ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

Which two traffic feed sources should be used for Network Monitor? (Select two.)


Options are :

  • trunking port on a hub
  • tunneled port on a VPN router
  • router LAN port
  • Switched Port Analyzer (SPAN) port
  • Test Access Port (TAP)

Answer : Switched Port Analyzer (SPAN) port Test Access Port (TAP)

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 4

Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?


Options are :

  • Directory Group Matching (DGM)
  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)
  • Indexed Document Matching (IDM)

Answer : Indexed Document Matching (IDM)

Where can an incident responder view all actions that have occurred for an incident?


Options are :

  • Auditlog Table
  • Incident Actions
  • System Events
  • Incident Snapshot

Answer : Incident Snapshot

Symantec Operation Readiness Tools (SORT) provides which service?


Options are :

  • It automates installation of product updates
  • It stores operating system patches required for upgrade.
  • It maintains common config files required for Disaster Recovery.
  • It manages notifications for changes in patches.

Answer : It manages notifications for changes in patches.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

Only two local disks suitable for use as coordinator disks are available for a local mutinode cluster. Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/O fencing configuration? (Select two.)


Options are :

  • Second network connection to the CP server cluster
  • Multi-node CP server cluster
  • One-node CP server cluster with GAB and LLT configured
  • One-node CP server cluster with only LLT configured
  • I/O fencing on the CP server cluster

Answer : Second network connection to the CP server cluster Multi-node CP server cluster

On which system can you set UseMpathd=1 in a MultiNICB resource?


Options are :

  • HP-UX
  • AIX
  • Solaris
  • Linux

Answer : HP-UX

An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed.Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)


Options are :

  • configure the operating system to automatically mount the file systems involved
  • link the application resource to the file system resources, with appropriate dependencies
  • configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
  • unconfigure the operating system to automatically mount the file systems involved
  • set up the appropriate file system contention mechanism in the correct sequence

Answer : configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved unconfigure the operating system to automatically mount the file systems involved

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 5

An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?


Options are :

  • Priority
  • Prerequisites
  • Quorum
  • RoundRobin

Answer : RoundRobin

Which service group attribute enables specifying preferred nodes for failover?


Options are :

  • ClusterList
  • SystemZones
  • AutostartList
  • IntentionalOnlineList

Answer : SystemZones

Which statement describes a DLP Agent encryption feature?


Options are :

  • The system administrator can generate a unique authentication key.
  • The key size is standard and unconfigurable.
  • DLP Agent-to-server communication uses Secure Socket Layer (SSL).
  • The key is randomly generated for the agent store.

Answer : The system administrator can generate a unique authentication key.

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 2

What information must be specified when adding a resource to a service group?


Options are :

  • Cluster identifier
  • Attribute values
  • System name
  • Service group name

Answer : Service group name

Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)


Options are :

  • View the Application_A.log file
  • View the Security Log from the VCS Java GUI
  • View the Log Desk from the VCS Java GUI
  • Examine the engine log file
  • Examine the online log file

Answer : View the Log Desk from the VCS Java GUI Examine the engine log file

What are two resource types that Proxy resources can reference? (Select two.)


Options are :

  • Quorum
  • ElifNone
  • DNS
  • NIC
  • IP

Answer : ElifNone NIC

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 5

Which actions are required to enable a service group to run on all systems in a cluster simultaneously?


Options are :

  • Take the service group offline, add all cluster systems to the AutoStartList, and bring the service group back online with the -all option
  • Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all cluster systems, and restart Veritas Cluster Server
  • Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the AutoStartList, and restart Veritas Cluster Server
  • Run the hagrp -modify [service group] Parallel 1 command and the service group will automatically restart on all systems

Answer : Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the AutoStartList, and restart Veritas Cluster Server

Which three statements apply to communication between the Enforce Server and detection servers? (Select three.)


Options are :

  • The servers can be configured to use any port higher than 1024.
  • Port 3389 must be open between the Enforce Server and the detection servers.
  • By default, the Enforce Server and the detection servers communicate over port 8100.
  • IPSec must be configured on the Enforce Server and the detection servers.
  • The same port number must be used for all detection servers.

Answer : The servers can be configured to use any port higher than 1024. By default, the Enforce Server and the detection servers communicate over port 8100. The same port number must be used for all detection servers.

Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?


Options are :

  • Incident Access tab
  • General tab
  • Users tab
  • Policy Management tab

Answer : General tab

ST0-135 Symantec Network Access Control 12.1 Technical Asses Set 7

Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism. Thinking specifically about data disks, which two cluster configuration requirements must be met to implement this? (Select two.)


Options are :

  • The disks must contain at least one *.dbf file.
  • The disks must be in a Veritas Volume Manager disk group.
  • The service group containing the disks must include an IP resource.
  • The disks must be managed by a VCS DiskGroup resource type.
  • The application using the disks must be managed by a VCS Application resource type.

Answer : The disks must be in a Veritas Volume Manager disk group. The disks must be managed by a VCS DiskGroup resource type.

When setting different severity levels, which level should be set as the default?


Options are :

  • The lowest level available in the system
  • The highest level available in the system
  • The highest level the policy manager wants to assign
  • The lowest level the policy manager wants to assign

Answer : The lowest level the policy manager wants to assign

To which file system folder does PacketCapture write reconstructed SMTP messages?


Options are :

  • drop_discover
  • drop_pcap
  • drop
  • drop_ttd

Answer : drop_pcap

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 4

What does Network Monitor use to identify network traffic going to a nonstandard port?


Options are :

  • The originating domain
  • Total packet size
  • Either UDP or TCP
  • Protocol signature

Answer : Protocol signature

On a cluster, what does the following command display? Hares -display -ovalues


Options are :

  • all default resource attributes
  • all overridden resource attributes
  • all uncommitted resource attributes
  • all online resource attributes

Answer : all overridden resource attributes

How can a system administrator obtain the log files for a detection server? (Select three.)


Options are :

  • Select Logs under Administration node
  • Click Fetch Latest on the Server Detail page
  • Navigate to the logs directory
  • Run the Log Collection Utility (LCU)
  • Download logs from the System Overview page

Answer : Click Fetch Latest on the Server Detail page Navigate to the logs directory Run the Log Collection Utility (LCU)

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 4

What is a feature of keyless licensing?


Options are :

  • It works on all versions of Veritas Cluster Server
  • It requires an accessible Veritas Operations Manager (VOM) server.
  • It must be enabled before installation of Veritas Cluster Server
  • It requires that at least one key be installed on each cluster host.

Answer : It requires an accessible Veritas Operations Manager (VOM) server.

Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)


Options are :

  • The ability to be installed on shared storage
  • The ability to monitor each instance of the application independently
  • The ability to notify the administrator of the state
  • The ability to disconnect users from the application
  • The ability to determine if the application is running

Answer : The ability to monitor each instance of the application independently The ability to determine if the application is running

Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?


Options are :

  • IMF
  • HAD
  • LLT
  • GAB

Answer : HAD

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 2

What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?


Options are :

  • Monitoring of resources without need of configuration
  • Prevention of concurrency violations
  • Immediate notification of resource state change
  • Monitoring of resources running on remote clusters

Answer : Immediate notification of resource state change

The log files used to verify that a custom application is being properly monitored are located in which directory?


Options are :

  • /opt/VRTSvcs/agent/log/
  • /opt/VRTSvcs/log/
  • /var/VRTSvcs/agent/log/
  • /var/VRTSvcs/log/

Answer : /opt/VRTSvcs/log/

While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)


Options are :

  • Network connectivity
  • Operational complexity
  • Cluster upgrades
  • User security
  • Inability to handle load on failover

Answer : Operational complexity Inability to handle load on failover

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Refer to the following service group example: group websg ( SystemList = { sym1 = 0, sym2 = 1 } AutoStart = 0 AutoStartList = { sym2 } ) DiskGroup webdg ( DiskGroup = webdg ) IP webip ( Device = eth0 Address = "169.254.128.12" NetMask = "255.255.255.0" ) Mount webmnt ( MountPoint = "/web1" BlockDevice = "/dev/vx/dsk/webdg/webvol" FSType = vxfs MountOpt = rw FsckOpt = "-y" ) NIC webnic ( Device = eth0 ) Application webproc ( MonitorProgram = "/usr/local/bin/web -monitor" StartProgram = "/usr/local/bin/web -start" StopProgram = "/usr/local/bin/web -stop" ) webip requires webproc webproc requires webmnt webip requires webnic webmnt requires webdg Which resource will start online last?


Options are :

  • webdg
  • webip
  • webproc
  • webmnt

Answer : webip

Which Network Protect feature is a system administrator unable to configure?


Options are :

  • Ability to copy files
  • Content of the file marker
  • Location of quarantined files
  • Ability to restore files

Answer : Ability to restore files

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions