ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 6

An administrator has configured Veritas Cluster Server (VCS) to periodically back up configuration files when the configuration is left open for update. What will be the resulting file name when VCS backs up the main.cf files?


Options are :

  • main.cf.previous
  • main.cf.backup
  • main.cf.bak
  • main.cf.autobackup

Answer : main.cf.autobackup

ST0-085 Symantec Security Information Manage Technical Exam Set 2

All users, regardless of their role permissions, are allowed to configure which two reporting options? (Select two.)


Options are :

  • Ability to select reports to display
  • Ability to print reports to PDF
  • Ability to delete incidents
  • Ability to look up custom attributes
  • Ability to set the default report

Answer : Ability to select reports to display Ability to set the default report

When a policy is applied for detection, how are exceptions evaluated?


Options are :

  • Exceptions then detection rules
  • Detection rules then exceptions
  • Exceptions then response rules
  • Response rules then exceptions

Answer : Exceptions then detection rules

Which TrueMatch detection method can be evaluated at the agent level?


Options are :

  • Indexed Document Matching (IDM)
  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)
  • Directory Group Matching (DGM)

Answer : Described Content Matching (DCM)

250-270 Administration of Symantec Net Backup 7.0 Unix Exam Set 4

Which information is recommended to be included in an Exact Data Matching (EDM) data source?


Options are :

  • Country, state, or province names
  • Column names in the first row
  • Date fields
  • Numeric fields with fewer than five digits

Answer : Column names in the first row

A 2-node Veritas Cluster Server cluster has two dedicated Ethernet heartbeat links and I/O Fencing enabled. What will happen if both heartbeat links simultaneously fail?


Options are :

  • One node panics and the other remains running
  • I/O Fencing takes over as the heartbeat mechanism.
  • Both nodes panic and reboot into the cluster.
  • All service groups are frozen on both nodes.

Answer : All service groups are frozen on both nodes.

Which database does Symantec Data Loss Prevention 9.0 support for incident and policy storage?


Options are :

  • Oracle 10g version 10.2.0.1
  • any version of Oracle 10g
  • Oracle 10g version 10.2.0.4
  • Microsoft SQL Server

Answer : Oracle 10g version 10.2.0.4

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

Which three are valid Scanned Content filter types for the Discover File System target? (Select three.)


Options are :

  • File Size filter
  • Read ACL filter
  • Exclude filter
  • File Date filter
  • File Owner filter

Answer : File Size filter Exclude filter File Date filter

Refer to the following information: OnlineTimeoutInterval = 60 OnlineRetryLimit = 2 MonitorInterval = 120 RestartLimit = 0 What will occur if an application takes 70 seconds to come online during the online process?


Options are :

  • The application will come online without any issues.
  • The application will fail to be brought online and will try again.
  • The applications monitor will timeout and cause the application to failover.
  • The application will fail to be brought online and will attempt to failover to another cluster node.

Answer : The application will fail to be brought online and will try again.

What is a limitation of using the web-based installer?


Options are :

  • The server where the web browser is launched must be the same operating system as the target system.
  • The web-based installer can only be used to perform standard upgrades.
  • The Veritas XPortal Server process must be started on the target server.
  • The server where the installation is launched must be the same operating system as the target system.

Answer : The server where the installation is launched must be the same operating system as the target system.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

What is a situation that can be monitored by both Network Monitor and Endpoint Prevent?


Options are :

  • An employee uses AIM to send an instant message while off the corporate network.
  • An employee uses Internet Explorer 7 to send confidential data from a Gmail account
  • An employee uses a Chrome 2 browser to post confidential data to a newsgroup
  • An employee uses Skype to send an instant message to a friend at a competitor site.

Answer : An employee uses Internet Explorer 7 to send confidential data from a Gmail account

Which configuration has the lowest percentage of active nodes?


Options are :

  • 7+1 (8 nodes with one spare)
  • active-active (2 nodes)
  • 6+2 (8 nodes with two spares)
  • active-passive (2 nodes)

Answer : active-passive (2 nodes)

A consultant assisted with the installation of a custom agent in the environment. They later sent a file to replace the online script for the custom agent. If the custom agent was called newapp, where would the online file be located?


Options are :

  • etc/VRTSvcs/conf/newapp/online
  • opt/VRTSvcs/bin/Application/online
  • opt/VRTSvcs/bin/newapp/online
  • etc/VRTSvcs/conf/Application/online

Answer : opt/VRTSvcs/bin/newapp/online

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 4

Which two standard Veritas Cluster Server resource types can determine if an application has unexpectedly exited? (Select two.)


Options are :

  • Process
  • Phantom
  • Proxy
  • Application
  • FileOnOff

Answer : Process Application

Which three describe an effective data loss prevention (DLP) program? (Select three.)


Options are :

  • Business stakeholders are held accountable for risk reduction
  • DLP is primarily driven by the Incident Response Team.
  • Employee participation is important.
  • DLP is a company-wide initiative.
  • DLP is primarily driven by Information Security.

Answer : Business stakeholders are held accountable for risk reduction Employee participation is important. DLP is a company-wide initiative.

GAB can be configured to automatically seed the cluster through I/O fencing, even when some cluster nodes are unavailable. In which file does the autoseed_gab_timeout parameter need to be configured to enable this feature?


Options are :

  • gabtab
  • main . cf
  • vxfentab
  • vxfenmode

Answer : vxfenmode

ST0-085 Symantec Security Information Manager 4.7 Technical Set 6

Which resource type can be used to mirror the state of another persistent resource?


Options are :

  • Phantom
  • RemoteGroup
  • Proxy
  • Mirror

Answer : Proxy

The hastatus command shows the nodes are in STALE_ADMIN_WAIT state. What is the cause of this condition?


Options are :

  • The main.cf file is missing from the configuration directory.
  • There is a syntax error in the main.cf configuration file.
  • The main.cf is inconsistent on the nodes in the cluster.
  • The configuration file main.cf was left open before restarting GAB.

Answer : There is a syntax error in the main.cf configuration file.

What are three benefits that data loss prevention solutions provide that other security technologies or tools do not? (Select three.)


Options are :

  • Give visibility into where sensitive data is stored
  • Indicate where sensitive data is being sent
  • Give insight into capacity planning for sensitive data
  • Identify who has access to sensitive data
  • Measure encryption strength for sensitive data

Answer : Give visibility into where sensitive data is stored Indicate where sensitive data is being sent Identify who has access to sensitive data

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 11

An administrator wants to change the name of an existing NIC resource from net0nic to net4nic. The resource is configured in the websg service group. What is the most efficient method to rename the NIC resource?


Options are :

  • hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic
  • hares -duplicate net0nic net4nic hares -delete net0nic
  • hares -ren net0nic net4nic
  • hares -copy net0nic net4nic hares -paste net4nic hares -delete net0nic

Answer : hares -add net4nic websg hares -modify net4nic Device eth0 hares -delete net0nic

Which three are examples of confidential data? (Select three.)


Options are :

  • Health information
  • National ID numbers
  • Published press releases
  • Manufacturing plant locations
  • CAD drawings

Answer : Health information National ID numbers CAD drawings

Why should Network Monitor be configured to filter out low-threat traffic?


Options are :

  • To verify that the filtering process is actually working
  • Because the product is unable to filter out high-threat traffic
  • To ensure that CPU cycles are spent processing high-threat traffic
  • Because no other traffic will be monitored until this is accomplished

Answer : To ensure that CPU cycles are spent processing high-threat traffic

ST0-247 Symantec Cluster Server 6.1 for UNIX Certifate Exam Set 8

In addition to creating an automated response rule, which action must a policy manager take for the rule to execute?


Options are :

  • Add the response rule to the appropriate policy
  • Enable Remediate Incidents privilege in the appropriate role
  • Turn on response rules from the Settings page
  • Click the Response Rule button to execute

Answer : Add the response rule to the appropriate policy

Under normal conditions, Veritas Cluster Server agents are started and stopped automatically. Which command is required to manually start an agent?


Options are :

  • hastart
  • hares
  • hatype
  • haagent

Answer : haagent

In a Veritas cluster, when all high priority links fail, the low priority links are promoted to high priority in which manner?


Options are :

  • in order by NIC name
  • in order as they appear in /etc/llttab
  • all simultaneously regardless of number
  • one at a time as required

Answer : all simultaneously regardless of number

251-312 Administration Symantec Backup Exec 12 Windows Exam Set 1

Which component do all Veritas Cluster Server agents use to communicate their status?


Options are :

  • IMF
  • HAD
  • LLT
  • GAB

Answer : HAD

What occurs when the hastop -local -force command is issued on the active node in a twonode active/passive cluster?


Options are :

  • The services will be shut down on the active node and brought up on the passive node.
  • The service group behavior will follow the value of the EngineShutdown attribute while HAD is stopped.
  • The services will continue to run on the active node while HAD is stopped.
  • The online service groups on the primary node are taken offline and remain offline until started manually.

Answer : The services will continue to run on the active node while HAD is stopped.

By default, which port does the Enforce Server use to connect to all detection servers?


Options are :

  • 1293
  • 443
  • 8000
  • 8100

Answer : 8100

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 6

Which attribute can be configured to allow a service group to come back online after a persistent resource has faulted and other nodes are unavailable?


Options are :

  • AutoRestart
  • AutoStart
  • OnlineRetry
  • AutoReset

Answer : AutoRestart

Which file is created by vxfen startup script when I/O fencing starts?


Options are :

  • vxgabtab
  • vxfendg
  • vxfentab
  • vxfenmode

Answer : vxfentab

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions