20
Vendor: Symantec Exam Code: 250-253 Exam Name: Administration of Veritas Cluster Server 6.0 for Unix Version: Demo

250-253-demo

Embed Size (px)

DESCRIPTION

docu

Citation preview

  • Vendor: Symantec

    Exam Code: 250-253

    Exam Name: Administration of Veritas Cluster Server 6.0 for Unix

    Version: Demo

  • QUESTION 1 Refer to the exhibit.

    The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage devices viadual-hosted SCSI cables.

    Why is this an inefficient configuration?

    A. Storage should be shared by more than two nodes.B. Clusters should have at most two nodes.C. NAS is preferred over SAN for shared storage.D. NFS is the preferred way to share storage within a cluster.

    Correct Answer: A

    QUESTION 2What does Network Monitor use to identify network traffic going to a nonstandard port?

    A. The originating domainB. Total packet sizeC. Either UDP or TCPD. Protocol signature

    Correct Answer: D

    QUESTION 3While Veritas Cluster Server supports nodes in a cluster using different hardware or operating systemversions, this is potentially undesirable for which two reasons? (Select two.)

    A. User securityB. Inability to handle load on failoverC. Cluster upgradesD. Operational complexityE. Network connectivity

    Correct Answer: BD

    QUESTION 4What are two operating systems supported by Veritas Cluster Server? (Select two.)

    A. FedoraB. Red Hat Enterprise Server

  • C. openSuSeD. Mac OSE. AIX

    Correct Answer: BE

    QUESTION 5What is a characteristic of the web-based installer?

    A. It can be automated with a response file.B. It can be run using Internet Explorer, Firefox, or Safari.C. It can install on multiple operating systems at the same time.D. It runs the same commands as the command line installer.

    Correct Answer: D

    QUESTION 6What is a feature of keyless licensing?

    A. It works on all versions of Veritas Cluster Server.B. It requires an accessible Veritas Operations Manager (VOM) server.C. It requires that at least one key be installed on each cluster host.D. It must be enabled before installation of Veritas Cluster Server.

    Correct Answer: B

    QUESTION 7Symantec Operation Readiness Tools (SORT) provides which service?

    A. It automates installation of product updates.B. It manages notifications for changes in patches.C. It stores operating system patches required for upgrade.D. It maintains common config files required for Disaster Recovery.

    Correct Answer: B

    QUESTION 8When run in a two node cluster, what does the lltstat -nvv command show?

    A. only LLT information for the node the command was run onB. LLT information for all configured nodes in the clusterC. LLT information for any cluster nodes attached to the same switchD. only LLT information for nodes verified by Veritas Cluster Server to be active

    Correct Answer: B

    QUESTION 9Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?

    A. General tabB. Incident Access tabC. Policy Management tabD. Users tab

    Correct Answer: A

    QUESTION 10

  • Which component is directly responsible for communicating online configuration changes to all nodes inthe cluster?

    A. LLTB. IMFC. GABD. HAD

    Correct Answer: D

    QUESTION 11Discover Servers can leave Marker Files for files moved to the quarantine location.

    Which file types retain their file extension and the corresponding icon in the Marker File?

    A. All file types configured in Windows Explorer on the detection server hostB. Text files, including source code in Java, C, and shell scriptC. Microsoft Office documentsD. File types specified in the ProtectRemediation.properties file

    Correct Answer: D

    QUESTION 12What is required in order to have two separate Veritas clusters share a common private heartbeat networkswitch?

    A. GAB network IDs must be unique across the clusters.B. All node IDs must be unique across the clusters.C. Cluster IDs must be unique across the clusters.D. All LLT node IDs must be unique across the clusters.

    Correct Answer: C

    QUESTION 13Which two are characteristics of a Veritas Cluster Server resource? (Select two.)

    A. Corresponds to a hardware or software componentB. Allows cyclical dependencies without a clear starting pointC. Allows only persistent resources to be a parentD. Has a unique name throughout the clusterE. Has a single entry point that the agent uses to control the resource

    Correct Answer: AD

    QUESTION 14Which detection method includes keyword rules?

    A. Exact Data Matching (EDM)B. Directory Group Matching (DGM)C. Described Content Matching (DCM)D. Indexed Document Matching (IDM)

    Correct Answer: C

    QUESTION 15What information must be specified when adding a resource to a service group?

    A. Cluster identifier

  • B. System nameC. Attribute valuesD. Service group name

    Correct Answer: D

    QUESTION 16What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Selecttwo.)

    A. Cluster File System Option enabledB. Arrays with SCSI3-PR enabledC. A minimum of two private heartbeat connectionsD. LUNs visible within the vxdisk list outputE. LUNs validated with the hacf -verify command

    Correct Answer: BD

    QUESTION 17Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.

    Thinking specifically about data disks, which two cluster configuration requirements must be met toimplement this? (Select two.)

    A. The application using the disks must be managed by a VCS Application resource type.B. The disks must be in a Veritas Volume Manager disk group.C. The service group containing the disks must include an IP resource.D. The disks must be managed by a VCS DiskGroup resource type.E. The disks must contain at least one *.dbf file.

    Correct Answer: BD

    QUESTION 18An administrator is responsible for a cluster split between two data centers in different locations.The data is mirrored between the two sites.

    If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximizeresilience?

    A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and aCoordination Point Server at a third site

    B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary siteC. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary siteD. One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary

    site, and one Coordination Point Server at a third site

    Correct Answer: A

    QUESTION 19An employee received the following email notification:

    ***************************************************************************** *******************************************

    Dear Bob,Your email to [email protected] with subject Account Info you requested violates the company'sCustomer Data Protection policy.

    If this is a legitimate business email, please add the word Encrypt in the subject line of the email. Thecommunication will then be automatically sent to the recipient in an encrypted form, in accordance with

  • company policy.

    Please note that this violation has also been reported to your manager. Confidential data protection isevery employee's responsibility.

    Thank you,

    Corporate Information Security Team

    ***************************************************************************** *******************************************

    Which recommended item is missing from this email notification?

    A. A contact personB. The severity of the violationC. The affected business unitD. The name of the file that caused the violation

    Correct Answer: A

    QUESTION 20Only two local disks suitable for use as coordinator disks are available for a local muti-node cluster.Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/O fencing configuration? (Select two.)

    A. One-node CP server cluster with GAB and LLT configuredB. One-node CP server cluster with only LLT configuredC. Second network connection to the CP server clusterD. Multi-node CP server clusterE. I/O fencing on the CP server cluster

    Correct Answer: CD

    QUESTION 21To which file system folder does PacketCapture write reconstructed SMTP messages?

    A. dropB. drop_pcapC. drop_discoverD. drop_ttd

    Correct Answer: B

    QUESTION 22How is a policy applied to files found in Network Discover scans?

    A. By assigning policy groups to the scan targetB. By choosing the correct policies in the scan targetC. By assigning policies to the Network Discover ServerD. By choosing the correct detection servers to run the scans

    Correct Answer: A

    QUESTION 23How can an incident responder remediate multiple incidents simultaneously?

    A. By selecting a Smart Response on the Incident Snapshot pageB. By selecting an Automated Response on an Incident List report

  • C. By selecting a Smart Response on an Incident List reportD. By selecting the Find Similar command on the Incident Snapshot page

    Correct Answer: C

    QUESTION 24Which Network Protect feature is a system administrator unable to configure?

    A. Ability to copy filesB. Ability to restore filesC. Location of quarantined filesD. Content of the file marker

    Correct Answer: B

    QUESTION 25Which Storage Foundation feature is used to send data changes to a remote site via an IP network?

    A. Volume ReplicatorB. Storage ReplicatorC. NetBackupD. Replication Exec

    Correct Answer: C

    QUESTION 26What is a characteristic of an application that is to be clustered with Veritas Cluster Server?

    A. It must have the ability to be monitored.B. It must have the ability to store all required data and configuration information on shared disks.C. It must have the ability to store all required data on SATA disks.D. It must have the ability to copy configuration information between cluster nodes.

    Correct Answer: A

    QUESTION 27Which two capabilities must an application have in order to be made highly available using Veritas ClusterServer? (Select two.)

    A. The ability to monitor each instance of the application independentlyB. The ability to be installed on shared storageC. The ability to determine if the application is runningD. The ability to notify the administrator of the stateE. The ability to disconnect users from the application

    Correct Answer: AC

    QUESTION 28How does a system administrator verify that a Network Monitor Server is healthy?

    A. By checking Incident Queue and Message Wait Time on the System Overview pageB. By verifying the configuration details of the System Settings pageC. By determining whether system alert message emails are generated or receivedD. By reviewing the results of the Environmental Check Utility (ECU)

    Correct Answer: A

  • QUESTION 29Which two traffic feed sources should be used for Network Monitor? (Select two.)

    A. Test Access Port (TAP)B. trunking port on a hubC. Switched Port Analyzer (SPAN) portD. router LAN portE. tunneled port on a VPN router

    Correct Answer: AC

    QUESTION 30An administrator is configuring another application service in high availability. The application's logical IPaddress will rely on the same NIC used by the ClusterService service group. Data will be stored on rawdevices.

    Which types of resources should the administrator consider to configure in the service group?

    A. Application, File System, Volume, Disk Group, IP, NICB. Application, Volume, Disk Group, IP, ProxyC. Application, File System, Volume, Disk Group, IP, ProxyD. Application, Volume, Disk Group, IP, Phantom

    Correct Answer: B

    QUESTION 31Which product can replace a confidential document residing on a public share with a Marker Fileexplaining why the document was removed?

    A. Network PreventB. Network ProtectC. Network MonitorD. Network Discover

    Correct Answer: B

    QUESTION 32During testing, an administrator configures a Network Discover target to identify and quarantineconfidential files. The target is set up with a Default credential that has read-only permissions on the fileserver. After running the scan and checking the results, the administrator finds several incidents from thescan, but observes that all confidential files are still in their original location, and the configured quarantinedirectory is empty (contains none of the confidential files).

    Which two Discover target configuration mistakes might be causing the problem? (Select two.)

    A. The sharelist excludes all directories on the host being scanned.B. The Quarantine/Copy Share credentials are invalid.C. The Default credentials are invalid.D. The Copy option is selected.E. The Protect credential is unspecified.

    Correct Answer: BE

    QUESTION 33Which two characteristics must be present when preparing an application to be configured for highavailability using Veritas Cluster Server? (Select two.)

    A. Ability to run on multiple independent servers

  • B. Remote monitoring capabilityC. Data stored on internal disksD. Well-defined start and stop proceduresE. Refresh capability after sudden failures

    Correct Answer: AD

    QUESTION 34An administrator is planning to migrate a locally hosted application to high availability. Data migration onthe shared storage has been properly completed.

    Which two actions must the administrator perform for the storage in order to complete the configuration ofthe application service? (Select two.)

    A. configure the operating system to automatically mount the file systems involvedB. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involvedC. link the application resource to the file system resources, with appropriate dependenciesD. unconfigure the operating system to automatically mount the file systems involvedE. set up the appropriate file system contention mechanism in the correct sequence

    Correct Answer: BD

    QUESTION 35An administrator is planning to configure a new application service in a Veritas cluster. In the case of anapplication failure, the company requires that the node with the fewest running service groups be selectedas the failover target.

    Which failover policy should the administrator implement to achieve this requirement?

    A. PriorityB. RoundRobinC. QuorumD. Prerequisites

    Correct Answer: B

    QUESTION 36Which data locations should an organization scan first?

    A. Private individual directoriesB. Centralized repositoriesC. Password protected sharesD. Regionalized repositories

    Correct Answer: B

    QUESTION 37Which detection method is used for fingerprinting and protecting unstructured data, such as source codedocuments or merger and acquisition documents?

    A. Exact Data Matching (EDM)B. Directory Group Matching (DGM)C. Indexed Document Matching (IDM)D. Described Content Matching (DCM)

    Correct Answer: C

    QUESTION 38

  • The log files used to verify that a custom application is being properly monitored are located in whichdirectory?

    A. /var/VRTSvcs/log/B. /opt/VRTSvcs/log/C. /var/VRTSvcs/agent/log/D. /opt/VRTSvcs/agent/log/

    Correct Answer: B

    QUESTION 39What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in aservice group?

    A. The MonitorProgram attribute must be configured for the Application resource type.B. The MonitorProcesses attribute must be configured for the Application resource type.C. The Mode value for the IMF attribute of the Application type resource is set to 1.D. The ProPCV attribute is prevented from being changed when the service group is active.

    Correct Answer: B

    QUESTION 40What are two resource types that Proxy resources can reference? (Select two.)

    A. NICB. IPC. QuorumD. DNSE. ElifNone

    Correct Answer: AE

    QUESTION 41On a cluster, what does the following command display?

    Hares -display -ovalues

    A. all online resource attributesB. all overridden resource attributesC. all uncommitted resource attributesD. all default resource attributes

    Correct Answer: B

    QUESTION 42Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server(VCS) has been successfully started or stopped? (Select two.)

    A. Examine the online log fileB. Examine the engine log fileC. View the Security Log from the VCS Java GUID. View the Log Desk from the VCS Java GUIE. View the Application_A.log file

    Correct Answer: BD

    QUESTION 43Which resource type creates a dependency between applications that are configured in different Veritas

  • Cluster Server clusters?

    A. ProxyB. RemoteGroupC. PhantomD. Application

    Correct Answer: B

    QUESTION 44What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?

    A. Prevention of concurrency violationsB. Monitoring of resources running on remote clustersC. Immediate notification of resource state changeD. Monitoring of resources without need of configuration

    Correct Answer: C

    QUESTION 45How is Intelligent Monitoring Framework configured?

    A. It is automatically configured but only on supported agents.B. It is automatically configured on all agents.C. It needs to be manually configured on each agent.D. It needs to be manually configured on each cluster node.

    Correct Answer: A

    QUESTION 46On which system can you set UseMpathd=1 in a MultiNICB resource?

    A. SolarisB. LinuxC. AIXD. HP-UX

    Correct Answer: D

    QUESTION 47Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offlineunexpectedly before faulting the resource?

    A. RestartLimitB. RetryLimitC. AutoRestartLimitD. AutoRestart

    Correct Answer: A

    QUESTION 48Given a service group with all resources online, what should be done to prevent the top resource in adependency tree from causing a failover when it is taken offline outside the cluster?

    A. Freeze the resourceB. Disable the dependency links for the resourceC. Set the Critical attribute for the resource to 0

  • D. Freeze the node

    Correct Answer: C

    QUESTION 49What is the main benefit of installing and using the Symantec Management Platform for managing DLPAgents?

    A. The ability to supervise how agents are usedB. The ability to view the health status of the agentsC. The ability to reconfigure the agent filtersD. The ability to easily manage agents remotely

    Correct Answer: D

    QUESTION 50When setting different severity levels, which level should be set as the default?

    A. The highest level available in the systemB. The lowest level available in the systemC. The lowest level the policy manager wants to assignD. The highest level the policy manager wants to assign

    Correct Answer: C

    QUESTION 51Which actions are required to enable a service group to run on all systems in a cluster simultaneously?

    A. Run the hagrp -modify [service group] Parallel 1 command and the service group will automaticallyrestart on all systems

    B. Take the service group offline, add all cluster systems to the AutoStartList, and bring the service groupback online with the -all option

    C. Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to theAutoStartList, and restart Veritas Cluster Server

    D. Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all clustersystems, and restart Veritas Cluster Server

    Correct Answer: C

    QUESTION 52Which type of resources are considered by Veritas Cluster Server when determining whether a servicegroup is online?

    A. OnOnlyB. OnOffC. PersistentD. None

    Correct Answer: B

    QUESTION 53Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for eachof the systems in the cluster?

    A. GlobalB. LocalC. CustomD. Proxy

  • Correct Answer: B

    QUESTION 54What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?

    A. If any detection server in the system is running, the agent automatically connects to it after a period oftime.

    B. If any Endpoint Server is running, the agent automatically connects to it after a period of time.C. If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it

    after a period of time.D. If any detection server is running, and if the agent is configured to recognize it, the agent connects to it

    after a period of time.

    Correct Answer: C

    QUESTION 55Which statement describes a DLP Agent encryption feature?

    A. The key size is standard and unconfigurable.B. The key is randomly generated for the agent store.C. The system administrator can generate a unique authentication key.D. DLP Agent-to-server communication uses Secure Socket Layer (SSL).

    Correct Answer: C

    QUESTION 56How can a system administrator obtain the log files for a detection server? (Select three.)

    A. Run the Log Collection Utility (LCU)B. Navigate to the logs directoryC. Click Fetch Latest on the Server Detail pageD. Select Logs under Administration nodeE. Download logs from the System Overview page

    Correct Answer: ABC

    QUESTION 57Where can an incident responder view all actions that have occurred for an incident?

    A. Incident SnapshotB. Auditlog TableC. Incident ActionsD. System Events

    Correct Answer: A

    QUESTION 58Refer to the following service group example:

    group websg (SystemList = { sym1 = 0, sym2 = 1 }AutoStart = 0AutoStartList = { sym2 })

    DiskGroup webdg (DiskGroup = webdg)

  • IP webip (Device = eth0

    Address = "169.254.128.12"NetMask = "255.255.255.0")

    Mount webmnt (MountPoint = "/web1"BlockDevice = "/dev/vx/dsk/webdg/webvol"FSType = vxfsMountOpt = rwFsckOpt = "-y")

    NIC webnic (Device = eth0)

    Application webproc (MonitorProgram = "/usr/local/bin/web -monitor"StartProgram = "/usr/local/bin/web -start"StopProgram = "/usr/local/bin/web -stop")

    webip requires webprocwebproc requires webmntwebip requires webnicwebmnt requires webdg

    Which resource will start online last?

    A. webipB. webmntC. webprocD. webdg

    Correct Answer: A

    QUESTION 59An application is experiencing failures. The application administrator wants Veritas Cluster Server to takeall resources offline after failure. The application should remain offline.

    Which attribute can accomplish this?

    A. ManageFaultsB. FailOverPolicyC. AutoFailoverD. Critical

    Correct Answer: C

    QUESTION 60Which three statements apply to communication between the Enforce Server and detection servers?(Select three.)

    A. By default, the Enforce Server and the detection servers communicate over port 8100.B. Port 3389 must be open between the Enforce Server and the detection servers.C. The same port number must be used for all detection servers.

  • D. The servers can be configured to use any port higher than 1024.E. IPSec must be configured on the Enforce Server and the detection servers.

    Correct Answer: ACD

    QUESTION 61Which service group attribute enables specifying preferred nodes for failover?

    A. SystemZonesB. AutostartListC. ClusterListD. IntentionalOnlineList

    Correct Answer: A

    QUESTION 62Which two are default behaviors of Veritas Cluster Server service groups? (Select two.)

    A. Migrate service groups from a system on intentional system shutdownB. Start the service groups in lexical orderC. AutoDisable the service groups on cluster startupD. AutoDisable the service groups on a system when all low priority links failE. Start the service groups in the order of the attribute SystemList

    Correct Answer: AC

    QUESTION 63System capacity and service group load are the main components for which FailOverPolicy?

    A. LoadB. OrderC. LimitD. Capacity

    Correct Answer: A

    QUESTION 64Consider the following configuration:

    group websg (SystemList = { sym1 = 1, sym2 = 2 }AutoStartList = { sym1 }Frozen = 1)

    While websg is online, all of the systems in the cluster are rebooted simultaneously. All of the systemsfinish booting and successfully join the cluster.

    What will happen to the websg service group?

    A. It will unfreeze on reboot and start on sym1.B. It will remain offline on all systems.C. It will resume its state before the reboot.D. It will start on sym1 in a frozen state.

    Correct Answer: B

    QUESTION 65

  • The service group named websg is currently online on the sym3 node. All other nodes are running.

    Consider the following partial main.cf definition:Group websg (SystemList = { sym1=0, sym2=1, sym3=2 }AutoStartList = {sym2, sym3 }FailOverPolicy = Priority)

    The operator incorrectly shuts down a critical resource in the websg service group outside of VeritasCluster Server.

    Based on the information provided, what will happen to the websg service group?

    A. It will remain partially online on the sym3 node.B. It will switch to the sym1 node.C. It will switch to the sym2 node.D. It will restart on sym3 node.

    Correct Answer: B

    QUESTION 66What should be done before removing a resource named webdg from a running service group?

    A. The service group must be taken offline.B. All parent resources of webdg must be taken offline.C. All child resources of webdg must be taken offline.D. The service group must be disabled.

    Correct Answer: B

    QUESTION 67Which Network Discover option is used to determine whether confidential data exists without having toscan the entire target?

    A. Exclude FilteringB. File ThrottlingC. Byte ThrottlingD. Inventory Mode Scanning

    Correct Answer: D

    QUESTION 68Under which high-level node in the left navigation panel can administrators find the System Events report?

    A. ReportsB. PolicyC. System HealthD. Administration

    Correct Answer: D

    QUESTION 69Which two are valid settings for FailoverPolicy? (Select two.)

    A. PriorityB. RoundRobinC. Order

  • D. FailoverE. Dynamic

    Correct Answer: AB

    QUESTION 70Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?

    A. SimulatorB. AgentServerC. FencingD. AgentTester

    Correct Answer: C

    QUESTION 71An additional email address was added to the Veritas Cluster Server notifier resource without any otheractions being taken. All but one user is receiving notifications.How can this problem be solved?

    A. Refresh the mailbox of the impacted userB. Restart the notifier resourceC. Restart the SNMP daemonD. Restart the HAD daemon

    Correct Answer: B

    QUESTION 72A system administrator examines the results of a completed scan.

    Which information is available on a scan listing on the Discover Targets page? (Select three.)

    A. User who initiated the scanB. Elapsed time and total time for each scanC. Number of items scannedD. Number of items changed since the previous scanE. File structure and locationF. Errors encountered

    Correct Answer: BCF

    QUESTION 73When configured as default, the Veritas Cluster Server Notifier receives queued messages on a scheduleevery how many minutes?

    A. OneB. ThreeC. FiveD. Ten

    Correct Answer: B

    QUESTION 74The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involvesstopping the components in the communications stack, modifying the configuration files, and restarting thestack.

    In what order should the components be stopped?

  • A. LLT, GAB, I/O fencingB. VCS, I/O fencing, GAB, LLTC. VCS, I/O fencing, LLT, GABD. I/O fencing, VCS, GAB, LLT

    Correct Answer: B

    QUESTION 75What is a characteristic of the Veritas Cluster Server communication stack?

    A. The HAD processes propagates information to other nodes by way of agents.B. Agents communicate resource status information with HAD.C. LLT determines cluster membership by monitoring heartbeats over GAB.D. Agents can communicate with each other directly over GAB.

    Correct Answer: B

    QUESTION 76A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due tonetwork reconfiguration.

    What is the correct order for the cluster and heartbeat protocols to be shut down?

    A. VCS --> Fencing --> GAB --> LLTB. VCS --> Fencing --> LLT --> GABC. Fencing --> VCS --> GAB --> LLTD. Fencing --> VCS --> LLT --> GAB

    Correct Answer: A

    QUESTION 77Which three options can incident responders select when deleting incidents? (Select three.)

    A. Delete the incident completelyB. Delete the original message and retain the incidentC. Delete the incident and retain the violating attachments or filesD. Delete the incident and export incident details to .csv fileE. Delete the non-violating attachments or files and retain the incident

    Correct Answer: ABE

    QUESTION 78A two node cluster is being brought online, but one node is unable to boot.

    Which command is run to manually seed GAB?

    A. gabconfig -xB. gabconfig -n2C. lltconfig -xD. lltconfig -n2

    Correct Answer: A

    QUESTION 79Which three products support virtualization and can be run on virtual machines? (Select three.)

    A. Endpoint Discover

  • B. Network DiscoverC. Network Prevent (Web)D. Network MonitorE. Network Prevent (Email)

    Correct Answer: BCE

    QUESTION 80Which two items are required to replace a coordinator disk while the cluster is online? (Select two.)

    A. Replace the LUN and create the disk as a Veritas Volume Manager (VxVM) DiskB. Replace the LUN and create the disk as a Logical Volume Manager (LVM) DiskC. Replace the LUN and create the disk as either a VxVM or LVM DiskD. Run the installvcs -fencing command to replace the removed LUNsE. Run the vxfenadm command to replace the removed LUNs

    Correct Answer: AD

    QUESTION 81What are two reasons to implement SCSI-3 I/O fencing? (Select two.)

    A. Disk-based heartbeatB. Data protectionC. Lock diskD. Cluster communicationE. Membership arbitration

    Correct Answer: BE

    QUESTION 82In which two cases will the agent status remain green (good) on the Agent Events page? (Select two.)

    A. The agent closed the connection to the Endpoint Server.B. The Endpoint Server detected that the connection with the agent was lost.C. There was agent or server authentication failure.D. The agent is unable to restore a database file.E. There was an agent service shutdown during machine shutdown.

    Correct Answer: AE

    QUESTION 83Which Preferred Fencing policy should be configured to ensure that the node with the preferred applicationsurvives a fencing event?

    A. PreferredFencingPolicy = DisabledB. PreferredFencingPolicy = SiteC. PreferredFencingPolicy = SystemD. PreferredFencingPolicy = Group

    Correct Answer: D

    QUESTION 84Refer to the exhibit.

  • Trying our product !

    Guarantee & Policy | Privacy & Policy | Terms & Conditions

    Any charges made through this site will appear as Global Simulators Limited. All trademarks are the property of their respective owners.

    Copyright 2004-2015, All Rights Reserved.

    100% Guaranteed Success

    100% Money Back Guarantee

    365 Days Free Update

    Instant Download After Purchase

    24x7 Customer Support

    Average 99.9% Success Rate

    More than 69,000 Satisfied Customers Worldwide

    Multi-Platform capabilities - Windows, Mac, Android, iPhone, iPod, iPad, Kindle

    Need HelpPlease provide as much detail as possible so we can best assist you. To update a previously submitted ticket:

    To Read the Whole Q&As, please purchase the Complete Version from Our website.

    frondpage.pdftou.pdf

    end page.pdftou.pdf

    2.pdffrondpage.pdftou.pdf

    end page.pdftou.pdf

    3.pdffrondpage.pdftou.pdf

    end page.pdftou.pdf

    1.pdffrondpage.pdftou.pdf

    end page.pdftou.pdf