ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 11

How is the incident count for a new system managed in order to avoid overwhelming the incident response team?


Options are :

  • More than one policy is enabled.
  • Match count thresholds are set.
  • Incidents are auto-filtered to hide false positives.
  • Many incident responders are allowed access to the system.

Answer : Match count thresholds are set.

ST0-135 Symantec Network Access Controls Technical Exam Set 7

An administrator stopped Veritas Cluster Server (VCS) on the sym1 node to remove it from the cluster. When attempting to do this with the hasys -delete command from sym2, an error message is displayed. What is the likely cause of this error?


Options are :

  • VCS must be completely shut down on all nodes.
  • The vxfen daemon on sym1 is still running.
  • One or more SystemList attributes still contains sym1.
  • The GAB daemon on sym1 is still running.

Answer : One or more SystemList attributes still contains sym1.

Which three options can incident responders select when deleting incidents? (Select three.)

A. Delete the incident completely

B. Delete the original message and retain the incident

C. Delete the incident and retain the violating attachments or files

D. Delete the incident and export incident details to .csv file

E. Delete the non-violating attachments or files and retain the incident


Options are :

  • D,C,A
  • C,A,B
  • B,E,D
  • A,B,E
  • C,B,A

Answer : A,B,E

What is the first step when upgrading the operating system on a single node in a running multinode Veritas Cluster Server (VCS) cluster?


Options are :

  • Freeze the service groups
  • Offline service groups on the node
  • Shut down VCS on all nodes
  • Migrate parallel service groups

Answer : Offline service groups on the node

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Under which high-level node in the left navigation panel can administrators find the System Events report?


Options are :

  • Reports
  • Policy
  • System Health
  • Administration

Answer : Administration

A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due to network reconfiguration. What is the correct order for the cluster and heartbeat protocols to be shut down?


Options are :

  • Fencing --> VCS --> GAB --> LLT
  • VCS --> Fencing --> GAB --> LLT
  • VCS --> Fencing --> LLT --> GAB
  • Fencing --> VCS --> LLT --> GAB

Answer : VCS --> Fencing --> GAB --> LLT

A resource of type Application is configured to be monitored by the Intelligent Monitoring Framework. Which resource attribute should be exclusively configured in order to enable the Proactive Prevention of Concurrency feature for the resource of type Application?


Options are :

  • Monitor Program
  • Pid Files
  • Start Program
  • Monitor Processes

Answer : Monitor Processes

250-352 Administration of Storage Foundation and HA 6.0 Test Set 7

What should be done before removing a resource named webdg from a running service group?


Options are :

  • All child resources of webdg must be taken offline.
  • All parent resources of webdg must be taken offline.
  • The service group must be disabled.
  • The service group must be taken offline.

Answer : All parent resources of webdg must be taken offline.

The loadwarning trigger has been configured for all cluster systems, and all service groups have been configured for load. The current load on a system is 135, which is the maximum possible load on a system for this configuration, and the load has been observed for 10 minutes. The following system attributes have been set for all cluster nodes:Capacity = 150LoadWarningLevel = 80LoadTimeThreshold = 300Under which condition will the loadwarning trigger be invoked?


Options are :

  • The trigger will be invoked after 135 seconds.
  • The trigger will be invoked after 240 seconds.
  • The trigger will never be invoked.
  • The trigger will be invoked after 300 seconds.

Answer : The trigger will be invoked after 300 seconds.

The Veritas Cluster Server (VCS) notifier resource and VCS triggers can be configured to generate messages to assist in VCS administration. Which other facility can be a source of notifications within a comprehensive VCS implementation?


Options are :

  • Cluster Manager Java console
  • Veritas Enterprise Manager
  • Storage Foundation Manager
  • Veritas Operations Manager

Answer : Veritas Operations Manager

250-352 Administration of Storage Foundation and HA 6.0 Test Set 4

Which Preferred Fencing policy should be configured to ensure that the node with the preferred application survives a fencing event?


Options are :

  • PreferredFencingPolicy = Site
  • PreferredFencingPolicy = Disabled
  • PreferredFencingPolicy = Group
  • PreferredFencingPolicy = System

Answer : PreferredFencingPolicy = Group

Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?


Options are :

  • Fencing
  • Agent Server
  • Agent Tester
  • Simulator

Answer : Fencing

When configured as default, the Veritas Cluster Server Notifier receives queued messages on a schedule every how many minutes?


Options are :

  • Ten
  • Three
  • Five
  • One

Answer : Three

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 6

What does a data loss prevention solution help an organization identify? (Select three.)

A. Employee education opportunities

B. Risk of virus infection

C. Unprotected content on laptops

D. Illegally obtained software on desktops

E. Encryption enforcement opportunities


Options are :

  • A,C,B
  • C,B,D
  • E,B,A
  • A,C,E
  • C,D,B

Answer : A,C,E

Two clusters are both running the same operating system and version of Veritas Cluster Server. A service group in one cluster depends on a service group in the other cluster. Which method can be used to manage the service group relationship?


Options are :

  • RemoteCluster agent
  • RemoteGroup agent
  • RemoteGroup trigger
  • CrossCluster trigger

Answer : RemoteGroup agent

The I/O fencing configuration for a Veritas cluster uses one Coordination Point (CP) server and two local coordinator disks. There are two network connections between the cluster and the CP server. A resource of type CoordPoint has been configured in the cluster using all default resource attribute values. Which resource attribute value for the resource of type CoordPoint needs to be modified so that the resource will fault only when both network connections to the CP server fail even though the coordination disks are still accessible?


Options are :

  • Tolerance Limit
  • Fencing Tolerance
  • Fault Tolerance
  • Fencing Limit

Answer : Fault Tolerance

ST0-91W ST0-91W Symantec NetBackup 7.0 For Windows Exam Set 11

The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack. In what order should the components be stopped?


Options are :

  • I/O fencing, VCS, GAB, LLT
  • LLT, GAB, I/O fencing
  • VCS, I/O fencing, LLT, GAB
  • VCS, I/O fencing, GAB, LLT

Answer : VCS, I/O fencing, GAB, LLT

Which Veritas Cluster Server event trigger is always invoked on the system where the event occurred?


Options are :

  • nofailover
  • postonline
  • violation
  • sysoffline

Answer : postonline

An additional email address was added to the Veritas Cluster Server notifier resource without any other actions being taken. All but one user is receiving notifications. How can this problem be solved?


Options are :

  • Restart the SNMP daemon
  • Restart the HAD daemon
  • Restart the notifier resource
  • Refresh the mailbox of the impacted user

Answer : Restart the notifier resource

250-254 Administration of Symantec Cluster Server 6.1UN Exam Set 7

Offline configuration changes made to Veritas Cluster Server (VCS) are missing when viewing it in one of the GUIs or the CLI.What is the likely cause of this issue?


Options are :

  • VCS was started on the node without the changes being made.
  • VCS was started on the node with the lowest priority in the SystemList.
  • VCS was started on the node where the changes were made.
  • VCS was started on the node with the highest priority in the SystemList.

Answer : VCS was started on the node without the changes being made.

Which two capabilities does the Veritas Cluster Manager Java console provide when used with the Veritas Cluster Server (VCS) Simulator and a simulated cluster that are unavailable when using the Veritas Cluster Manager Java console with a live cluster configuration? (Select two.)

A. System power on and off

B. Remove a system

C. Fault a resource

D. Run a virtual firedrill

E. Copy a service group


Options are :

  • B,D
  • C,E
  • A,C
  • E,D
  • A,B

Answer : A,C

Which detection server requires the use of two network card ports?


Options are :

  • Discover Server
  • Network Monitor Server
  • Network Prevent Server
  • Endpoint Server

Answer : Network Monitor Server

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 2

How many levels deep can a service group dependency tree be?


Options are :

  • 1
  • 7
  • 5
  • 3

Answer : 5

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)

A. Endpoint: Notify

B. Protect: Copy File

C. Network: Block HTTP/HTTPS

D. Protect: Quarantine File

E. Endpoint: Block

F. Network: Remove HTTP/HTTPS Content


Options are :

  • A,E
  • D,C
  • B,D
  • A,E
  • B,C

Answer : A,E

What is a likely outcome of filtering network traffic in Network Monitor?


Options are :

  • increase in Network Monitor demand for RAM
  • decrease in the detection accuracy
  • monitoring of outbound traffic before inbound traffic
  • monitoring of traffic important to the customer

Answer : monitoring of traffic important to the customer

ST0-085 Symantec Security Information Manage Technical Exam Set 4

Which type of Veritas Cluster Server service group dependency permits a parent group to be brought online when the child group is offline?


Options are :

  • Online local
  • Online remote
  • Offline remote
  • Offline local

Answer : Offline local

Where does an incident responder find the exact matches that triggered an incident?


Options are :

  • Incident List
  • Incident Snapshot
  • System Events report
  • Dashboard report

Answer : Incident Snapshot

What is an advantage of using Endpoint Discover over Network Discover?


Options are :

  • Ability to scan online machines
  • Ability to scan many machines in parallel
  • What is an advantage of using Endpoint Discover over Network Discover?
  • Ability to schedule the scans

Answer : Ability to scan many machines in parallel

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 4

Which three products support virtualization and can be run on virtual machines? (Select three.)

A. Endpoint Discover

B. Network Discover

C. Network Prevent (Web)

D. Network Monitor

E. Network Prevent (Email)


Options are :

  • B,C,E
  • A,B,D
  • E,A,C
  • D,B,C
  • A,B,E

Answer : B,C,E

Which two are valid settings for FailoverPolicy? (Select two.)

A. Priority

B. RoundRobin

C. Order

D. Failover

E. Dynamic


Options are :

  • C,E
  • E,B
  • D,A
  • C,D
  • A,B

Answer : A,B

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions