Beruflich Dokumente
Kultur Dokumente
http://www.dumpcollection.com
PDF and Testing Engine, study and practice
Exam
250-254
Title
Administration of Symantec
Cluster Server 6.1 for UNIX
Vendor
Symantec
Version
DEMO
NO.1 Which environmental factors external to the nodes represent potential single points of failure
that can be made highly available through redundancy? (Select two.)
A. Application software
B. Operating system
C. Random access memory
D. Networking components
E. Electrical power circuits
Answer: D,E
NO.2 An administrator is merging two Veritas clusters that are already configured and running. The
two clusters are already sharing private interconnect networks.
Which directive in the /etc/llttab file must be updated?
A. Set-cluster
B. Set-node
C. Set-mode
D. Set-system
Answer: A
NO.3 Which system attribute must be set for a service group to fail over to the least loaded system?
A. Limits
B. Prerequisites
C. Capacity
D. Load
Answer: C
NO.4 Which statement is true about configuring the parent and child relationships among the
resources in a service group?
A. The parent resources require the child resources.
B. Child resources can only have one parent resource.
C. The child resources require the parent resources.
D. Parent resources can only have one child resource.
Answer: A
NO.5 Which requirements must be met to cluster an application? (Choose two.)
A. Recover to a known state
B. Start without manual intervention
C. Be host name dependent
D. Store data on a shared storage
E. Have a predictable process hierarchy
Answer: A,B
NO.6 Which system is unsuitable for use in a multinode cluster?
System S1: one local drive three network interfaces access to shared storage multiple processors two
HBAs
System S2: two mirrored local drives three network interfaces access to shared storage a single
processor two HBAs
System S3: two mirrored local drives three network interfaces access to shared storage multiple
processors one HBA
System S4: two mirrored local drives three network interfaces
multiple processors
two HBAs
A. System S1
B. System S2
C. System S3
D. System S4
Answer: D
NO.7 What does a data loss prevention solution help an organization identify? (Select three.)
A. Employee education opportunities
B. Risk of virus infection
C. Unprotected content on laptops
D. Illegally obtained software on desktops
E. Encryption enforcement opportunities
Answer: A,C,E
NO.8 What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A. It must have the ability to be monitored.
B. It must have the ability to store all required data and configuration information on shared disks.
C. It must have the ability to store all required data on SATA disks.
D. It must have the ability to copy configuration information between cluster nodes.
Answer: A
NO.9 Which text files are created at the end of a successful run of installvcs -installonly? (Choose
three.)
A. Log
B. Response
C. Gabtab
D. Llttab
E. Summary
Answer: A,B,E
NO.10 How can a system administrator obtain the log files for a detection server? (Select three.)
A. Run the Log Collection Utility (LCU)
B. Navigate to the logs directory
C. Click Fetch Latest on the Server Detail page
D. Select Logs under Administration node
3