ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 9

Attributes effect service group failover? (Choose three.)


Options are :

  • AutoFailOver
  • defective
  • FaultPropagation
  • Failover
  • frozen

Answer : AutoFailOver FaultPropagation frozen

What effect unsaved configuration changes when the Veritas Cluster Server Administrator to stop the Cluster power option for command-line interface?


Options are :

  • Changes will be automatically disqualified.
  • None
  • The changes are prompted to dispose of.
  • The changes are saved automatically.
  • The changes are prompted saved.

Answer : Changes will be automatically disqualified.

Which Veritas Cluster Server command should be used to change the OnlineRetryLimit all Mount resources?


Options are :

  • haattr
  • hatype
  • None
  • haagent
  • hagrp

Answer : hatype

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 4

The system administrator can see basic information about the case, but it can not look at any of the details of the events that have been created. How does the role defined?


Options are :

  • Status and custom attributes are selected, but the set to modify.
  • The view is selected, but the display attributes will be grayed out.
  • Edit option is not selected on the General tab.
  • The conditions specified in the Incident tab
  • None

Answer : The view is selected, but the display attributes will be grayed out.

What feature of VCS can prevent overloading of the system resources if the service group failover?


Options are :

  • bounds
  • Acquirements
  • None
  • Parallel service groups
  • Load Failover Policy

Answer : bounds

What product will give the incident the defendant who has access to confidential files public file share?


Options are :

  • None
  • Discover network
  • Protect your network
  • Network Monitor
  • network Block

Answer : Discover network

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 7

What kind of detection of the server can block file transfer protocol (FTP) requests?


Options are :

  • Endpoint Block Server
  • Block Web Server
  • None
  • Network Monitor Server
  • Block E-mail Server

Answer : Block Web Server

Every two types of stakeholders should be included in writing the policy? (Choose two.)


Options are :

  • Risk Management
  • training
  • compliance
  • messages team
  • Marketing

Answer : Risk Management compliance

What feature can be configured to allow the group to return to service after a permanent online resource is wrong and the other nodes are not available?


Options are :

  • automatic start
  • OnlineRetry
  • None
  • auto-reset delay
  • Automatic restart

Answer : Automatic restart

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 7

Which type of rule to make the event response is used for the rehabilitation case?


Options are :

  • Smart Response rule
  • The policy response rule
  • auto-reply rule
  • None
  • Incident Response rule

Answer : Smart Response rule

What is the benefit of Symantec Data Loss Prevention 9.0 security architecture?


Options are :

  • Communication is initiated by the identification of servers inside the firewall.
  • Endpoint Agent Endpoint Server communication is used for the Triple Data Encryption Standard (3DES).
  • None
  • Encryption is provided across the confidential information components.
  • Mutual authentication servers based on the Challenge Handshake Authentication Protocol (CHAP).

Answer : Encryption is provided across the confidential information components.

In addition to creating an auto-reply rule that the action is a policy manager will take to implement the rule?


Options are :

  • Start the answer to the rules on the Settings page
  • Please renovate Incidents privilege of appropriate
  • More appropriate response policies rule
  • Click the Response Rule button to perform
  • None

Answer : More appropriate response policies rule

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 1

Consultant assisted the installation of a custom agent environment. They later sent to replace the file online script for a custom agent. If the custom agent called to newapp, which should be online file?


Options are :

  • etc / VRTSvcs / conf / newapp / online
  • opt / VRTSvcs / bin / application / network
  • None
  • etc / VRTSvcs / conf / application / network
  • opt / VRTSvcs / bin / newapp / online

Answer : opt / VRTSvcs / bin / newapp / online

Which three functions of the communication architecture ensures that the system is able to automatically restore If the network connection failure between the discovery of servers and Enforce Server? (Choose three.)


Options are :

  • autonomous monitoring
  • automatic synchronization
  • Alert filing
  • case waiting
  • database backup

Answer : autonomous monitoring automatic synchronization case waiting

What happens when hastop -All -Force performed?


Options are :

  • WAS and all the facilities under its control were closed
  • Was forcibly stops all services and had to turn off
  • None
  • OLI will remain online after turning off services
  • WAS stops and all services are still online

Answer : WAS stops and all services are still online

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 6

By default, this port Is Enforce Server uses to connect to detect all servers?


Options are :

  • 443
  • 8000
  • None
  • 1293
  • 8100

Answer : 8100

The cluster application Veritas Cluster Server Administrator must be obtained for which the certificate (s)?


Options are :

  • Licenses to run on all cluster nodes
  • Keyless license application
  • Permanent licenses tied to the system host ID
  • The demo license for at least one cluster node
  • None

Answer : Licenses to run on all cluster nodes

What file is created vxfen startup script when the I / O fencing starts?


Options are :

  • vxgabtab
  • vxfentab
  • None
  • vxfendg
  • vxfenmode

Answer : vxfentab

ST0-085 Symantec Security Information Manager Practice Exam Set 4

What are the three valid reasons for an increase in the comments of events? (Choose three.)


Options are :

  • Provide a detailed report filtering
  • Take the following when answering an expanding incident
  • In order to more quickly understand the respondent next event in the history of
  • So that the next voice faster to prioritize cases for review
  • To provide detail when closing the incident

Answer : Take the following when answering an expanding incident In order to more quickly understand the respondent next event in the history of To provide detail when closing the incident

What component of the Microsoft Outlook Personal Folders (.pst) Discover Network does not filter used?


Options are :

  • Individual emails to PST file
  • Attachments .pst file
  • Folders .pst file
  • None
  • The whole PST file

Answer : The whole PST file

Three of which are valid for scanned content filter types Discover the Filesystem target? (Choose three.)


Options are :

  • owner filter
  • File Date filter
  • Read ACL filter
  • File Size filter
  • Exclude filter

Answer : File Date filter File Size filter Exclude filter

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 7

When is blocking network transmissions and quarantine exposed confidential files begin?


Options are :

  • After the policy is tuned for several months
  • None
  • Within three months of use of the system
  • As soon as the risk of starting a snapshot of the situation is established
  • Before automatic notifications

Answer : After the policy is tuned for several months

Every type of resource can be mirrored to another state of the resource?


Options are :

  • ghost
  • None
  • Remote Group
  • Mirror
  • power of attorney

Answer : power of attorney

See the following information: OnlineTimeoutInterval = 60 OnlineRetryLimit MonitorInterval = 2 = 120 = 0 RestartLimit What will occur if the application takes 70 seconds to come online during the online process?


Options are :

  • The application comes online without any problems.
  • The application fails to bring online and try to failover to another cluster node.
  • The application fails to bring online and try again.
  • Applications to monitor aging and cause the application failover.
  • None

Answer : The application fails to bring online and try again.

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 9

Each assembly is the lowest concentration of the active ingredient nodes?


Options are :

  • 6 + 2 (eight nodes in two parts)
  • 7 + 1 (the eight nodes one spare)
  • an active-passive (two nodes)
  • an active-active (two nodes)
  • None

Answer : an active-passive (two nodes)

Every agent entry point is used when running a virtual fire drill for a specific resource?


Options are :

  • Activities
  • Information
  • Monitor
  • None
  • Online

Answer : Activities

In any cases appear in the Network Incident List, the network in order to prevent the effect of the filter is set to "Custom"?


Options are :

  • in cases where SMTP email was changed to include a specific title
  • caused by confidential content was removed from the webmail
  • None
  • caused by confidential content was removed from the SMTP e-mail
  • caused by blocked confidential content led to a webmail

Answer : in cases where SMTP email was changed to include a specific title

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

Referring to the configuration below: Group dbsg (system List = {sym1 = 0, sym2 = 1, sym3 = 2, sym4 = 3} SystemZones = {sym1 = 0, sym2 = 0, sym3 = 1, sym4 = 1} AutoFailOver = 2) What operating Veritas Cluster Server (VCS) to the dbsg faults, if it is currently online sym1?


Options are :

  • The service group does over to another node within the second area.
  • The service group has closed the VCS.
  • The service group is over, if one node is in the same zone.
  • The service group will start at the same node.
  • None

Answer : The service group is over, if one node is in the same zone.

In determining or rejecting dangerous situations, Symantec recommends that the incident the defendant carried out the actions?


Options are :

  • export incidents
  • Add comments
  • Set the severity
  • None
  • Remove incidents

Answer : Add comments

Every database is Symantec Data Loss Prevention 9.0 Support the incident and the storage policy?


Options are :

  • Oracle 10g version 10.2.0.4
  • Microsoft SQL Server
  • any version of Oracle 10g
  • Oracle 10g version 10.2.0.1
  • None

Answer : Oracle 10g version 10.2.0.4

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 7

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions