2iera0%6 250-253 Archives - Symantec Questions & Answers
Symantec Question: swe’
Just another ALL IN ON Testking sites
Search
Search for: Go| Search
CheckPoint
Exam Information
RSS feed for this section
This category contains 235 posts
Exam 250-253: Administration of Veritas Cluster Server 6.0 for Unix
Why is this an inefficient configuration?
Posted by seenagape on February 10, 2016 No comments
Refer to the exhibit, The exhibit shows an N-to-1 cluster configuration, in which nodes are
connected to storage devices via dual-hosted SCSI cables. Why is this an inefficient
configuration?
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 132iera0%6 250-253 Archives - Symantec Questions & Answers
Redundant Server
Sl fel eal
‘Application Y Application: eae or
I
=
SoS
all
Clusters should have at most two nodes.
I
E
B,
NAS is preferred over SAN for shared storage.
Cc.
NFS is the preferred way to share storage within a cluster.
D.
Storage should be shared by more than two nodes.
What does Network Monitor use to identify network traffic going to
a nonstandard port
Posted by seenagape on February 10, 2016 No comments
What does Network Monitor use to identify network traffic going to a nonstandard port?
A
‘The originating domain
B.
Total packet size
c.
Either UDP or TCP
D.
Protocol signature
which two reasons?
Posted by seenagape on February 10, 2016 No comments
While Veritas Cluster Server supports nodes in a cluster using different hardware or
operating system versions, this is potentially undesirable for which two reasons? (Select
two.)
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 2123aaraoe 250-253 Archives - Symantec Questions & Answers
A
User security
B.
Inability to handle load on failover
c
Cluster upgrades
D.
Operational complexity
E.
Network connectivity
Explanation:
What are two operating systems supported by Veritas Cluster
Server?
Posted by seenagape on February 10, 2016 No comments
What are two operating systems supported by Veritas Cluster Server? (Select two.)
A
openSuSe
B.
Mac OS,
c.
Red Hat Enterprise Server
D.
Fedora
E.
AIX
What is a characteristic of the web-based installer?
Posted by seenagape on February 10, 2016 No comments
‘What is a characteristic of the web-based installer?
AL
It ean be automated with a response file.
B.
It can be run using Intemet Explorer, Firefox, or Safari
c
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn
3123aaraoe 250-259 hives - Symantec Questions & Answers
It can install on multiple operating systems at the same time,
Dz
It runs the same commands as the command line installer.
What is a feature of keyless licensing
Posted by seenagape on February 10, 2016 No comments
What is a feature of keyless licensing?
A.
It works on all versions of Veritas Cluster Server.
B.
It must be enabled before installation of Veritas Cluster Server.
c
It requires an accessible Veritas Operations Manager (VOM) server.
D,
It requires that at least one key be installed on each cluster host.
which service?
Posted by seenagape on Ecbruary 10. 2016 No comments
Symantec Operation Readiness Tools (SORT) provides which service?
AL
It automates installation of product updates.
B.
It manages notifications for changes in patches,
c
It stores operating system patches required for upgrade.
D.
It maintains common config files required for Disaster Recovery.
what does the Iltstat -nvv command show?
Posted by seenagape on February 10, 2016 No comments
‘When run in a two node cluster, what does the Iltstat -nvv command show?
A.
LLT information for all configured nodes in the cluster
B.
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 4232iera0%6 250-253 Archives - Symantec Questions & Answers:
LLT information for any cluster nodes attached to the same switch
Cc
only LLT information for the node the command was run on
D.
only LLT information for nodes verified by Veritas Cluster Server to be active
Which roles configuration tab is used to set the custom attributes
that a certain role can view or edit?
Posted by seenagape on February 10, 2016 No comments
Which roles configuration tab is used to set the custom attributes that a certain role can,
view or edit?
A.
General tab
B.
Incident Access tab
c
Policy Management tab
D.
Users tab
Which component is directly responsible for communicating online
configuration changes to all nodes in the cluster?
Posted by seenagape on February 10, 2016 No comments.
‘Which component is directly responsible for communicating online configuration changes to
all nodes in the cluster?
A
IMF
B,
GAB
c
LLT
D.
HAD
Which file types retain their file extension and the corresponding
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 51232iera0%6 250-253 Archives - Symantec Questions & Answers
icon in the Marker File?
Posted by seenagape on February 10, 2016 No comments
Discover Servers can leave Marker Files for files moved to the quarantine location. Which
file types retain their file extension and the corresponding icon in the Marker File?
A.
All file types configured in Windows Explorer on the detection server host
B.
Text files, including source code in Java, C, and shell script
c
Microsoft Office documents
D.
File types spec
ied in the ProtectRemediation. properties file
What is required in order to have two separate Veritas clusters
share a common private heartbeat network switch?
Posted by seenagape on February 10, 2016 No comments
‘What is required in order to have two separate Veritas clusters share a common private
heartbeat network switch?
A.
All node IDs must be unique across the clusters.
B.
Cluster IDs must be unique across the clusters.
c.
GAB network IDs must be unique across the clusters.
D.
All LLT node IDs must be unique across the clusters.
Which two are characteristics of a Veritas Cluster Server resource?
Posted by seenagape on February 10, 2016 No comments
Which two are characteristics of a Veritas Cluster Server resource? (Select two.)
A
Corresponds to a hardware or software component
B.
Allows cyclical dependencies without a clear starting point
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 6123aerrre 250-283 Archives - Symantec Questions & Answers
c
Allows only persistent resources to be a parent
D.
Tas a unique name throughout the cluster
BE.
Has a single entry point that the agent uses to control the resource
Which detection method includes keyword rules?
Posted by seenagape on February 10, 2016 No comments
Which detection method includes keyword rules?
AL
Exact Data Matching (EDM)
B.
Indexed Document Matching (IDM)
c.
Directory Group Matching (DGM)
D.
Described Content Matching (DCM)
What information must be specified when adding a resource to a
service group
Posted by seenagape on
What information must be specified when adding a resource to a service group?
A
Service group name
B.
Cluster identifier
c
System name
Dz
Attribute values
What are two requirements for configuring disk-based I/O fencing
on supported storage arrays
Posted by seenagape on February 10, 2016 No comments
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 7232iera0%6 250-253 Archives - Symantec Questions & Answers
What are two requirements for configuring disk-based I/O fencing on supported storage
arrays? (Select two.)
A.
LUNs visible within the vxdisk list output
B.
LUNs validated with the hacf -verify command
c.
Aminimum of two private heartbeat connections
D.
Cluster
System Option enabled
E.
Arrays with SCSI3-PR enabled
which two cluster configuration requirements must be met to
implement t!
Posted by seenagape on February 10, 2016 No comments
Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism. Thinking
specifically about data disks, which two cluster configuration requirements must be met to
implement this? (Select two.)
A.
The application using the disks must be managed by a VCS Application resource type.
B.
The disks must be in a Veritas Volume Manager disk group.
c
The service group containing the disks must include an IP resource.
D.
The disks must be managed by a VCS DiskGroup resource type
E,
The disks must contain at least one *.dbf file.
Explanation:
how should the configuration be deployed to maximize resilience?
Posted by seenagape on February 10, 2016 No comments
‘An administrator is responsible for a cluster split between two data centers in different
locations. The data is mirrored between the two sites. If the administrator would like to set
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 81232iera0%6 250-253 Archives - Symantec Questions & Answers
up I/O fencing, how should the configuration be deployed to maximize resilience?
A.
One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary
site, and a Coordination Point Server at a third site
B.
Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the
secondary site
c
One SCSI-3 coordinator disk at the primary site and two coordinator disks at the
secondary site
D.
One Coordination Point Server at the primary site, and one Coordination Point Server at
the secondary site, and one Coordination Point Server at a third site
Which recommended item is missing from this email notification?
Posted by seenagape on February 10, 2016 No comments
An employee received the following email notification: Which recommended item is missing
from this email notification?
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn
91232iera0%6 250-253 Archives - Symantec Questions & Answers
Dear Bob,
Your email to jane_smith@partner.com with subject Account Info you requested violates the
company's Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email
The communication will then be automatically sent to the recipient in an encrypted form, in
accordance with company policy.
Please note that this violation has also been reported to your manager. Confidential data
protection is every employee's responsibility.
Thank you,
Corporate Information Security Team
AL
The affected business unit
B.
The name of the file that caused the violation
c.
The severity of the violation
D.
Acontact person
which two properties would maximize the resiliency of the I/O
fencing configuration?
Posted by seenagape on February 10, 2016 No comments
Only two local disks suitable for use as coordinator disks are available for a local muti-node
cluster. Adding a Coordination Point (CP) Server with which two properties would maximize
the resiliency of the I/O fencing configuration? (Select two.)
A
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 401232iera0%6 250-253 Archives - Symantec Questions & Answers
One-node CP server cluster with only LLT configured
B.
Second network connection to the CP server cluster
c.
Multi-node CP server cluster
D.
V/O fencing on the CP server cluster
E.
One-node CP server cluster with GAB and LLT configured
which file system folder does PacketCapture write reconstructed
SMTP messages?
Posted by seenagape on February 10, 2016 No comments
To which file system folder does PacketCapture write reconstructed SMTP messages?
A
drop
B.
drop_ttd
Cc.
drop_peap
D.
drop_discover
How is a policy applied to files found in Network Discover scans?
Posted by seenagape on February 10, 2016 No comments
How is a policy applied to files found in Network Discover scans?
A.
By assigning policy groups to the scan target
B.
By choosing the correct policies in the sean target
c.
By assigning policies to the Network Discover Server
D.
By choosing the correct detection servers to run the scans
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 111232rera0%6 250-283 Archives - Symantec Questions & Answers
How can an incident responder remediate multiple incidents
simultaneously
Posted by seenagape on February 10, 2016 No comments
How can an incident responder remediate multiple incidents simultaneously?
A
By selecting a Smart Response on the Incident Snapshot page
B.
By selecting the Find Similar command on the Incident Snapshot page
c
By selecting an Automated Response on an Incident List report
D,
By selecting a Smart Response on an Incident List report
Which Network Protect feature is a system administrator unable to
configure?
Posted by seenagape on February 10, 2016 No comments
Which Network Protect feature is a system administrator unable to configure?
A
Ability to copy files
B.
Ability to restore files
c
Location of quarantined files
D.
Content of the file marker
Which Storage Foundation feature is used to send data changes to a
remote site via an IP network?
Posted by seenagape on February 10, 2016 No comments
Which Storage Foundation feature is used to send data changes to a remote site via an IP
network?
A
Storage Replicator
B,
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn ya2rera0%6 250-283 Archives - Symantec Questions & Answers
NetBackup
c
Volume Replicator
D.
Replication Exec
What is a characteristic of an application that is to be clustered
with Veritas Cluster Server?
ym
Posted by seenagape on February 10, 2016 No. ts
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A
It must have the ability to be monitored.
B.
It must have the ability to store all required data and configuration information on shared.
disks.
c.
It must have the ability to store all required data on SATA disks,
D.
It must have the ability to copy configuration information between cluster nodes.
Which two capabilities must an application have in order to be
made highly available using Veritas Cluster Server?
Posted by seenagape on February 10, 2016 No comments.
Which two capabilities must an application have in order to be made highly available using
Veritas Cluster Server? (Select two.)
A.
The ability to monitor each instance of the application independently
B.
The ability to disconnect users from the application
c.
The ability to notify the administrator of the state
D.
The ability to be installed on shared storage
E.
The ability to determine if the application is running
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 131232rera0%6 250-283 Archives - Symantec Questions & Answers
How does a system administrator verify that a Network Monitor
Server is healthy
Posted by seenagape on February 10, 2016 No comments
How does a system administrator verify that a Network Monitor Server is healthy?
A
By checking Incident Queue and Message Wait Time on the System Overview page
B.
By verifying the configuration details of the System Settings page
c
By determining whether system alert message emails are generated or received
D.
By reviewing the results of the Environmental Check Utility (F
cu)
Which two traffic feed sources should be used for Network
Monitor?
Posted by seenagape on February 10, 2016 No comments
Which two traffic feed sources should be used for Network Monitor? (Select two.)
A
Test Access Port (TAP)
B.
trunking port on a hub
C.
Switched Port Analyzer (SPAN) port
D.
router LAN port
E,
tunneled port on a VPN router
Which types of resources should the administrator consider to
configure in the service group
Posted by seenagape on February 10, 2016 No comments
An administrator is configuring another application service in high availability. The
application’s logical IP address will rely on the same NIC used by the ClusterService service
group. Data will be stored on raw devices. Which types of resources should the
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 141232iera0%6 250-253 Archives - Symantec Questions & Answers
administrator consider to configure in the service group?
A.
Application, File System, Volume, Disk Group, IP, Proxy
B.
Application, Volume, Disk Group, IP, Phantom
Cc,
Application, File s
tem, Volume, Disk Group, IP, NIC
Dz
Application, Volume, Disk Group, IP, Proxy
Which product can replace a confidential document residing on a
public share with a Marker File explaining why the document was
removed?
Posted by seenagape on February 10, 2016 No comments
Which product can replace a confidential document residing on a publie share with a Marker
File explaining why the document was removed?
A
Network Prevent
B.
Network Protect,
c.
‘Network Monitor
D.
Network Discover
Which two Discover target configuration mistakes might be causing
the problem?
Posted by seenagape on February 10, 2016 No comments
During testing, an administrator configures a Network Discover target to identify and
quarantine confidential files. The target is set up with a Default credential that has read-only
permissions on the file server. After running the scan and checking the results, the
administrator finds several incidents from the scan, but observes that all confidential files
are still in their original location, and the configured quarantine directory is empty (contains
none of the confidential files). Which two Discover target configuration mistakes might be
causing the problem? (Select two.)
A.
The sharelist excludes all directories on the host being scanned.
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 151232rera0%6 250-283 Archives - Symantec Questions & Answers
B.
The Quarantine/Copy Share credentials are invalid,
c.
The Default credentials are invalid.
D.
The Copy option is selected.
E.
The Protect credential is unspecified.
Which two characteristics must be present when preparing an
application to be configured for high availability using Veritas
Cluster Server?
Posted by seenagape on February 10, 2016 No comments
Which two characteristics must be present when preparing an application to be configured
for high availability using Veritas Cluster Server? (Select two.)
A.
Well-defined start and stop procedures
B.
Refresh capability after sudden failures
Cc,
Ability to run on multiple independent servers
D.
Remote monitoring capability
E,
Data stored on internal disks
Which two actions must the administrator perform for the storage
in order to complete the configuration of the application service?
Posted by seenagape on February 10, 2016 No comments
‘An administrator is planning to migrate a locally hosted application to high availability. Data
migration on the shared storage has been properly completed, Which two actions must the
administrator perform for the storage in order to complete the configuration of the
application service? (Select two.)
A
configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file
systems involved
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 161232iera0%6 250-253 Archives - Symantec Questions & Answers
B.
link the application resource to the file system resources, with appropriate dependencies
c.
unconfigure the operating system to automatically mount the file systems involved
D.
set up the appropriate file system contention mechanism in the correct sequence
E,
configure the operating system to automatically mount the file systems involved
Which failover policy should the administrator implement to
achieve this requirement
Posted by seenagape on February 10, 2016 No comments
An administrator is planning to configure a new application service in a Veritas cluster. In
the case of an application failure, the company requires that the node with the fewest
running service groups be selected as the failover target. Which failover policy should the
administrator implement to achieve this requirement?
A.
Priority
B.
Prerequisites
c.
RoundRobin
D.
Quorum
Which data locations should an organization scan first?
Posted by seenagape on Ecbruary 10. 2016 No comments
Which data locations should an organization scan first?
A.
Private individual directories
B.
Centralized repositories
C,
Password protected shares
D.
Regionalized repositories
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 172s2rera0%6 250-283 Archives - Symantec Questions & Answers
Which detection method is used for fingerprinting and protecting
unstructured data, such as source code documents or merger and
acq n documents?
Posted by seenagape on February 10, 2016 No. ts
Which detection method is used for fingerprinting and protecting unstructured data, such as
source code documents or merger and acquisition documents?
A
Described Content Matching (DCM)
B.
Exact Data Matching (EDM)
c.
Directory Group Matching (DGM)
D.
Indexed Document Matching (IDM)
which directory’
Posted by seenagape on
uary 10, 2016 No comm
The log files used to verify that a custom application is being properly monitored are located
in which directory?
A.
/var/VRTSves/log/
B.
opt VRTSvesilog
Cc,
wvar/VRTSves/lagent/log!
D.
JopuVRTSves/agent/log/
What should be considered before enabling the Preventing
Concurrency Violation (ProPCV) attribute in a service group?
Posted by seenagape on February 10, 2016 No comments
What should be considered before enabling the Preventing Concurrency Violation (ProPCV)
attribute in a service group?
A
The MonitorProcesses attribute must be configured for the Application resource type.
itp:www aiotestking,comisymantecicategorylsingle/exam-250-258-administration-of-vrtas-luster-sorver-6-0orsnbd 181232rera0%6 250-283 Archives - Symantec Questions & Answers
B.
The Mode value for the IMF attribute of the Application type resource is set to 1
c.
The MonitorProgram attribute must be configured for the Application resource type.
D.
The ProPCV attribute is prevented from being changed when the service group is active.
What are two resource types that Proxy resources can reference?
Posted by seenagape on February 10, 2016 No comments
What are two resource types that Proxy resources can reference? (Select two.)
A
ElifNone
B.
NIC
c.
IP
D.
Quorum
E.
DNS
what does the following command display?
Posted by scenagape on February 10, 2016 No comments
On a cluster, what does the following command display? Hares -display -ovalues
A.
all default resource attributes
B.
all uncommitted resource attributes
c.
all online resource attributes
D.
all overridden resource attributes
Which two actions can be taken to determine whether an
application clustered with Veritas Cluster Server (VCS) has been
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 19123aeraore 250-259 hives - Symantec Questions & Answers
successfully started or stopped?
Posted by seenagape on February 10, 2016 No comments
Which two actions can be taken to determine whether an application clustered with Veritas
Cluster Server (VCS) has been successfully started or stopped? (Select two.)
A
Examine the online log file
B.
Examine the engine log file
c.
View the Security Log from the VCS Java GUI
D.
View the Log Desk from the VCS Java GUI
E.
View the Application_A.log file
Which resource type creates a dependency between applications
that are configured in different Veritas Cluster Server clusters?
Posted by seenagape on Eebruary 10, 2016 No comments
‘Which resource type creates a dependency between applications that are configured in
different Veritas Cluster Server clusters?
A
Proxy
B,
RemoteGroup
c.
Phantom
D.
‘Application
What is the primary benefit of implementing the Intelligent
Monitoring Framework feature for resource:
Posted by seenagape on February 10, 2016 No comments
What is the primary benefit of implementing the Intelligent Monitoring Framework feature for
resources?
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 201232iera0%6 250-253 Archives - Symantec Questions & Answers
A
Immediate notification of resource state change
B.
Monitoring of resources running on remote clusters
C,
Prevention of concurrency violations
D.
‘Monitoring of resources without need of configuration.
How is Intelligent Monitoring Framework configured?
mm
Posted by seenagape on February 10, 2016 No. r
How is Intelligent Monitoring Framework configured?
A.
Itis automatically configured but only on supported agents,
B.
Itis automatically configured on all agents,
Cc,
It needs to be manually configured on each agent,
D.
Itneeds to be manually configured on each cluster node.
which system can you set UseMpathd=1 in a MultiNICB resource?
Posted by scenagape on February 10, 2016 No comments
On which system can you set UseMpathd-I in a MultiNICB resource?
A.
Linux
B.
AIX
c.
Solaris
D.
HP-UX
Which resource type attribute enables Veritas Cluster Server to
bring a resource online after it goes offline unexpectedly before
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 21123aeraore 250-259 hives - Symantec Questions & Answers
faulting the resource?
Posted by seenagape on February 10. 2016 No comments
Which resource type attribute enables Veritas Cluster Server to bring a resource online after
it goes offline unexpectedly before faulting the resource?
A
RestartLimit
B,
RetryLimit
c
AutoRestartLimit
D.
AutoRestart
what should be done to prevent the top resource in a dependency
tree from causing a failover when it is taken offline outside the
cluster?
Posted by seenagape on February 10, 2016 No comments
Given a service group with all resources online, what should be done to prevent the top
resource in a dependency tree from causing a failover when it is taken offline outside the
cluster?
A.
Disable the dependency links for the resource
B.
Set the Critical attribute for the resource to 0
c.
Freeze the resource
D.
Freeze the node
What is the main benefit of installing and using the Symantec
Management Platform for managing DLP Agents?
Posted by seenagape on February 10, 2016 No comments
‘What is the main benefit of installing and using the Symantec Management Platform for
managing DLP Agents?
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn 221232rera0%6 250-283 Archives - Symantec Questions & Answers
A.
The ability to supervise how agents are used
B.
The ability to view the health status of the agents,
Cc,
The ability to reconfigure the agent filters
D.
The ability to easily manage agents remotely
which level should be set as the default?
Posted by seenagape on February 10, 2016 No comments
When setting different severity levels, which level should be set as the default?
A
The lowest level available in the system.
B.
The lowest level the policy manager wants to assign
Cc,
The highest level available in the system
D.
The highest level the policy manager wants to assign
Page 1 of 512345»
Questions & Answer collection
tpn aiotestking, comisymantecicategorylsinglefexam-250-253-administration-of-vrtas-cluster-sorvr-6-0orsn
23123