ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 3

Which relational database management system (RDBMS) does Symantec Data Loss Prevention 9.0 support?


Options are :

  • Sybase
  • Oracle
  • MySQL
  • IBM

Answer : Oracle

250-371 Administration Symantec NetBackup 7.5 for Windows Set 4

Which delimiter is unacceptable in Exact Data Matching (EDM) data sources?


Options are :

  • Slash (/)
  • Comma (,)
  • Pipe (|)
  • Tab

Answer : Slash (/)

The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured. Where will Veritas Cluster Server look for the two trigger executables?


Options are :

  • $VCS_HOME/bin/triggers/websg/T1action1 $VCS_HOME/bin/triggers/websg/T1action2
  • $VCS_HOME/bin/websg/postoffline/T1action1 $VCS_HOME/bin/websg/postoffline/T2action2
  • $VCS_HOME/bin/postoffline/T1action1 $VCS_HOME/bin/postoffline/T2action2
  • $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2

Answer : $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2

System capacity and service group load are the main components for which FailOverPolicy?


Options are :

  • Capacity
  • Order
  • Limit
  • Load

Answer : Load

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 7

The websg service group is online on node sym1. The dbsg service group is online on node sym2. No fencing is configured. One of the two heartbeat links has been down for 30 minutes. The cable is unplugged from the last working heartbeat link. What will happen to the dbsg service group?


Options are :

  • It will remain on sym2.
  • It will go to a FAULTED state
  • It will migrate to sym1
  • It will also start on sym1.

Answer : It will remain on sym2.

What is a likely outcome of filtering network traffic in Network Monitor?


Options are :

  • decrease in the detection accuracy
  • increase in Network Monitor demand for RAM
  • monitoring of traffic important to the customer
  • monitoring of outbound traffic before inbound traffic

Answer : monitoring of traffic important to the customer

Which two items are required to replace a coordinator disk while the cluster is online? (Select two.)


Options are :

  • Replace the LUN and create the disk as a Veritas Volume Manager (VxVM) Disk
  • Run the vxfenadm command to replace the removed LUNs
  • Replace the LUN and create the disk as a Logical Volume Manager (LVM) Disk
  • Replace the LUN and create the disk as either a VxVM or LVM Disk
  • Run the installvcs -fencing command to replace the removed LUNs

Answer : Replace the LUN and create the disk as a Veritas Volume Manager (VxVM) Disk Run the installvcs -fencing command to replace the removed LUNs

250-270 Administration of Symantec NetBackup 7.0 Unix Test Set 1

Which Preferred Fencing policy should be configured to ensure that the node with the preferred application survives a fencing event?


Options are :

  • PreferredFencingPolicy = Disabled
  • PreferredFencingPolicy = System
  • PreferredFencingPolicy = Site
  • PreferredFencingPolicy = Group

Answer : PreferredFencingPolicy = Group

An administrator stopped Veritas Cluster Server (VCS) on the sym1 node to remove it from the cluster. When attempting to do this with the hasys -delete command from sym2, an error message is displayed. What is the likely cause of this error?


Options are :

  • VCS must be completely shut down on all nodes.
  • One or more SystemList attributes still contains sym1
  • The vxfen daemon on sym1 is still running.
  • The GAB daemon on sym1 is still running.

Answer : One or more SystemList attributes still contains sym1

Where are configured Veritas Cluster Server triggers found using $VCS_HOME as the main Veritas Cluster Server directory?


Options are :

  • $VCS_HOME
  • $VCS_HOME/triggers
  • $VCS_HOME/bin
  • $VCS_HOME/bin/triggers

Answer : $VCS_HOME

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 10

Which two capabilities does the Veritas Cluster Manager Java console provide when used with the Veritas Cluster Server (VCS) Simulator and a simulated cluster that are unavailable when using the Veritas Cluster Manager Java console with a live cluster configuration? (Select two.)


Options are :

  • System power on and off
  • Remove a system
  • Fault a resource
  • Run a virtual firedrill
  • Copy a service group

Answer : System power on and off Fault a resource

Offline configuration changes made to Veritas Cluster Server (VCS) are missing when viewing it in one of the GUIs or the CLI. What is the likely cause of this issue?


Options are :

  • VCS was started on the node where the changes were made.
  • VCS was started on the node without the changes being made
  • VCS was started on the node with the highest priority in the SystemList
  • VCS was started on the node with the lowest priority in the SystemList.

Answer : VCS was started on the node without the changes being made

Two clusters are both running the same operating system and version of Veritas Cluster Server. A service group in one cluster depends on a service group in the other cluster. Which method can be used to manage the service group relationship?


Options are :

  • RemoteGroup agent
  • RemoteCluster agent
  • CrossCluster trigger
  • RemoteGroup trigger

Answer : RemoteGroup agent

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 3

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)


Options are :

  • Network: Block HTTP/HTTPS
  • Endpoint: Notify
  • Protect: Quarantine File
  • Protect: Copy File
  • Endpoint: Block
  • Network: Remove HTTP/HTTPS Content

Answer : Endpoint: Notify Endpoint: Block

Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?


Options are :

  • Inventory Mode Scanning
  • Exclude Filtering
  • File Throttling
  • Byte Throttling

Answer : Inventory Mode Scanning

An installed cluster has been licensed with the keyless licensing option. The administrator has yet to configure the cluster to be managed by Veritas Operations Manager (VOM). What will happen when 60 days have passed since installation?


Options are :

  • The cluster will ignore licensing.
  • The cluster will cease to respond if a resource faults.
  • The cluster will log messages related to licensing.
  • The cluster will shut down.

Answer : The cluster will log messages related to licensing.

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 4

Which three products support virtualization and can be run on virtual machines? (Select three.)


Options are :

  • Network Discover
  • Network Monitor
  • Network Prevent (Email)
  • Network Prevent (Web)
  • Endpoint Discover

Answer : Network Discover Network Prevent (Email) Network Prevent (Web)

What is an advantage of using Endpoint Discover over Network Discover?


Options are :

  • Ability to scan online machines
  • Ability to schedule the scans
  • Ability to pause an in-progress scan
  • Ability to scan many machines in parallel

Answer : Ability to scan many machines in parallel

An administrator is merging two Veritas clusters that are already configured and running. The two clusters are already sharing private interconnect networks. Which directive in the /etc/llttab file must be updated?


Options are :

  • Set-cluster
  • Set-mode
  • Set-node
  • Set-system

Answer : Set-cluster

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 2

What should be done before removing a resource named webdg from a running service group?


Options are :

  • The service group must be taken offline.
  • All parent resources of webdg must be taken offline.
  • All child resources of webdg must be taken offline
  • The service group must be disabled

Answer : All parent resources of webdg must be taken offline.

The service group named websg is currently online on the sym3 node. All other nodes are running. Consider the following partial main.cf definition: Group websg ( SystemList = { sym1=0, sym2=1, sym3=2 } AutoStartList = {sym2, sym3 } FailOverPolicy = Priority ) The operator incorrectly shuts down a critical resource in the websg service group outside of Veritas Cluster Server. Based on the information provided, what will happen to the websg service group?


Options are :

  • It will remain partially online on the sym3 node.
  • It will switch to the sym2 node.
  • It will switch to the sym1 node.
  • It will restart on sym3 node.

Answer : It will switch to the sym1 node.

What is a characteristic of the Veritas Cluster Server communication stack?


Options are :

  • LLT determines cluster membership by monitoring heartbeats over GAB.
  • Agents communicate resource status information with HAD.
  • Agents can communicate with each other directly over GAB.
  • The HAD processes propagates information to other nodes by way of agents.

Answer : Agents communicate resource status information with HAD.

ST0-085 Symantec Security Information Manage Technical Exam Set 3

What is the first step when upgrading the operating system on a single node in a running multi-node Veritas Cluster Server (VCS) cluster?


Options are :

  • Migrate parallel service groups
  • Shut down VCS on all nodes
  • Offline service groups on the node
  • Freeze the service groups

Answer : Offline service groups on the node

What is an advantage of using a Dashboard report?


Options are :

  • Incident reponders can execute Smart Responses from them.
  • They can be used as work queues for incident responders.
  • They allow incidents to be viewed across multiple products.
  • Incident responders can see the history of each incident.

Answer : They allow incidents to be viewed across multiple products.

A resource of type Application is configured to be monitored by the Intelligent Monitoring Framework. Which resource attribute should be exclusively configured in order to enable the Proactive Prevention of Concurrency feature for the resource of type Application?


Options are :

  • MonitorProgram
  • StartProgram
  • PidFiles
  • MonitorProcesses

Answer : MonitorProcesses

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 8

When making offline configuration changes, which command should be run to ensure the main.cf file has the correct syntax?


Options are :

  • hacf –verify
  • haclus –verify
  • hagrp –verify
  • haconf –verify

Answer : hacf –verify

When configured as default, the Veritas Cluster Server Notifier receives queued messages on a schedule every how many minutes?


Options are :

  • Five
  • One
  • Ten
  • Three

Answer : Three

Where does an incident responder find the exact matches that triggered an incident?


Options are :

  • Incident List
  • System Events report
  • Incident Snapshot
  • Dashboard report

Answer : Incident Snapshot

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

In which two cases will the agent status remain green (good) on the Agent Events page? (Select two.)


Options are :

  • There was agent or server authentication failure.
  • The agent closed the connection to the Endpoint Server.
  • The Endpoint Server detected that the connection with the agent was lost.
  • The agent is unable to restore a database file.
  • There was an agent service shutdown during machine shutdown.

Answer : The agent closed the connection to the Endpoint Server. There was an agent service shutdown during machine shutdown.

A system administrator examines the results of a completed scan. Which information is available on a scan listing on the Discover Targets page? (Select three.)


Options are :

  • File structure and location
  • Number of items changed since the previous scan
  • Number of items scanned
  • Elapsed time and total time for each scan
  • User who initiated the scan
  • Errors encountered

Answer : Number of items scanned Elapsed time and total time for each scan Errors encountered

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions