ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 4

Which Veritas Cluster Server (VCS) utility is used to verify a configuration file and can also be used by the VCS engine to load a configuration file at runtime?


Options are :

  • haconf
  • haclus
  • haverify
  • hacf

Answer : haconf

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 1

Which type of Veritas Cluster Server service group dependency permits a parent group to be brought online when the child group is offline?


Options are :

  • Online remote
  • Offline local
  • Offline remote
  • Online local

Answer : Offline local

An administrator needs to set up a service group dependency with the following characteristics: The parent group depends on the child group being offline on the same system. If the child group faults and fails over to a system on which the parent is running, the parent should switch to another system. Which type of dependency is this?


Options are :

  • Offline remote
  • Offline parent
  • Offline home
  • Offline local

Answer : Offline local

What should a system administrator do to stop a detection server?


Options are :

  • Access a command prompt and enter the command "net stop service VontuMonitor"
  • Access the Enforce Server Detail page and select "Done"
  • Access the Server Detail page and select "Stop"
  • Access the services panel and stop the VontuMonitorController service

Answer : Access the Server Detail page and select "Stop"

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

What does a data loss prevention solution help an organization identify? (Select three.)


Options are :

  • Unprotected content on laptops
  • Employee education opportunities
  • Risk of virus infection
  • Illegally obtained software on desktops
  • Encryption enforcement opportunities

Answer : Unprotected content on laptops Employee education opportunities Encryption enforcement opportunities

Which command allows the administrator to leave services currently under Veritas Cluster Server control in a running state while performing configuration changes?


Options are :

  • haconf -all -evacuate
  • hastop -all -evacuate
  • hastop -all -force
  • haconf -all -force

Answer : hastop -all -force

Consider the following configuration: group websg ( SystemList = { sym1 = 1, sym2 = 2 } AutoStartList = { sym1 } Frozen = 1 ) While websg is online, all of the systems in the cluster are rebooted simultaneously. All of the systems finish booting and successfully join the cluster. What will happen to the websg service group?


Options are :

  • It will remain offline on all systems.
  • It will start on sym1 in a frozen state.
  • It will unfreeze on reboot and start on sym1.
  • It will resume its state before the reboot.

Answer : It will remain offline on all systems.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

The loadwarning trigger has been configured for all cluster systems, and all service groups have been configured for load. The current load on a system is 135, which is the maximum possible load on a system for this configuration, and the load has been observed for 10 minutes. The following system attributes have been set for all cluster nodes: Capacity = 150 LoadWarningLevel = 80 LoadTimeThreshold = 300 Under which condition will the loadwarning trigger be invoked?


Options are :

  • The trigger will be invoked after 300 seconds.
  • The trigger will be invoked after 240 seconds.
  • The trigger will never be invoked.
  • The trigger will be invoked after 135 seconds.

Answer : The trigger will be invoked after 300 seconds.

Which Veritas Cluster Server command is used to override static resource type attribute values for a specific resource?


Options are :

  • hatype
  • haclus
  • hagrp
  • hares

Answer : hares

How is the incident count for a new system managed in order to avoid overwhelming the incident response team?


Options are :

  • Match count thresholds are set.
  • Incidents are auto-filtered to hide false positives.
  • More than one policy is enabled.
  • Many incident responders are allowed access to the system

Answer : Match count thresholds are set.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 7

An administrator has removed a system from a running Veritas Cluster Server cluster so that the cluster now only has seven nodes. The administrator must ensure the cluster will start successfully after a complete cluster shutdown. Which line should be in the /etc/gabtab file to successfully start the cluster?


Options are :

  • clust -c -n 7
  • gabconfig start seed=7
  • clust start seed=7
  • gabconfig -c -n 7

Answer : clust start seed=7

Under which high-level node in the left navigation panel can administrators find the System Events report?


Options are :

  • Policy
  • Administration
  • System Health
  • Reports

Answer : Administration

An administrator is adding a node to a running cluster. The administrator has successfully installed Veritas Cluster Server and has configured and started LLT. Which command will allow the new node to start communicating with the cluster?


Options are :

  • hastart
  • gabconfig -c
  • sh /etc/gabconfig
  • hastart -force

Answer : gabconfig -c

250-271 Administration Symantec NetBackup 7.5 for Unix Test Set 5

What are two reasons to implement SCSI-3 I/O fencing? (Select two.)


Options are :

  • Cluster communication
  • Data protection
  • Lock disk
  • Membership arbitration
  • Disk-based heartbeat

Answer : Data protection Membership arbitration

The Veritas Cluster Server (VCS) notifier resource and VCS triggers can be configured to generate messages to assist in VCS administration. Which other facility can be a source of notifications within a comprehensive VCS implementation?


Options are :

  • Veritas Enterprise Manager
  • Cluster Manager Java console
  • Veritas Operations Manager
  • Storage Foundation Manager

Answer : Veritas Operations Manager

Which two are valid settings for FailoverPolicy? (Select two.)


Options are :

  • RoundRobin
  • Failover
  • Priority
  • . Order
  • Dynamic

Answer : RoundRobin Priority

250-271 Administration Symantec Net Backup 7.5 for Unix Exam Set 2

An additional email address was added to the Veritas Cluster Server notifier resource without any other actions being taken. All but one user is receiving notifications. How can this problem be solved?


Options are :

  • Restart the notifier resource
  • Restart the SNMP daemon
  • Restart the HAD daemon
  • Refresh the mailbox of the impacted user

Answer : Restart the notifier resource

A two node cluster is being brought online, but one node is unable to boot. Which command is run to manually seed GAB?


Options are :

  • gabconfig -x
  • lltconfig -n2
  • lltconfig -x
  • gabconfig -n2

Answer : gabconfig -x

How many levels deep can a service group dependency tree be?


Options are :

  • 5
  • 1
  • 3
  • 7

Answer : 5

ST0-085 Symantec Security Information Manage Technical Exam Set 1

Which type of installation requires the most additional memory on the Enforce Server machine to host multiple server instances?


Options are :

  • Stand-alone
  • Single-tier
  • Three-tier
  • Two-tier

Answer : Single-tier

An administrator is configuring a websg service group and a dbsg service group. The administrator needs to configure Veritas Cluster Server so websg will only come online if dbsg is online somewhere in the cluster. If dbsg faults, websg should stay online. If dbsg is unable to fail over, the websg should stay online. Which type of service group dependency does this require?


Options are :

  • Online local soft
  • Online global soft
  • Online global firm
  • Online local firm

Answer : Online global soft

Which three options can incident responders select when deleting incidents? (Select three.)


Options are :

  • Delete the incident completely
  • Delete the original message and retain the incident
  • Delete the incident and export incident details to .csv file
  • Delete the non-violating attachments or files and retain the incident
  • Delete the incident and retain the violating attachments or files

Answer : Delete the incident completely Delete the original message and retain the incident Delete the non-violating attachments or files and retain the incident

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 2

The I/O fencing configuration for a Veritas cluster uses one Coordination Point (CP) server and two local coordinator disks. There are two network connections between the cluster and the CP server. A resource of type CoordPoint has been configured in the cluster using all default resource attribute values. Which resource attribute value for the resource of type CoordPoint needs to be modified so that the resource will fault only when both network connections to the CP server fail even though the coordination disks are still accessible?


Options are :

  • ToleranceLimit
  • FaultTolerance
  • FencingLimit
  • FencingTolerance

Answer : FaultTolerance

Which detection server requires the use of two network card ports?


Options are :

  • Discover Server
  • Endpoint Server
  • Network Monitor Server
  • Network Prevent Server

Answer : Network Monitor Server

Which Veritas Cluster Server event trigger is always invoked on the system where the event occurred?


Options are :

  • sysoffline
  • postonline
  • violation
  • nofailover

Answer : postonline

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 9

An administrator needs to manually add a new resource type to a running cluster. What should the administrator do after installing the agent software on each Veritas Cluster Server (VCS) node?


Options are :

  • Stop and restart VCS so that the new resource type is recognized as valid
  • Use the hatype command to add the new resource type
  • Generate the appropriate hatype commands with hacf -addtype
  • Use the hares command to add the new resource type to the cluster

Answer : Use the hatype command to add the new resource type

The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack. In what order should the components be stopped?


Options are :

  • I/O fencing, VCS, GAB, LLT
  • VCS, I/O fencing, GAB, LLT
  • LLT, GAB, I/O fencing
  • VCS, I/O fencing, LLT, GAB

Answer : VCS, I/O fencing, GAB, LLT

Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?


Options are :

  • AgentTester
  • Fencing
  • AgentServer
  • Simulator

Answer : Fencing

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due to network reconfiguration. What is the correct order for the cluster and heartbeat protocols to be shut down?


Options are :

  • VCS -- > Fencing -- > GAB --> LLT
  • Fencing -- > VCS -- > LLT -- > GAB
  • Fencing -- > VCS -- > GAB --> LLT
  • VCS -- > Fencing -- > LLT -- > GAB

Answer : VCS -- > Fencing -- > GAB --> LLT

Which report helps a compliance officer understand how the company is complying with its data security policies over time?


Options are :

  • Policy report, filtered on date, and summarized by policy
  • Policy Trend report, summarized by policy, then quarter
  • Policy report, filtered on quarter, and summarized by policy
  • Policy Trend report, summarized by policy, then severity

Answer : Policy Trend report, summarized by policy, then quarter

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions