ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 10

The log files used to verify that a custom application is being properly monitored are located in which directory?


Options are :

  • /opt/VRTSvcs/log/
  • /opt/VRTSvcs/agent/log/
  • /var/VRTSvcs/log/
  • /var/VRTSvcs/agent/log/

Answer : /opt/VRTSvcs/log/

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 3

What are two operating systems supported by Veritas Cluster Server? (Select two.)

A. Fedora

B. Red Hat Enterprise Server

C. openSuSe

D. Mac OS

E. AIX


Options are :

  • B,E
  • B,D
  • A,C
  • D,A
  • C,E

Answer : B,E

Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?


Options are :

  • Users tab
  • Incident Access tab
  • General tab
  • Policy Management tab

Answer : General tab

What is a characteristic of an application that is to be clustered with Veritas Cluster Server?


Options are :

  • It must have the ability to be monitored.
  • It must have the ability to store all required data and configuration information on shared disks.
  • It must have the ability to store all required data on SATA disks.
  • It must have the ability to copy configuration information between cluster nodes.

Answer : It must have the ability to be monitored.

ST0-085 Symantec Security Information Manage Technical Exam Set 4

An application is experiencing failures. The application administrator wants Veritas Cluster Server to take all resources offline after failure. The application should remain offline. Which attribute can accomplish this?


Options are :

  • Critical
  • Manage Faults
  • Auto Failover
  • Fail Over Policy

Answer : Auto Failover

Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)

A. Ability to run on multiple independent servers

B. Remote monitoring capability

C. Data stored on internal disks

D. Well-defined start and stop procedures

E. Refresh capability after sudden failures


Options are :

  • B,A
  • A,E
  • E,C
  • D,C
  • A,D

Answer : A,D

Which two traffic feed sources should be used for Network Monitor? (Select two.)

A. Test Access Port (TAP)

B. trunking port on a hub

C. Switched Port Analyzer (SPAN) port

D. router LAN port

E. tunneled port on a VPN router


Options are :

  • A,C
  • C,D
  • D,B
  • E,A
  • B,D

Answer : A,C

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 8

What information must be specified when adding a resource to a service group?


Options are :

  • Service group name
  • Attribute values
  • System name
  • Cluster identifier

Answer : Service group name

Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?


Options are :

  • Directory Group Matching (DGM)
  • Indexed Document Matching (IDM)
  • Described Content Matching (DCM)
  • Exact Data Matching (EDM)

Answer : Indexed Document Matching (IDM)

Which statement describes a DLP Agent encryption feature?


Options are :

  • DLP Agent-to-server communication uses Secure Socket Layer (SSL).
  • The key size is standard and unconfigurable.
  • The system administrator can generate a unique authentication key.
  • The key is randomly generated for the agent store.

Answer : The system administrator can generate a unique authentication key.

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 7

What are two resource types that Proxy resources can reference? (Select two.)

A. NIC

B. IP

C. Quorum

D. DNS

E. ElifNone


Options are :

  • C,B
  • D,A
  • A,E
  • A,D
  • B,E

Answer : A,E

Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?


Options are :

  • Proxy
  • Custom
  • Local
  • Global

Answer : Local

Only two local disks suitable for use as coordinator disks are available for a local muti-node cluster. Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/O fencing configuration? (Select two.)

A. One-node CP server cluster with GAB and LLT configured

B. One-node CP server cluster with only LLT configured

C. Second network connection to the CP server cluster

D. Multi-node CP server cluster

E. I/O fencing on the CP server cluster


Options are :

  • C,D
  • A,B
  • B,C
  • E,A
  • D,E

Answer : C,D

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 1

While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)

A. User security

B. Inability to handle load on failover

C. Cluster upgrades

D. Operational complexity

E. Network connectivity


Options are :

  • C,A
  • D,C
  • B,D
  • A,B
  • E,B

Answer : B,D

When setting different severity levels, which level should be set as the default?


Options are :

  • The lowest level the policy manager wants to assign
  • The lowest level available in the system
  • The highest level available in the system
  • The highest level the policy manager wants to assign

Answer : The lowest level the policy manager wants to assign

How can an incident responder remediate multiple incidents simultaneously?


Options are :

  • By selecting a Smart Response on the Incident Snapshot page
  • By selecting a Smart Response on an Incident List report
  • By selecting the Find Similar command on the Incident Snapshot page
  • By selecting an Automated Response on an Incident List report

Answer : By selecting a Smart Response on an Incident List report

250-400 Administration Altiris Client Management Suite Exam Set 3

To which file system folder does PacketCapture write reconstructed SMTP messages?


Options are :

  • drop_discover
  • drop_ttd
  • drop_pcap
  • drop

Answer : drop_pcap

Which detection method includes keyword rules?


Options are :

  • Indexed Document Matching (IDM)
  • Exact Data Matching (EDM)
  • Directory Group Matching (DGM)
  • Described Content Matching (DCM)

Answer : Described Content Matching (DCM)

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files). Which two Discover target configuration mistakes might be causing the problem? (Select two.)

A. The sharelist excludes all directories on the host being scanned.

B. The Quarantine/Copy Share credentials are invalid.

C. The Default credentials are invalid.

D. The Copy option is selected.

E. The Protect credential is unspecified.


Options are :

  • C,B
  • A,B
  • B,E
  • D,A
  • D,C

Answer : B,E

250-405 Administration of Symantec Management Platform Test Set 3

How is Intelligent Monitoring Framework configured?


Options are :

  • It needs to be manually configured on each cluster node.
  • It is automatically configured but only on supported agents.
  • It needs to be manually configured on each agent.
  • It is automatically configured on all agents.

Answer : It is automatically configured but only on supported agents.

What is a characteristic of the web-based installer?


Options are :

  • It can be automated with a response file.
  • It runs the same commands as the command line installer.
  • It can be run using Internet Explorer, Firefox, or Safari.
  • It can install on multiple operating systems at the same time.

Answer : It runs the same commands as the command line installer.

What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?


Options are :

  • All node IDs must be unique across the clusters.
  • Cluster IDs must be unique across the clusters.
  • All LLT node IDs must be unique across the clusters.
  • GAB network IDs must be unique across the clusters.

Answer : Cluster IDs must be unique across the clusters.

ST0-135 Symantec Network Access Technical Assesment Exam Set 5

Which actions are required to enable a service group to run on all systems in a cluster simultaneously?


Options are :

  • Take the service group offline, add all cluster systems to the AutoStartList, and bring the service group back online with the -all option
  • Run the hagrp -modify [service group] Parallel 1 command and the service group will automatically restart on all systems
  • Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all cluster systems, and restart Veritas Cluster Server
  • Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the Auto Start List, and restart Veritas Cluster Server

Answer : Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the Auto Start List, and restart Veritas Cluster Server

Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?


Options are :

  • LLT
  • GAB
  • HAD
  • IMF

Answer : HAD

Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism. Thinking specifically about data disks, which two cluster configuration requirements must be met to implement this? (Select two.)

A. The application using the disks must be managed by a VCS Application resource type.

B. The disks must be in a Veritas Volume Manager disk group.

C. The service group containing the disks must include an IP resource.

D. The disks must be managed by a VCS DiskGroup resource type.

E. The disks must contain at least one *.dbf file.


Options are :

  • B,D
  • A,C
  • A,B
  • D,E
  • B,E

Answer : B,D

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 13

An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?


Options are :

  • Quorum
  • Prerequisites
  • Round Robin
  • Priority

Answer : Round Robin

Which data locations should an organization scan first?


Options are :

  • Private individual directories
  • Regionalized repositories
  • Password protected shares
  • Centralized repositories

Answer : Centralized repositories

Where can an incident responder view all actions that have occurred for an incident?


Options are :

  • Incident Actions
  • Auditilog Table
  • Incident Snapshot
  • System Events

Answer : Incident Snapshot

250-405 Administration of Symantec Management Platform Exam Set 6

On which system can you set UseMpathd=1 in a MultiNICB resource?


Options are :

  • AIX
  • Solaris
  • Linux
  • HP_UX

Answer : HP_UX

Discover Servers can leave Marker Files for files moved to the quarantine location. Which file types retain their file extension and the corresponding icon in the Marker File?


Options are :

  • Microsoft Office documents
  • All file types configured in Windows Explorer on the detection server host
  • Text files, including source code in Java, C, and shell script
  • File types specified in the ProtectRemediation.properties file

Answer : File types specified in the ProtectRemediation.properties file

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions