ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 4

Which product lets an incident responder see who has access to confidential files on a public file share?


Options are :

  • Network Discover
  • Network Monitor
  • Network Protect
  • Network Prevent

Answer : Network Discover

ST0-085 Symantec Security Information Manager Practice Exam Set 2

What is commonly observed during the Notification phase of Risk Reduction?


Options are :

  • a significant drop in incident volume
  • more business unit involvement
  • improved business processes
  • improved employee communication

Answer : a significant drop in incident volume

An administrator needs to set up a service group dependency with the following characteristics: The parent group depends on the child group being online on the same system.If the child group faults, the parent group should be taken offline.If the parent group faults, then the child group should go offline.Which type of dependency is this?


Options are :

  • Online local hard
  • Online global firm
  • Online global soft
  • Online local firm

Answer : Online local hard

Under which condition can a service group be AutoDisabled?


Options are :

  • When hashadow cannot restart HAD on a system
  • When the system is in a jeopardy membership
  • When a firm service group dependency exists between two service groups and the child service group fails
  • When a firm service group dependency exists between two service groups and the parent service group fails

Answer : When hashadow cannot restart HAD on a system

ST0-085 Symantec Security Information Manager Technical Exam Set 3

A two-node Veritas Cluster with I/O fencing configured has two service groups running, one on each node. What happens when all heartbeat links are lost simultaneously?


Options are :

  • All service groups fault and shut down.
  • All nodes race for the data disks, and one node panics.
  • All service groups remain where they are.
  • All nodes race for the coordinator disks, and one node panics.

Answer : All nodes race for the coordinator disks, and one node panics.

What is the master administrator user (created during installation) unable to do?


Options are :

  • Dave custom reports and then share them with others in the system
  • Create an incident responder role that sees incidents only from Endpoint Discover scans
  • Create a policy author role that has access to just one policy group
  • Remove a detection server from system configuration without uninstalling the detection server

Answer : Dave custom reports and then share them with others in the system

Which feature of VCS can prevent overloading of a system's resources in the event of service group failover?


Options are :

  • Parallel Service Groups
  • Limits
  • Capacities
  • Load Failover Policy

Answer : Limits

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 4

Which three does the Environment Check Utility (ECU) provide? (Select three.)

A. Software build numbers

B. System events records

C. Days remaining on the current license

D. Operating system version of servers

E. Installation configuration settings


Options are :

  • A,D,E
  • C,D,A
  • D,B,C
  • B,E,A
  • E,A,C

Answer : A,D,E

When architecting Coordination Point (CP) server into a Veritas Cluster Server (VCS) environment, what should be done to ensure the CP service remains online?


Options are :

  • configure CP server as a resource in a VCS cluster
  • ensure that the CP server is backed up regularly
  • configure multiple CP server instances on the same node
  • ensure that the CP server is on a reliable network

Answer : configure CP server as a resource in a VCS cluster

What is a function of the Enforce Server?


Options are :

  • deploys agents to endpoint computers
  • provides a GUI for policy creation
  • detects incidents
  • writes incidents to all detection servers

Answer : provides a GUI for policy creation

ST0-91W Symantec NetBackup 7.0 for Windows Practice Exam Set 2

The administrator of a four-node Veritas cluster has configured notifications as highly available for all notification methods. How many notification manager resources are running when all nodes are considered?


Options are :

  • 1
  • 2
  • 8
  • 4

Answer : 1

What is the impact to unsaved configuration changes in Veritas Cluster Server when an administrator stops the cluster with a force option from the command-line interface?


Options are :

  • Changes are prompted to be discarded.
  • Changes are automatically discarded.
  • Changes are prompted to be saved.
  • Changes are automatically saved.

Answer : Changes are automatically discarded.

What should an administrator do when the License Key expires?


Options are :

  • Edit the key in the VontuManager.conf file
  • Enter a new key on the System Settings page
  • Edit the key in the Protect.properties file
  • Enter a new key on the Advanced Settings page

Answer : Enter a new key on the System Settings page

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 4

Two resources of type Process named web1proc and web2proc are configured in the failover websg service group and are online on the sym1 cluster node. The web2proc resource is linked as dependent on the web1proc resource, and the Critical resource attribute of the web2proc is modified from the default value. Resource restart is set to the default value. What are the states of the web1proc and web2proc resources on the sym1 cluster node after shutting down the process managed by the web2proc from outside of Veritas Cluster Server?


Options are :

  • web1proc is online, and web2proc is online.
  • web1proc is faulted, and web2proc is offline.
  • web1proc is online, and web2proc is faulted.
  • web1proc and web2proc are both faulted.

Answer : web1proc is online, and web2proc is faulted.

Which three protocols are system-configured and are recognized by Network Monitor by their individual signatures? (Select three.)

A. FTP

B. IM: ICQ

C. IM: AIM

D. NNTP

E. TFTP


Options are :

  • E,B,C
  • A,C,D
  • D,C,A
  • E,B,C
  • D,A,B

Answer : A,C,D

An administrator has a three-node cluster.The cluster manages an application that depends on a database.The application and database can be online on the same or a different node.If the database faults, the application must continue to be online.Which type of service group dependency should be created to ensure this behavior?


Options are :

  • Online global firm, where the application is the parent
  • Online global soft, where the database is the parent
  • Online global soft, where the application is the parent
  • Online global firm, where the database is the parent

Answer : Online global soft, where the application is the parent

ST0-91W Symantec NetBackup 7.0 for Windows (STS) Test Set 7

Which text files are created at the end of a successful run of installvcs -installonly? (Choose three.)

A. Log

B. Response

C. Gabtab

D. Llttab

E. Summary


Options are :

  • E,A,C
  • C,D,B
  • C,D,A
  • A,D,E
  • A,B,E

Answer : A,B,E

Which two triggers can only be enabled at the resource level? (Select two.)

A. resrestart

B. resadminwait

C. resfault

D. resstatechange

E. resnotoff


Options are :

  • B,C
  • A,B
  • B,E
  • A,D
  • C,E

Answer : B,E

The administrator is tasked with manually reconfiguring LLT heartbeats over UDP. Which two requirements must be met to make this possible? (Select two.)

A. The LLT private links must be on the same subnet.

B. Each NIC must have an IP address configured before configuring LLT.

C. The VRTSvcsudp package must be installed.

D. Each link must have a unique, not well-known UDP port.

E. The /etc/llttab file must be renamed to /etc/llttab.udp.


Options are :

  • C,E
  • A,B
  • C,A
  • B,D
  • C,D

Answer : B,D

ST0-237 Symantec Loss Prevention Technical Assessment Exam Set 11

Under which high-level node in the left navigation panel can administrators find the Discover Targets page?


Options are :

  • Administration
  • Policy
  • Data at Rest
  • Reports

Answer : Policy

Which resource type attributes can be set in order to tune VCS failover characteristics? (Choose two.)

A. Flags

B. RestartLimit

C. ToleranceLimit

D. OfflineTimeout

E. OfflineMonitorInterval


Options are :

  • B,C
  • E,A
  • B,D
  • D,A
  • C,D

Answer : B,C

Which types of monitoring can be performed on Oracle resources? (Choose two.)

A. Detail monitoring

B. Basic level monitoring

C. Kernel level monitoring

D. Specific monitoring

E. Service monitoring


Options are :

  • D,E
  • A,B
  • C,D
  • E.A
  • B,C

Answer : A,B

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 1

Where can an incident responder find the policy rules and/or exceptions that were in effect when a particular incident was detected?


Options are :

  • Policy Summary report
  • Policy page
  • Incident Snapshot
  • Incident List

Answer : Incident Snapshot

Which components are installed when you execute the installvcs script? (Choose two.)

A. Bundled agents

B. Database agents

C. Cluster file system

D. Gab driver

E. Cluster volume manager


Options are :

  • D,A
  • A,D
  • B,E
  • C,B
  • C,A

Answer : A,D

Which kind of detection server can block file transfer protocol (FTP) requests?


Options are :

  • Web Prevent Server
  • Network Monitor Server
  • Email Prevent Server
  • Endpoint Prevent Server

Answer : Web Prevent Server

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 9

Endpoint Prevent and Endpoint Discover are competing for resources on an endpoint computer, how does the system resolve the conflict?


Options are :

  • Endpoint Discover pauses any scans if resources are needed.
  • Endpoint Prevent queues files until resources are available.
  • Endpoint Prevent pauses detection until any scans complete.
  • Endpoint Discover copies all files for later analysis.

Answer : Endpoint Discover pauses any scans if resources are needed.

Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?


Options are :

  • in the System Event
  • in the Marker File
  • in the Incident Snapshot
  • in the Discover Target configuration

Answer : in the Incident Snapshot

A system administrator can see basic incident data, but is unable to view any of the specific details of the incidents that are created. How is the role configured?


Options are :

  • The Edit option is deselected in the General tab.
  • Status and custom attributes are selected, but set to Edit.
  • Conditions are configured in the Incident Access tab.
  • The View option is selected, but Display Attributes are deselected.

Answer : The View option is selected, but Display Attributes are deselected.

ST0-135 Symantec Network Access Control 12 Technical Exam Set 5

During a test of a NIC resource the VCS engine log indicates that the service group and the IP resource enter the FAULTED state on all systems in the cluster. The NIC resource enters the ONLINE state after the root cause of the fault is corrected. Which default attribute setting allows the service group to attempt to start without manual intervention?


Options are :

  • Auto Start
  • Auto Failover
  • Auto Clear
  • Auto Restart

Answer : Auto Restart

VCS is to be installed in a secure environment where remote installation between systems is impossible. The VCS configuration parameters were captured in a file using the installation script on the first system. What can be used to read the contents of the configuration file when executing locally on the remaining systems?


Options are :

  • -configfile
  • -vcsconfig
  • -autoconfig
  • -responsefile

Answer : -responsefile

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions