ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Test Set 9

What does Network Monitor use to identify network traffic going to a nonstandard port?


Options are :

  • Total packet size
  • Either UDP or TCP
  • The originating domain
  • Protocol signature

Answer : Protocol signature

ST0-247 Symantec Cluster Server 6.1 for UNIX Technical Exam Set 4

What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?


Options are :

  • Immediate notification of resource state change
  • Monitoring of resources without need of configuration
  • Monitoring of resources running on remote clusters
  • Prevention of concurrency violations

Answer : Immediate notification of resource state change

Refer to the following service group example:group websg (SystemList = { sym1 = 0, sym2 = 1 }AutoStart = 0AutoStartList = { sym2 })DiskGroup webdg (DiskGroup = webdg)IP webip (Device = eth0Address = "169.254.128.12"NetMask = "255.255.255.0")Mount webmnt (MountPoint = "/web1"BlockDevice = "/dev/vx/dsk/webdg/webvol"FSType = vxfsMountOpt = rwFsckOpt = "-y")NIC webnic (Device = eth0)Application webproc (MonitorProgram = "/usr/local/bin/web -monitor"StartProgram = "/usr/local/bin/web -start"StopProgram = "/usr/local/bin/web -stop")webip requires webprocwebproc requires webmntwebip requires webnicwebmnt requires webdgWhich resource will start online last?


Options are :

  • webip
  • webproc
  • webmnt
  • webdg

Answer : webip

Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?


Options are :

  • Network Discover
  • Network Prevent
  • Network Monitor
  • Network Protect

Answer : Network Protect

ST0-10X Veritas Storage Foundation 5 for Unix Practice Test Set 1

How does a system administrator verify that a Network Monitor Server is healthy?


Options are :

  • By checking Incident Queue and Message Wait Time on the System Overview page
  • By determining whether system alert message emails are generated or received
  • By reviewing the results of the Environmental Check Utility (ECU)
  • By verifying the configuration details of the System Settings page

Answer : By checking Incident Queue and Message Wait Time on the System Overview page

Which resource type creates a dependency between applications that are configured in different Veritas Cluster Server clusters?


Options are :

  • Application
  • Phantom
  • Remote Group
  • Proxy

Answer : Remote Group

An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices. Which types of resources should the administrator consider to configure in the service group?


Options are :

  • Application, Volume, Disk Group, IP, Phantom
  • Application, File System, Volume, Disk Group, IP, NIC
  • Application, File System, Volume, Disk Group, IP, Proxy
  • Application, Volume, Disk Group, IP, Proxy

Answer : Application, Volume, Disk Group, IP, Proxy

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 10

Which service group attribute enables specifying preferred nodes for failover?


Options are :

  • International Online List
  • System Zones
  • Auto start List
  • Cluster List

Answer : System Zones

Which three statements apply to communication between the Enforce Server and detection servers? (Select three.)

A. By default, the Enforce Server and the detection servers communicate over port 8100.

B. Port 3389 must be open between the Enforce Server and the detection servers.

C. The same port number must be used for all detection servers.

D. The servers can be configured to use any port higher than 1024.

E. IPSec must be configured on the Enforce Server and the detection servers.


Options are :

  • C,A,D
  • B,D,C
  • E,C,A
  • E,B,D
  • A,C,D

Answer : A,C,D

Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offline unexpectedly before faulting the resource?


Options are :

  • Auto Restart
  • Restart Limit
  • Retry Limit
  • Auto Restart Limit

Answer : Restart Limit

ST0-135 Symantec Network Access Technical Assesment Exam Set 1

An employee received the following email notification:**************************************************************************************************************** ********Dear Bob,Your email to [email protected] with subject Account Info you requested violates the company's Customer Data Protection policy. If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy. Please note that this violation has also been reported to your manager. Confidential data protection is every employee's responsibility.Thank you,Corporate Information Security Team**************************************************************************************************************** ********Which recommended item is missing from this email notification?


Options are :

  • The severity of the violation
  • The affected business unit
  • A contact person
  • The name of the file that caused the violation

Answer : A contact person

Which Storage Foundation feature is used to send data changes to a remote site via an IP network?


Options are :

  • Storage Replicator
  • Replication Exec
  • Volume Replicator
  • Nat Backup

Answer : Nat Backup

An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites. If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?


Options are :

  • One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
  • One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site
  • One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
  • Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site

Answer : One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 10

What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)

A. Cluster File System Option enabled

B. Arrays with SCSI3-PR enabled

C. A minimum of two private heartbeat connections

D. LUNs visible within the vxdisk list output

E. LUNs validated with the hacf -verify command


Options are :

  • E,B
  • D,C
  • B,D
  • C,A
  • A,D

Answer : B,D

What is a feature of keyless licensing?


Options are :

  • It requires an accessible Veritas Operations Manager (VOM) server.
  • It requires that at least one key be installed on each cluster host.
  • It works on all versions of Veritas Cluster Server.
  • It must be enabled before installation of Veritas Cluster Server.

Answer : It requires an accessible Veritas Operations Manager (VOM) server.

How can a system administrator obtain the log files for a detection server? (Select three.)

A. Run the Log Collection Utility (LCU)

B. Navigate to the logs directory

C. Click Fetch Latest on the Server Detail page

D. Select Logs under Administration node

E. Download logs from the System Overview page


Options are :

  • A,B,C
  • E,D,A
  • B,C,D
  • E,A,D
  • D,C,A

Answer : A,B,C

ST0-237 Symantec Data Loss Prevention 12 Technical Test Set 7

When run in a two node cluster, what does the lltstat -nvv command show?


Options are :

  • LLT information for any cluster nodes attached to the same switch
  • only LLT information for nodes verified by Veritas Cluster Server to be active
  • only LLT information for the node the command was run on
  • LLT information for all configured nodes in the cluster

Answer : LLT information for all configured nodes in the cluster

On a cluster, what does the following command display? Hares -display -ovalues


Options are :

  • all uncommitted resource attributes
  • all default resource attributes
  • all online resource attributes
  • all overridden resource attributes

Answer : all overridden resource attributes

What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?


Options are :

  • If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.
  • If any detection server in the system is running, the agent automatically connects to it after a period of time.
  • If any Endpoint Server is running, the agent automatically connects to it after a period of time.
  • If any detection server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

Answer : If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it after a period of time.

ST0-248 Symantec Storage Foundation 6.1 UNIX Technical Exam Set 2

Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)

A. Examine the online log file

B. Examine the engine log file

C. View the Security Log from the VCS Java GUI

D. View the Log Desk from the VCS Java GUI

E. View the Application_A.log file


Options are :

  • A,C
  • B,D
  • C,B
  • E.A
  • D,A

Answer : B,D

An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed. Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)

A. configure the operating system to automatically mount the file systems involved

B. configure the Mount Point, Block Device, FS Type, and Fsck Opt attributes for all the file systems

involved

C. link the application resource to the file system resources, with appropriate dependencies

D. uncon figure the operating system to automatically mount the file systems involved

E. set up the appropriate file system contention mechanism in the correct sequence


Options are :

  • E,C
  • B,D
  • A,B
  • A,C
  • D,E

Answer : B,D

Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)

A. The ability to monitor each instance of the application independently

B. The ability to be installed on shared storage

C. The ability to determine if the application is running

D. The ability to notify the administrator of the state

E. The ability to disconnect users from the application


Options are :

  • E,A
  • B,E
  • D,B
  • C,A
  • A,C

Answer : A,C

ST0-237 Symantec Loss Prevention Technical Practice Exam Set 12

Which Network Protect feature is a system administrator unable to configure?


Options are :

  • Location of quaratined files
  • Ability to copy files
  • Content of the file marker
  • Ability to restore files

Answer : Ability to restore files

Symantec Operation Readiness Tools (SORT) provides which service?


Options are :

  • It automates installation of product updates.
  • It manages notifications for changes in patches.
  • It stores operating system patches required for upgrade.
  • None of the Above
  • It maintains common config files required for Disaster Recovery.

Answer : It manages notifications for changes in patches.

Which type of resources are considered by Veritas Cluster Server when determining whether a service group is online?


Options are :

  • On Only
  • On Off
  • Persistent
  • None

Answer : On Off

250-371 Administration Symantec NetBackup 7.5 Windows Exam Set 5

What is the main benefit of installing and using the Symantec Management Platform for managing DLP Agents?


Options are :

  • The ability to reconfigure the agent filters
  • The ability to supervise how agents are used
  • The ability to easily manage agents remotely
  • The ability to view the health status of the agents

Answer : The ability to easily manage agents remotely

How is a policy applied to files found in Network Discover scans?


Options are :

  • By choosing the correct detection servers to run the scans
  • By choosing the correct policies in the scan target
  • By assigning policies to the Network Discover Server
  • By assigning policy groups to the scan target

Answer : By assigning policy groups to the scan target

Which two are characteristics of a Veritas Cluster Server resource? (Select two.)

A. Corresponds to a hardware or software component

B. Allows cyclical dependencies without a clear starting point

C. Allows only persistent resources to be a parent

D. Has a unique name throughout the cluster

E. Has a single entry point that the agent uses to control the resource


Options are :

  • B,C
  • A,D
  • E,A
  • D,C
  • A.E

Answer : A,D

ST0-91W ST0-91W Symantec NetBackup 7.0 for Windows Exam Set 1

What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?


Options are :

  • The ProPCV attribute is prevented from being changed when the service group is active.
  • The MonitorProcesses attribute must be configured for the Application resource type.
  • The MonitorProgram attribute must be configured for the Application resource type.
  • The Mode value for the IMF attribute of the Application type resource is set to 1.

Answer : The MonitorProcesses attribute must be configured for the Application resource type.

Given a service group with all resources online, what should be done to prevent the top resource in a dependency tree from causing a failover when it is taken offline outside the cluster?


Options are :

  • Freeze the resource
  • Freeze the node
  • Disable the dependency links for the resource
  • Set the Critical attribute for the resource to 0

Answer : Set the Critical attribute for the resource to 0

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions