Beruflich Dokumente
Kultur Dokumente
The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage
devices via dual-hosted SCSI cables.
Why is this an inefficient configuration?
A. Storage should be shared by more than two nodes.
B. Clusters should have at most two nodes.
C. NAS is preferred over SAN for shared storage.
D. NFS is the preferred way to share storage within a cluster.
Answer: A
Explanation:
QUESTION NO: 2
What does Network Monitor use to identify network traffic going to a nonstandard port?
A. The originating domain
B. Total packet size
C. Either UDP or TCP
D. Protocol signature
Answer: D
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 3
While Veritas Cluster Server supports nodes in a cluster using different hardware or operating
system versions, this is potentially undesirable for which two reasons? (Select two.)
A. User security
B. Inability to handle load on failover
C. Cluster upgrades
D. Operational complexity
E. Network connectivity
Answer: B,D
Explanation:
QUESTION NO: 4
What are two operating systems supported by Veritas Cluster Server? (Select two.)
A. Fedora
B. Red Hat Enterprise Server
C. openSuSe
D. Mac OS
E. AIX
Answer: B,E
Explanation:
QUESTION NO: 5
What is a characteristic of the web-based installer?
A. It can be automated with a response file.
B. It can be run using Internet Explorer, Firefox, or Safari.
C. It can install on multiple operating systems at the same time.
D. It runs the same commands as the command line installer.
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 6
What is a feature of keyless licensing?
A. It works on all versions of Veritas Cluster Server.
B. It requires an accessible Veritas Operations Manager (VOM) server.
C. It requires that at least one key be installed on each cluster host.
D. It must be enabled before installation of Veritas Cluster Server.
Answer: B
Explanation:
QUESTION NO: 7
Symantec Operation Readiness Tools (SORT) provides which service?
A. It automates installation of product updates.
B. It manages notifications for changes in patches.
C. It stores operating system patches required for upgrade.
D. It maintains common config files required for Disaster Recovery.
Answer: B
Explanation:
QUESTION NO: 8
When run in a two node cluster, what does the lltstat -nvv command show?
A. only LLT information for the node the command was run on
B. LLT information for all configured nodes in the cluster
C. LLT information for any cluster nodes attached to the same switch
D. only LLT information for nodes verified by Veritas Cluster Server to be active
Answer: B
Explanation:
QUESTION NO: 9
Which roles configuration tab is used to set the custom attributes that a certain role can view or
edit?
A. General tab
B. Incident Access tab
C. Policy Management tab
D. Users tab
Answer: A
Explanation:
QUESTION NO: 10
Which component is directly responsible for communicating online configuration changes to all
nodes in the cluster?
A. LLT
B. IMF
C. GAB
D. HAD
Answer: D
Explanation:
QUESTION NO: 11
Discover Servers can leave Marker Files for files moved to the quarantine location.
Which file types retain their file extension and the corresponding icon in the Marker File?
A. All file types configured in Windows Explorer on the detection server host
B. Text files, including source code in Java, C, and shell script
C. Microsoft Office documents
D. File types specified in the ProtectRemediation.properties file
Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 12
What is required in order to have two separate Veritas clusters share a common private heartbeat
network switch?
A. GAB network IDs must be unique across the clusters.
B. All node IDs must be unique across the clusters.
C. Cluster IDs must be unique across the clusters.
D. All LLT node IDs must be unique across the clusters.
Answer: C
Explanation:
QUESTION NO: 13
Which two are characteristics of a Veritas Cluster Server resource? (Select two.)
A. Corresponds to a hardware or software component
B. Allows cyclical dependencies without a clear starting point
C. Allows only persistent resources to be a parent
D. Has a unique name throughout the cluster
E. Has a single entry point that the agent uses to control the resource
Answer: A,D
Explanation:
QUESTION NO: 14
Which detection method includes keyword rules?
A. Exact Data Matching (EDM)
B. Directory Group Matching (DGM)
C. Described Content Matching (DCM)
D. Indexed Document Matching (IDM)
Answer: C
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 15
What information must be specified when adding a resource to a service group?
A. Cluster identifier
B. System name
C. Attribute values
D. Service group name
Answer: D
Explanation:
QUESTION NO: 16
What are two requirements for configuring disk-based I/O fencing on supported storage arrays?
(Select two.)
A. Cluster File System Option enabled
B. Arrays with SCSI3-PR enabled
C. Aminimum of two private heartbeat connections
D. LUNs visible within the vxdisk list output
E. LUNs validated with the hacf -verify command
Answer: B,D
Explanation:
QUESTION NO: 17
Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.
Thinking specifically about data disks, which two cluster configuration requirements must be met
to implement this? (Select two.)
A. The application using the disks must be managed by a VCS Application resource type.
B. The disks must be in a Veritas Volume Manager disk group.
QUESTION NO: 18
An administrator is responsible for a cluster split between two data centers in different locations.
The data is mirrored between the two sites.
If the administrator would like to set up I/O fencing, how should the configuration be deployed to
maximize resilience?
A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and
a Coordination Point Server at a third site
B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
C. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
D. One Coordination Point Server at the primary site, and one Coordination Point Server at the
secondary site, and one Coordination Point Server at a third site
Answer: A
Explanation:
QUESTION NO: 19
An employee received the following email notification:
****************************************************************************************************************
********
Dear Bob,
Your email to jane_smith@partner.com with subject Account Info you requested violates the
company's Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email.
The communication will then be automatically sent to the recipient in an encrypted form, in
accordance with company policy.
"Pass Any Exam. Any Time." - www.actualtests.com
QUESTION NO: 20
Only two local disks suitable for use as coordinator disks are available for a local muti-node
cluster.
Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency
of the I/O fencing configuration? (Select two.)
A. One-node CP server cluster with GAB and LLT configured
B. One-node CP server cluster with only LLT configured
C. Second network connection to the CP server cluster
D. Multi-node CP server cluster
E. I/O fencing on the CP server cluster
Answer: C,D
Explanation:
QUESTION NO: 22
How is a policy applied to files found in Network Discover scans?
A. By assigning policy groups to the scan target
B. By choosing the correct policies in the scan target
C. By assigning policies to the Network Discover Server
D. By choosing the correct detection servers to run the scans
Answer: A
Explanation:
QUESTION NO: 23
How can an incident responder remediate multiple incidents simultaneously?
A. By selecting a Smart Response on the Incident Snapshot page
B. By selecting an Automated Response on an Incident List report
C. By selecting a Smart Response on an Incident List report
D. By selecting the Find Similar command on the Incident Snapshot page
Answer: C
Explanation:
QUESTION NO: 24
10
QUESTION NO: 25
Which Storage Foundation feature is used to send data changes to a remote site via an IP
network?
A. Volume Replicator
B. Storage Replicator
C. NetBackup
D. Replication Exec
Answer: C
Explanation:
QUESTION NO: 26
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A. It must have the ability to be monitored.
B. It must have the ability to store all required data and configuration information on shared disks.
C. It must have the ability to store all required data on SATA disks.
D. It must have the ability to copy configuration information between cluster nodes.
Answer: A
Explanation:
QUESTION NO: 27
Which two capabilities must an application have in order to be made highly available using Veritas
"Pass Any Exam. Any Time." - www.actualtests.com
11
QUESTION NO: 28
How does a system administrator verify that a Network Monitor Server is healthy?
A. By checking Incident Queue and Message Wait Time on the System Overview page
B. By verifying the configuration details of the System Settings page
C. By determining whether system alert message emails are generated or received
D. By reviewing the results of the Environmental Check Utility (ECU)
Answer: A
Explanation:
QUESTION NO: 29
Which two traffic feed sources should be used for Network Monitor? (Select two.)
A. Test Access Port (TAP)
B. trunking port on a hub
C. Switched Port Analyzer (SPAN) port
D. router LAN port
E. tunneled port on a VPN router
Answer: A,C
Explanation:
QUESTION NO: 30
12
QUESTION NO: 31
Which product can replace a confidential document residing on a public share with a Marker File
explaining why the document was removed?
A. Network Prevent
B. Network Protect
C. Network Monitor
D. Network Discover
Answer: B
Explanation:
QUESTION NO: 32
During testing, an administrator configures a Network Discover target to identify and quarantine
confidential files. The target is set up with a Default credential that has read-only permissions on
the file server. After running the scan and checking the results, the administrator finds several
incidents from the scan, but observes that all confidential files are still in their original location, and
the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)
A. The sharelist excludes all directories on the host being scanned.
B. The Quarantine/Copy Share credentials are invalid.
13
QUESTION NO: 33
Which two characteristics must be present when preparing an application to be configured for high
availability using Veritas Cluster Server? (Select two.)
A. Ability to run on multiple independent servers
B. Remote monitoring capability
C. Data stored on internal disks
D. Well-defined start and stop procedures
E. Refresh capability after sudden failures
Answer: A,D
Explanation:
QUESTION NO: 34
An administrator is planning to migrate a locally hosted application to high availability. Data
migration on the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the
configuration of the application service? (Select two.)
A. configure the operating system to automatically mount the file systems involved
B. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems
involved
C. link the application resource to the file system resources, with appropriate dependencies
D. unconfigure the operating system to automatically mount the file systems involved
E. set up the appropriate file system contention mechanism in the correct sequence
Answer: B,D
Explanation:
14
QUESTION NO: 36
Which data locations should an organization scan first?
A. Private individual directories
B. Centralized repositories
C. Password protected shares
D. Regionalized repositories
Answer: B
Explanation:
QUESTION NO: 37
Which detection method is used for fingerprinting and protecting unstructured data, such as
source code documents or merger and acquisition documents?
A. Exact Data Matching (EDM)
B. Directory Group Matching (DGM)
C. Indexed Document Matching (IDM)
D. Described Content Matching (DCM)
Answer: C
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
15
QUESTION NO: 38
The log files used to verify that a custom application is being properly monitored are located in
which directory?
A. /var/VRTSvcs/log/
B. /opt/VRTSvcs/log/
C. /var/VRTSvcs/agent/log/
D. /opt/VRTSvcs/agent/log/
Answer: B
Explanation:
QUESTION NO: 39
What should be considered before enabling the Preventing Concurrency Violation (ProPCV)
attribute in a service group?
A. The MonitorProgram attribute must be configured for the Application resource type.
B. The MonitorProcesses attribute must be configured for the Application resource type.
C. The Mode value for the IMF attribute of the Application type resource is set to 1.
D. The ProPCV attribute is prevented from being changed when the service group is active.
Answer: B
Explanation:
QUESTION NO: 40
What are two resource types that Proxy resources can reference? (Select two.)
A. NIC
B. IP
C. Quorum
D. DNS
E. ElifNone
Answer: A,E
"Pass Any Exam. Any Time." - www.actualtests.com
16
QUESTION NO: 41
On a cluster, what does the following command display?
Hares -display -ovalues
A. all online resource attributes
B. all overridden resource attributes
C. all uncommitted resource attributes
D. all default resource attributes
Answer: B
Explanation:
QUESTION NO: 42
Which two actions can be taken to determine whether an application clustered with Veritas Cluster
Server (VCS) has been successfully started or stopped? (Select two.)
A. Examine the online log file
B. Examine the engine log file
C. View the Security Log from the VCS Java GUI
D. View the Log Desk from the VCS Java GUI
E. View the Application_A.log file
Answer: B,D
Explanation:
QUESTION NO: 43
Which resource type creates a dependency between applications that are configured in different
Veritas Cluster Server clusters?
A. Proxy
B. RemoteGroup
17
QUESTION NO: 44
What is the primary benefit of implementing the Intelligent Monitoring Framework feature for
resources?
A. Prevention of concurrency violations
B. Monitoring of resources running on remote clusters
C. Immediate notification of resource state change
D. Monitoring of resources without need of configuration
Answer: C
Explanation:
QUESTION NO: 45
How is Intelligent Monitoring Framework configured?
A. It is automatically configured but only on supported agents.
B. It is automatically configured on all agents.
C. It needs to be manually configured on each agent.
D. It needs to be manually configured on each cluster node.
Answer: A
Explanation:
QUESTION NO: 46
On which system can you set UseMpathd=1 in a MultiNICB resource?
A. Solaris
B. Linux
C. AIX
"Pass Any Exam. Any Time." - www.actualtests.com
18
QUESTION NO: 47
Which resource type attribute enables Veritas Cluster Server to bring a resource online after it
goes offline unexpectedly before faulting the resource?
A. RestartLimit
B. RetryLimit
C. AutoRestartLimit
D. AutoRestart
Answer: A
Explanation:
QUESTION NO: 48
Given a service group with all resources online, what should be done to prevent the top resource
in a dependency tree from causing a failover when it is taken offline outside the cluster?
A. Freeze the resource
B. Disable the dependency links for the resource
C. Set the Critical attribute for the resource to 0
D. Freeze the node
Answer: C
Explanation:
QUESTION NO: 49
What is the main benefit of installing and using the Symantec Management Platform for managing
DLP Agents?
A. The ability to supervise how agents are used
B. The ability to view the health status of the agents
"Pass Any Exam. Any Time." - www.actualtests.com
19
QUESTION NO: 50
When setting different severity levels, which level should be set as the default?
A. The highest level available in the system
B. The lowest level available in the system
C. The lowest level the policy manager wants to assign
D. The highest level the policy manager wants to assign
Answer: C
Explanation:
QUESTION NO: 51
Which actions are required to enable a service group to run on all systems in a cluster
simultaneously?
A. Run the hagrp -modify [service group] Parallel 1 command and the service group will
automatically restart on all systems
B. Take the service group offline, add all cluster systems to the AutoStartList, and bring the
service group back online with the -all option
C. Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems
to the AutoStartList, and restart Veritas Cluster Server
D. Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all
cluster systems, and restart Veritas Cluster Server
Answer: C
Explanation:
QUESTION NO: 52
Which type of resources are considered by Veritas Cluster Server when determining whether a
service group is online?
"Pass Any Exam. Any Time." - www.actualtests.com
20
QUESTION NO: 53
Which characteristic of Veritas Cluster Server attributes allows the public interface to be different
for each of the systems in the cluster?
A. Global
B. Local
C. Custom
D. Proxy
Answer: B
Explanation:
QUESTION NO: 54
What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?
A. If any detection server in the system is running, the agent automatically connects to it after a
period of time.
B. If any Endpoint Server is running, the agent automatically connects to it after a period of time.
C. If any Endpoint Server is running, and if the agent is configured to recognize it, the agent
connects to it after a period of time.
D. If any detection server is running, and if the agent is configured to recognize it, the agent
connects to it after a period of time.
Answer: C
Explanation:
QUESTION NO: 55
Which statement describes a DLP Agent encryption feature?
"Pass Any Exam. Any Time." - www.actualtests.com
21
QUESTION NO: 56
How can a system administrator obtain the log files for a detection server? (Select three.)
A. Run the Log Collection Utility (LCU)
B. Navigate to the logs directory
C. Click Fetch Latest on the Server Detail page
D. Select Logs under Administration node
E. Download logs from the System Overview page
Answer: A,B,C
Explanation:
QUESTION NO: 57
Where can an incident responder view all actions that have occurred for an incident?
A. Incident Snapshot
B. Auditlog Table
C. Incident Actions
D. System Events
Answer: A
Explanation:
QUESTION NO: 58
Refer to the following service group example:
22
23
QUESTION NO: 59
An application is experiencing failures. The application administrator wants Veritas Cluster Server
to take all resources offline after failure. The application should remain offline.
Which attribute can accomplish this?
A. ManageFaults
B. FailOverPolicy
C. AutoFailover
D. Critical
Answer: C
Explanation:
24
QUESTION NO: 61
Which service group attribute enables specifying preferred nodes for failover?
A. SystemZones
B. AutostartList
C. ClusterList
D. IntentionalOnlineList
Answer: A
Explanation:
QUESTION NO: 62
Which two are default behaviors of Veritas Cluster Server service groups? (Select two.)
A. Migrate service groups from a system on intentional system shutdown
B. Start the service groups in lexical order
C. AutoDisable the service groups on cluster startup
D. AutoDisable the service groups on a system when all low priority links fail
E. Start the service groups in the order of the attribute SystemList
Answer: A,C
Explanation:
25
QUESTION NO: 64
Consider the following configuration:
group websg (
SystemList = { sym1 = 1, sym2 = 2 }
AutoStartList = { sym1 }
Frozen = 1
)
While websg is online, all of the systems in the cluster are rebooted simultaneously. All of the
systems finish booting and successfully join the cluster.
What will happen to the websg service group?
A. It will unfreeze on reboot and start on sym1.
B. It will remain offline on all systems.
C. It will resume its state before the reboot.
D. It will start on sym1 in a frozen state.
Answer: B
Explanation:
QUESTION NO: 65
26
QUESTION NO: 66
What should be done before removing a resource named webdg from a running service group?
A. The service group must be taken offline.
B. All parent resources of webdg must be taken offline.
C. All child resources of webdg must be taken offline.
D. The service group must be disabled.
Answer: B
Explanation:
27
QUESTION NO: 68
Under which high-level node in the left navigation panel can administrators find the System Events
report?
A. Reports
B. Policy
C. System Health
D. Administration
Answer: D
Explanation:
QUESTION NO: 69
Which two are valid settings for FailoverPolicy? (Select two.)
A. Priority
B. RoundRobin
C. Order
D. Failover
E. Dynamic
Answer: A,B
Explanation:
28
QUESTION NO: 71
An additional email address was added to the Veritas Cluster Server notifier resource without any
other actions being taken. All but one user is receiving notifications.
How can this problem be solved?
A. Refresh the mailbox of the impacted user
B. Restart the notifier resource
C. Restart the SNMP daemon
D. Restart the HAD daemon
Answer: B
Explanation:
QUESTION NO: 72
A system administrator examines the results of a completed scan.
Which information is available on a scan listing on the Discover Targets page? (Select three.)
A. User who initiated the scan
B. Elapsed time and total time for each scan
C. Number of items scanned
D. Number of items changed since the previous scan
E. File structure and location
F. Errors encountered
"Pass Any Exam. Any Time." - www.actualtests.com
29
QUESTION NO: 73
When configured as default, the Veritas Cluster Server Notifier receives queued messages on a
schedule every how many minutes?
A. One
B. Three
C. Five
D. Ten
Answer: B
Explanation:
QUESTION NO: 74
The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications
involves stopping the components in the communications stack, modifying the configuration files,
and restarting the stack.
In what order should the components be stopped?
A. LLT, GAB, I/O fencing
B. VCS, I/O fencing, GAB, LLT
C. VCS, I/O fencing, LLT, GAB
D. I/O fencing, VCS, GAB, LLT
Answer: B
Explanation:
QUESTION NO: 75
What is a characteristic of the Veritas Cluster Server communication stack?
A. The HAD processes propagates information to other nodes by way of agents.
30
QUESTION NO: 76
A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due
to network reconfiguration.
What is the correct order for the cluster and heartbeat protocols to be shut down?
A. VCS --> Fencing --> GAB --> LLT
B. VCS --> Fencing --> LLT --> GAB
C. Fencing --> VCS --> GAB --> LLT
D. Fencing --> VCS --> LLT --> GAB
Answer: A
Explanation:
QUESTION NO: 77
Which three options can incident responders select when deleting incidents? (Select three.)
A. Delete the incident completely
B. Delete the original message and retain the incident
C. Delete the incident and retain the violating attachments or files
D. Delete the incident and export incident details to .csv file
E. Delete the non-violating attachments or files and retain the incident
Answer: A,B,E
Explanation:
QUESTION NO: 78
A two node cluster is being brought online, but one node is unable to boot.
"Pass Any Exam. Any Time." - www.actualtests.com
31
QUESTION NO: 79
Which three products support virtualization and can be run on virtual machines? (Select three.)
A. Endpoint Discover
B. Network Discover
C. Network Prevent (Web)
D. Network Monitor
E. Network Prevent (Email)
Answer: B,C,E
Explanation:
QUESTION NO: 80
Which two items are required to replace a coordinator disk while the cluster is online? (Select two.)
A. Replace the LUN and create the disk as a Veritas Volume Manager (VxVM) Disk
B. Replace the LUN and create the disk as a Logical Volume Manager (LVM) Disk
C. Replace the LUN and create the disk as either a VxVM or LVM Disk
D. Run the installvcs -fencing command to replace the removed LUNs
E. Run the vxfenadm command to replace the removed LUNs
Answer: A,D
Explanation:
QUESTION NO: 81
32
QUESTION NO: 82
In which two cases will the agent status remain green (good) on the Agent Events page? (Select
two.)
A. The agent closed the connection to the Endpoint Server.
B. The Endpoint Server detected that the connection with the agent was lost.
C. There was agent or server authentication failure.
D. The agent is unable to restore a database file.
E. There was an agent service shutdown during machine shutdown.
Answer: A,E
Explanation:
QUESTION NO: 83
Which Preferred Fencing policy should be configured to ensure that the node with the preferred
application survives a fencing event?
A. PreferredFencingPolicy = Disabled
B. PreferredFencingPolicy = Site
C. PreferredFencingPolicy = System
D. PreferredFencingPolicy = Group
Answer: D
Explanation:
33
An administrator has configured preferred fencing. Cluster communication breaks and separates
sym1 from the other cluster nodes.
Which node(s) will survive the fencing race?
A. sym1 only
B. sym2 only
C. sym3 only
D. both sym2 and sym3
Answer: D
Explanation:
QUESTION NO: 85
An administrator stopped Veritas Cluster Server (VCS) on the sym1 node to remove it from the
cluster. When attempting to do this with the hasys -delete command from sym2, an error message
is displayed.
What is the likely cause of this error?
A. One or more SystemList attributes still contains sym1.
B. VCS must be completely shut down on all nodes.
C. The vxfen daemon on sym1 is still running.
D. The GAB daemon on sym1 is still running.
Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com
34
QUESTION NO: 86
How is the incident count for a new system managed in order to avoid overwhelming the incident
response team?
A. Match count thresholds are set.
B. More than one policy is enabled.
C. Many incident responders are allowed access to the system.
D. Incidents are auto-filtered to hide false positives.
Answer: A
Explanation:
QUESTION NO: 87
An administrator is adding a node to a running cluster. The administrator has successfully installed
Veritas Cluster Server and has configured and started LLT.
Which command will allow the new node to start communicating with the cluster?
A. gabconfig -c
B. hastart
C. sh /etc/gabconfig
D. hastart -force
Answer: A
Explanation:
QUESTION NO: 88
An administrator is merging two Veritas clusters that are already configured and running. The two
clusters are already sharing private interconnect networks.
Which directive in the /etc/llttab file must be updated?
A. Set-cluster
"Pass Any Exam. Any Time." - www.actualtests.com
35
QUESTION NO: 89
An administrator has removed a system from a running Veritas Cluster Server cluster so that the
cluster now only has seven nodes. The administrator must ensure the cluster will start successfully
after a complete cluster shutdown.
Which line should be in the /etc/gabtab file to successfully start the cluster?
A. gabconfig -c -n 7
B. clust start seed=7
C. gabconfig start seed=7
D. clust -c -n 7
Answer: B
Explanation:
QUESTION NO: 90
What is an advantage of using a Dashboard report?
A. Incident reponders can execute Smart Responses from them.
B. They allow incidents to be viewed across multiple products.
C. They can be used as work queues for incident responders.
D. Incident responders can see the history of each incident.
Answer: B
Explanation:
QUESTION NO: 91
Which Veritas Cluster Server command is used to override static resource type attribute values for
"Pass Any Exam. Any Time." - www.actualtests.com
36
QUESTION NO: 92
A resource of type Application is configured to be monitored by the Intelligent Monitoring
Framework.
Which resource attribute should be exclusively configured in order to enable the Proactive
Prevention of Concurrency feature for the resource of type Application?
A. PidFiles
B. MonitorProgram
C. MonitorProcesses
D. StartProgram
Answer: C
Explanation:
QUESTION NO: 93
What should a system administrator do to stop a detection server?
A. Access the Enforce Server Detail page and select "Done"
B. Access the Server Detail page and select "Stop"
C. Access a command prompt and enter the command "net stop service VontuMonitor"
D. Access the services panel and stop the VontuMonitorController service
Answer: B
Explanation:
37
QUESTION NO: 95
Which command allows the administrator to leave services currently under Veritas Cluster Server
control in a running state while performing configuration changes?
A. hastop -all -force
B. hastop -all -evacuate
C. haconf -all -force
D. haconf -all -evacuate
Answer: A
Explanation:
QUESTION NO: 96
Offline configuration changes made to Veritas Cluster Server (VCS) are missing when viewing it in
one of the GUIs or the CLI.
What is the likely cause of this issue?
A. VCS was started on the node where the changes were made.
"Pass Any Exam. Any Time." - www.actualtests.com
38
QUESTION NO: 97
When making offline configuration changes, which command should be run to ensure the main.cf
file has the correct syntax?
A. haconf verify
B. hagrp verify
C. haclus verify
D. hacf verify
Answer: D
Explanation:
QUESTION NO: 98
Which Veritas Cluster Server (VCS) utility is used to verify a configuration file and can also be
used by the VCS engine to load a configuration file at runtime?
A. hacf
B. haconf
C. haclus
D. haverify
Answer: B
Explanation:
QUESTION NO: 99
What is a likely outcome of filtering network traffic in Network Monitor?
A. monitoring of outbound traffic before inbound traffic
"Pass Any Exam. Any Time." - www.actualtests.com
39
40
41
42
A two-node cluster has three failover service groups as shown in the exhibit. The websg and
appsg service groups are online on sym1 the dbsg service group is online on sym2. All resources
are enabled and critical.
Which action does Veritas Cluster Server take when a resource in the appsg service group faults?
43
44
45
46
47
48
49
Consider the lltstat output from both nodes of a cluster as denoted in the exhibit.
Assuming all hardware is operational, what is required to get the heartbeat links running normally?
A. start LLT
B. start GAB
C. run lltconfig -c
D. run gabconfig -a
Answer: B
Explanation:
50
All service groups have FailOverPolicy=Load and are configured to run on all of the nodes.
What happens when the node sym4 faults?
A. g4sg fails over to node sym1, and g5sg remains offline everywhere.
B. g4sg fails over to node sym1, and g5sg fails over to node sym3.
C. g4sg fails over to node sym3, and g5sg fails over to node sym2.
D. g4sg fails over to node sym3, and g5sg remains offline everywhere.
Answer: B
Explanation:
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
Given the configuration in the exhibit, in which two ways are resources or the service group
affected? (Select two.)
A. Any resource fault leads to a faulted state for the resource.
B. Any resource fault leads to the service group failing over.
C. Any resource fault will lead to the service group being taken offline.
D. Any resource fault will leave the service group partially online.
E. Any resource fault detected leads to the service group remaining online.
Answer: A,D
Explanation:
72
73
74
On which node will the websg service group start if all nodes are powered on and come online at
the same time?
A. sym1
B. sym2
C. sym3
D. sym4
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93