ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 5

In a two node configuration, which option allows the administrator to form a Veritas cluster on the pair?


Options are :

  • One node is an NFS client to the other node's NFS server.
  • One node is a virtual machine, and the other is physical.
  • One node runs Oracle Solaris SPARC, and the other runs Oracle Solaris x86.
  • One node runs HP-UX and the other Oracle Solaris.

Answer : One node is a virtual machine, and the other is physical.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 8

To cluster an application with Veritas Cluster Server, an administrator must obtain which license(s)?


Options are :

  • Demo license for at least one cluster node
  • Keyless licenses for the application
  • Permanent licenses tied to the system host ID
  • Valid licenses to run on all cluster nodes

Answer : Valid licenses to run on all cluster nodes

Which component of Microsoft Outlook Personal Folder (.pst) files does Network Discover apply filters to?


Options are :

  • Individual emails in the .pst file
  • Folders in the .pst file
  • The entire .pst file
  • Attachments in the .pst file

Answer : The entire .pst file

What is a benefit of the Symantec Data Loss Prevention 9.0 security architecture?


Options are :

  • Encryption is provided for confidential information across system components.
  • Mutual authentication between servers is based on the Challenge Handshake Authentication Protocol (CHAP).
  • Endpoint Agent to Endpoint Server communication uses the Triple Data Encryption Standard (3DES).
  • Communication is initiated by the detection servers inside the firewall.

Answer : Encryption is provided for confidential information across system components.

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 9

When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?


Options are :

  • Export incidents
  • Delete incidents
  • Add comments
  • Set severity

Answer : Add comments

Where are the installation log files created when Veritas Cluster Server is installed?


Options are :

  • /var/VRTSvcs/install/logs/
  • /opt/VRTSvcs/install/logs/
  • /var/VRTS/install/logs/
  • /opt/VRTS/install/logs/

Answer : /opt/VRTS/install/logs/

How should a policy manager write policies that adhere to compliance regulations effectively and easily?


Options are :

  • By creating a new blank policy and adding fitting rules
  • By using a compliance data identifier in the policy
  • By using a policy template and editing as necessary
  • By copying an existing policy and editing as necessary

Answer : By using a policy template and editing as necessary

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to "Modified"?


Options are :

  • incidents in which an SMTP email was changed to include a specified header
  • incidents in which confidential content resulted in a blocked Web mail
  • incidents in which confidential content was removed from an SMTP email
  • incidents in which confidential content was removed from a Web mail

Answer : incidents in which an SMTP email was changed to include a specified header

What are three valid reasons for adding comments to incidents? (Select three.)


Options are :

  • To allow the next responder to more quickly understand the incident history
  • To provide detail when closing an incident
  • To provide detail for report filtering
  • To allow the next responder to more quickly prioritize incidents for review
  • To provide detail to the next responder when escalating an incident

Answer : To allow the next responder to more quickly understand the incident history To provide detail when closing an incident To provide detail to the next responder when escalating an incident

The application administrator has brought the application offline through Veritas Cluster Server using the hares -offline command. If the cluster administrator switches the application service group to another node in the cluster, what is the state of the application after the service group switches nodes?


Options are :

  • Partial online
  • Online
  • Offline
  • Faulted

Answer : Offline

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 6

Which environmental factors external to the nodes represent potential single points of failure that can be made highly available through redundancy? (Select two.)


Options are :

  • Operating system
  • Application software
  • Electrical power circuits
  • Networking components
  • Random access memory

Answer : Electrical power circuits Networking components

What is a consideration for properly clustering NFS under Veritas Cluster Server (VCS) control?


Options are :

  • The NFS daemon may need to be restarted occasionally
  • The logical IP addresses must remain with only one system.
  • The NFS daemon must be started by VCS.
  • The major device numbers need to be identical across all clustered nodes.

Answer : The major device numbers need to be identical across all clustered nodes.

A newly created failover service group configured with resources remains offline when the cluster is started. Which attribute should an administrator investigate to determine why the service group remains offline?


Options are :

  • AutoStartList
  • AutoStartPolicy
  • AutoStartIfPartial
  • StartList

Answer : AutoStartList

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 8

Where in the GUI are Smart Response rules executed? (Select two.)


Options are :

  • Incident List reports
  • Response Rules page
  • Incident Snapshot reports
  • Incident Summary reports
  • Dashboard reports

Answer : Incident List reports Incident Snapshot reports

What happens when hastop -all -force is executed?


Options are :

  • HAD remains online after shutting down the services
  • HAD and all services under its control shut down
  • HAD stops and all services remain online
  • HAD forcibly stops all services and HAD shuts down

Answer : HAD stops and all services remain online

What is the recommended deployment location for Network Monitor?


Options are :

  • On the WAN side of the corporate router
  • Within the demilitarized zone (DMZ)
  • In its own isolated virtual LAN (VLAN)
  • Inside the secured corporate LAN

Answer : Within the demilitarized zone (DMZ)

ST0-10X Veritas Storage Foundation 5 for Unix Practice Exam Set 6

Which two recommendations should an organization follow when deploying Endpoint Prevent? (Select two.)


Options are :

  • Enable monitoring of many destinations and protocols simultaneously
  • Configure blocking as soon as the agents are deployed
  • Test the agent on a variety of end-user images
  • Enable monitoring of the local file system first
  • Configure, test, and tune filters

Answer : Test the agent on a variety of end-user images Configure, test, and tune filters

Which type of rule do incident responders use to remediate an incident?


Options are :

  • automated response rule
  • Smart Response rule
  • incident response rule
  • policy response rule

Answer : Smart Response rule

What are two major functions of Low Latency Transport (LLT)? (Select two.)


Options are :

  • Traffic distribution
  • Heartbeating
  • Cluster membership
  • Cluster communications
  • Broadcast message

Answer : Traffic distribution Heartbeating

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 1

A policy manager wants to apply policies only to certain employees with a specific classification level. Which TrueMatch detection method can help accomplish this?


Options are :

  • Exact Data Matching (EDM)
  • Indexed Document Matching (IDM)
  • Described Content Matching (DCM)
  • Directory Group Matching (DGM)

Answer : Directory Group Matching (DGM)

Which two resource attributes need to be correctly set to prevent an unplanned outage due to an improper configuration that might cause a fault during the online process of the new resource? (Select two.)


Options are :

  • MonitorOnly
  • AutoDisabled
  • Critical
  • Enabled
  • AutoStart

Answer : Critical Enabled

A power problem caused all nodes in the cluster to crash. One node has failed to reboot, and smoke is coming from the power supply. The administrator runs gabconfig -a and notices that port a has two of three nodes registered. What should the administrator do to start Veritas Cluster Server on the running nodes?


Options are :

  • run gabconfig -cx on one of the running nodes
  • run gabconfig -cx on both of the running nodes
  • run hasys -force on one of the nodes to force HAD to start
  • edit /etc/llttab and change the -n3 option to -x

Answer : run gabconfig -cx on one of the running nodes

250-271 Administration Symantec NetBackup 7.5 for Unix Test Set 2

Refer to the configuration below: group dbsg ( SystemList = { sym1=0, sym2=1, sym3=2, sym4=3 } SystemZones = { sym1=0, sym2=0, sym3=1, sym4=1 } AutoFailOver = 2 ) Which action will Veritas Cluster Server (VCS) take when dbsg faults if it is currently online on sym1?


Options are :

  • The service group restarts on the same node.
  • The service group fails over to another node within the other zone.
  • The service group fails over if another node exists in the same zone.
  • The service group is shut down by VCS.

Answer : The service group fails over if another node exists in the same zone.

Which two pieces of information about database agents should the administrator be aware of when placing a database under Veritas Cluster Server (VCS) control? (Select two.)


Options are :

  • They can be installed manually from the software distribution using operating system utilities
  • They are included in the VRTSdbed package for all installation options.
  • Agent-specific type files are automatically added to the VCS configuration after the administrator installs agents manually.
  • They are automatically installed if the administrator selects "recommended" or "all package" sets.
  • They must be installed on all the failover target systems, regardless of whether they will run the database.

Answer : They can be installed manually from the software distribution using operating system utilities They are automatically installed if the administrator selects "recommended" or "all package" sets.

Where on the Endpoint Server Detail page can a system administrator configure the throttling option?


Options are :

  • Agent Monitoring section
  • Agent Filtering section
  • Agent Listener section
  • Agent Configuration section

Answer : Agent Configuration section

250-400 Administration Altiris Client Management Suite Exam Set 6

Which agent entry point is used when running a virtual fire drill for a specific resource?


Options are :

  • Action
  • Info
  • Online
  • Monitor

Answer : Action

Which three functions of the communications architecture ensure that the system is able to automatically recover should a network connectivity failure occur between the detection servers and the Enforce Server? (Select three.)


Options are :

  • Database backup
  • Automatic synchronizing
  • Alert archiving
  • Incident queuing
  • Autonomous monitoring

Answer : Automatic synchronizing Incident queuing Autonomous monitoring

When should blocking of network transmissions and quarantining of exposed confidential files begin?


Options are :

  • As soon as the baseline risk snapshot has been established
  • After policies have been tuned for several months
  • Before enabling auto notifications
  • Within three months of deploying the system

Answer : After policies have been tuned for several months

250-352 Administration of Storage Foundation and HA 6.0 Test Set 1

What is the default incident data retention behavior for Network Monitor and Network Prevent?


Options are :

  • Only messages are retained.
  • Neither messages nor attachments are retained
  • Only attachments are retained.
  • Messages and attachments are retained.

Answer : Messages and attachments are retained.

Which feature is a key benefit of onscreen notification?


Options are :

  • It informs endpoint users when they try to copy or transmit confidential data from the endpoint.
  • It informs endpoint users when an Endpoint Discover scan identifies confidential files on their computers.
  • It informs the system administrator when specified system events have occurred within the system.
  • It informs endpoint users that the DLP agent has just been installed on their computers.

Answer : It informs endpoint users when they try to copy or transmit confidential data from the endpoint.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions