ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 2

Which two are default behaviors of Veritas Cluster Server service groups? (Select two.)


Options are :

  • AutoDisable the service groups on cluster startup
  • Start the service groups in lexical order
  • AutoDisable the service groups on a system when all low priority links fail
  • Migrate service groups from a system on intentional system shutdown
  • Start the service groups in the order of the attribute SystemList

Answer : AutoDisable the service groups on cluster startup Migrate service groups from a system on intentional system shutdown

250-371 Administration Symantec Net Backup 7.5 Windows Exam Set 3

Which type of resources are considered by Veritas Cluster Server when determining whether a service group is online?


Options are :

  • OnOnly
  • Persistent
  • None
  • OnOff

Answer : OnOff

How does a system administrator verify that a Network Monitor Server is healthy?


Options are :

  • By determining whether system alert message emails are generated or received
  • By reviewing the results of the Environmental Check Utility (ECU)
  • By checking Incident Queue and Message Wait Time on the System Overview page
  • By verifying the configuration details of the System Settings page

Answer : By checking Incident Queue and Message Wait Time on the System Overview page

What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?


Options are :

  • All LLT node IDs must be unique across the clusters.
  • All node IDs must be unique across the clusters
  • GAB network IDs must be unique across the clusters
  • Cluster IDs must be unique across the clusters.

Answer : Cluster IDs must be unique across the clusters.

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 1

What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)


Options are :

  • A minimum of two private heartbeat connections
  • Cluster File System Option enabled
  • LUNs visible within the vxdisk list output
  • Arrays with SCSI3-PR enabled
  • LUNs validated with the hacf -verify command

Answer : LUNs visible within the vxdisk list output Arrays with SCSI3-PR enabled

What is the main benefit of installing and using the Symantec Management Platform for managing DLP Agents?


Options are :

  • The ability to view the health status of the agents
  • The ability to supervise how agents are used
  • The ability to easily manage agents remotely
  • The ability to reconfigure the agent filters

Answer : The ability to easily manage agents remotely

Which two are characteristics of a Veritas Cluster Server resource? (Select two.)


Options are :

  • Has a single entry point that the agent uses to control the resource
  • Has a unique name throughout the cluster
  • Corresponds to a hardware or software component
  • Allows cyclical dependencies without a clear starting point
  • Allows only persistent resources to be a parent

Answer : Has a unique name throughout the cluster Corresponds to a hardware or software component

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 2

How can an incident responder remediate multiple incidents simultaneously?


Options are :

  • By selecting the Find Similar command on the Incident Snapshot page
  • By selecting a Smart Response on the Incident Snapshot page
  • By selecting a Smart Response on an Incident List report
  • By selecting an Automated Response on an Incident List report

Answer : By selecting a Smart Response on an Incident List report

Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?


Options are :

  • Local
  • Custom
  • Proxy
  • Global

Answer : Local

What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?


Options are :

  • The ProPCV attribute is prevented from being changed when the service group is active.
  • The MonitorProgram attribute must be configured for the Application resource type.
  • The MonitorProcesses attribute must be configured for the Application resource type.
  • The Mode value for the IMF attribute of the Application type resource is set to 1.

Answer : The MonitorProcesses attribute must be configured for the Application resource type.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?


Options are :

  • If any detection server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any Endpoint Server is running, the agent automatically connects to it after a period of time.
  • If any detection server in the system is running, the agent automatically connects to it after a period of time.
  • If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

Answer : If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

Which detection method includes keyword rules?


Options are :

  • Indexed Document Matching (IDM)
  • Described Content Matching (DCM)
  • Directory Group Matching (DGM)
  • Exact Data Matching (EDM)

Answer : Described Content Matching (DCM)

Which resource type creates a dependency between applications that are configured in different Veritas Cluster Server clusters?


Options are :

  • RemoteGroup
  • Proxy
  • Application
  • Phantom

Answer : RemoteGroup

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 5

An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites. If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?


Options are :

  • Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
  • One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
  • One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site
  • One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site

Answer : One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site

When run in a two node cluster, what does the lltstat -nvv command show?


Options are :

  • LLT information for all configured nodes in the cluster
  • LLT information for any cluster nodes attached to the same switch
  • only LLT information for the node the command was run on
  • only LLT information for nodes verified by Veritas Cluster Server to be active

Answer : LLT information for all configured nodes in the cluster

An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices. Which types of resources should the administrator consider to configure in the service group?


Options are :

  • Application, Volume, Disk Group, IP, Proxy
  • Application, File System, Volume, Disk Group, IP, Proxy
  • Application, File System, Volume, Disk Group, IP, NIC
  • Application, Volume, Disk Group, IP, Phantom

Answer : Application, Volume, Disk Group, IP, Proxy

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

Which Storage Foundation feature is used to send data changes to a remote site via an IP network?


Options are :

  • Storage Replicator
  • NetBackup
  • Replication Exec
  • Volume Replicator

Answer : NetBackup

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has readonly permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files). Which two Discover target configuration mistakes might be causing the problem? (Select two.)


Options are :

  • The Quarantine/Copy Share credentials are invalid.
  • The Default credentials are invalid.
  • The Protect credential is unspecified.
  • The sharelist excludes all directories on the host being scanned
  • The Copy option is selected.

Answer : The Quarantine/Copy Share credentials are invalid. The Protect credential is unspecified.

What is a characteristic of the web-based installer?


Options are :

  • It runs the same commands as the command line installer.
  • It can be automated with a response file.
  • It can install on multiple operating systems at the same time.
  • It can be run using Internet Explorer, Firefox, or Safari.

Answer : It runs the same commands as the command line installer.

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

Discover Servers can leave Marker Files for files moved to the quarantine location. Which file types retain their file extension and the corresponding icon in the Marker File?


Options are :

  • Text files, including source code in Java, C, and shell script
  • All file types configured in Windows Explorer on the detection server host
  • File types specified in the ProtectRemediation.properties file
  • Microsoft Office documents

Answer : File types specified in the ProtectRemediation.properties file

An application is experiencing failures. The application administrator wants Veritas Cluster Server to take all resources offline after failure. The application should remain offline. Which attribute can accomplish this?


Options are :

  • FailOverPolicy
  • Critical
  • ManageFaults
  • AutoFailover

Answer : AutoFailover

What are two operating systems supported by Veritas Cluster Server? (Select two.)


Options are :

  • Fedora
  • openSuSe
  • Mac OS
  • Red Hat Enterprise Server
  • AIX

Answer : Red Hat Enterprise Server AIX

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?


Options are :

  • Network Monitor
  • Network Protect
  • Network Discover
  • Network Prevent

Answer : Network Protect

What is a characteristic of an application that is to be clustered with Veritas Cluster Server?


Options are :

  • It must have the ability to store all required data on SATA disks
  • It must have the ability to be monitored.
  • It must have the ability to copy configuration information between cluster nodes.
  • It must have the ability to store all required data and configuration information on shared disks.

Answer : It must have the ability to be monitored.

How is Intelligent Monitoring Framework configured?


Options are :

  • It is automatically configured on all agents.
  • It is automatically configured but only on supported agents.
  • It needs to be manually configured on each agent.
  • It needs to be manually configured on each cluster node.

Answer : It is automatically configured but only on supported agents.

ST0-085 Symantec Security Information Manager 4.7 Technical Set 1

Which data locations should an organization scan first?


Options are :

  • Centralized repositories
  • Regionalized repositories
  • Private individual directories
  • Password protected shares

Answer : Centralized repositories

Given a service group with all resources online, what should be done to prevent the top resource in a dependency tree from causing a failover when it is taken offline outside the cluster?


Options are :

  • Freeze the resource
  • Disable the dependency links for the resource
  • Set the Critical attribute for the resource to 0
  • Freeze the node

Answer : Set the Critical attribute for the resource to 0

Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)


Options are :

  • Data stored on internal disks
  • Well-defined start and stop procedures
  • Ability to run on multiple independent servers
  • Refresh capability after sudden failures
  • Remote monitoring capability

Answer : Well-defined start and stop procedures Ability to run on multiple independent servers

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 5

How is a policy applied to files found in Network Discover scans?


Options are :

  • By assigning policy groups to the scan target
  • By choosing the correct detection servers to run the scans
  • By choosing the correct policies in the scan target
  • By assigning policies to the Network Discover Server

Answer : By assigning policy groups to the scan target

Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offline unexpectedly before faulting the resource?


Options are :

  • AutoRestartLimit
  • RetryLimit
  • AutoRestart
  • RestartLimit

Answer : RestartLimit

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions