all cluster nodes, and trigger location is set as the default location. Two separate tripping price executables named T1action1 and T2action2 is determined. Where Veritas Cluster Server to look for the two trigger executable?


Options are :

  • None
  • $ VCS_HOME / bin / postoffline / T1action1 $ VCS_HOME / bin / postoffline / T2action2
  • $ VCS_HOME / bin / triggers / postoffline / T1action1 $ VCS_HOME / bin / triggers / postoffline / T2action2
  • $ VCS_HOME / bin / websg / postoffline / T1action1 $ VCS_HOME / bin / websg / postoffline / T2action2
  • $ VCS_HOME / bin / triggers / websg / T1action1 $ VCS_HOME / bin / triggers / websg / T1action2

Answer : $ VCS_HOME / bin / triggers / postoffline / T1action1 $ VCS_HOME / bin / triggers / postoffline / T2action2

Offline configuration changes Veritas Cluster Server (VCS) are missing one viewing GUIs or the CLI. What is the most likely cause of this issue?


Options are :

  • VCs initiated the node where the changes were made.
  • VCs initiated the node with the highest priority System List
  • VCS node was started with no changes made
  • VCS was started node having the lowest priority System List.
  • None

Answer : VCS node was started with no changes made

The administrator is setting up websg dbsg service group and service group. The system administrator needs to configure Veritas Cluster Server so websg will be the only online if dbsg is online somewhere in the cluster. If dbsg faults, websg should stay online. If dbsg not be able to fail over, websg should stay online. What type of service group dependency will this require?


Options are :

  • Online global soft
  • Online global company
  • None
  • Online local soft
  • Online local company

Answer : Online global soft

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions