QUESTION 1
Refer to the exhibit.
The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage devices via
dual-hosted SCSI cables.
Why is this an inefficient configuration?
A.
B.
C.
D.
Correct Answer: A
QUESTION 2
What does Network Monitor use to identify network traffic going to a nonstandard port?
A.
B.
C.
D.
Correct Answer: D
QUESTION 3
While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system
versions, this is potentially undesirable for which two reasons? (Select two.)
A.
B.
C.
D.
E.
User security
Inability to handle load on failover
Cluster upgrades
Operational complexity
Network connectivity
Correct Answer: BD
QUESTION 4
What are two operating systems supported by Veritas Cluster Server? (Select two.)
A. Fedora
B. Red Hat Enterprise Server
C. openSuSe
D. Mac OS
E. AIX
Correct Answer: BE
QUESTION 5
What is a characteristic of the web-based installer?
A.
B.
C.
D.
Correct Answer: D
QUESTION 6
What is a feature of keyless licensing?
A.
B.
C.
D.
Correct Answer: B
QUESTION 7
Symantec Operation Readiness Tools (SORT) provides which service?
A.
B.
C.
D.
Correct Answer: B
QUESTION 8
When run in a two node cluster, what does the lltstat -nvv command show?
A.
B.
C.
D.
only LLT information for the node the command was run on
LLT information for all configured nodes in the cluster
LLT information for any cluster nodes attached to the same switch
only LLT information for nodes verified by Veritas Cluster Server to be active
Correct Answer: B
QUESTION 9
Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?
A.
B.
C.
D.
General tab
Incident Access tab
Policy Management tab
Users tab
Correct Answer: A
QUESTION 10
Which component is directly responsible for communicating online configuration changes to all nodes in
the cluster?
A.
B.
C.
D.
LLT
IMF
GAB
HAD
Correct Answer: D
QUESTION 11
Discover Servers can leave Marker Files for files moved to the quarantine location.
Which file types retain their file extension and the corresponding icon in the Marker File?
A.
B.
C.
D.
All file types configured in Windows Explorer on the detection server host
Text files, including source code in Java, C, and shell script
Microsoft Office documents
File types specified in the ProtectRemediation.properties file
Correct Answer: D
QUESTION 12
What is required in order to have two separate Veritas clusters share a common private heartbeat network
switch?
A.
B.
C.
D.
Correct Answer: C
QUESTION 13
Which two are characteristics of a Veritas Cluster Server resource? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: AD
QUESTION 14
Which detection method includes keyword rules?
A.
B.
C.
D.
Correct Answer: C
QUESTION 15
What information must be specified when adding a resource to a service group?
A. Cluster identifier
B. System name
C. Attribute values
D. Service group name
Correct Answer: D
QUESTION 16
What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select
two.)
A.
B.
C.
D.
E.
Correct Answer: BD
QUESTION 17
Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.
Thinking specifically about data disks, which two cluster configuration requirements must be met to
implement this? (Select two.)
A.
B.
C.
D.
E.
The application using the disks must be managed by a VCS Application resource type.
The disks must be in a Veritas Volume Manager disk group.
The service group containing the disks must include an IP resource.
The disks must be managed by a VCS DiskGroup resource type.
The disks must contain at least one *.dbf file.
Correct Answer: BD
QUESTION 18
An administrator is responsible for a cluster split between two data centers in different locations.
The data is mirrored between the two sites.
If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize
resilience?
A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a
Coordination Point Server at a third site
B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
C. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
D. One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary
site, and one Coordination Point Server at a third site
Correct Answer: A
QUESTION 19
An employee received the following email notification:
***************************************************************************** *******************************************
Dear Bob,
Your email to jane_smith@partner.com with subject Account Info you requested violates the company's
Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The
communication will then be automatically sent to the recipient in an encrypted form, in accordance with
company policy.
Please note that this violation has also been reported to your manager. Confidential data protection is
every employee's responsibility.
Thank you,
Corporate Information Security Team
***************************************************************************** *******************************************
Which recommended item is missing from this email notification?
A.
B.
C.
D.
A contact person
The severity of the violation
The affected business unit
The name of the file that caused the violation
Correct Answer: A
QUESTION 20
Only two local disks suitable for use as coordinator disks are available for a local muti-node cluster.
Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/
O fencing configuration? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: CD
QUESTION 21
To which file system folder does PacketCapture write reconstructed SMTP messages?
A.
B.
C.
D.
drop
drop_pcap
drop_discover
drop_ttd
Correct Answer: B
QUESTION 22
How is a policy applied to files found in Network Discover scans?
A.
B.
C.
D.
Correct Answer: A
QUESTION 23
How can an incident responder remediate multiple incidents simultaneously?
A. By selecting a Smart Response on the Incident Snapshot page
B. By selecting an Automated Response on an Incident List report
Correct Answer: B
QUESTION 25
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
A.
B.
C.
D.
Volume Replicator
Storage Replicator
NetBackup
Replication Exec
Correct Answer: C
QUESTION 26
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A.
B.
C.
D.
Correct Answer: A
QUESTION 27
Which two capabilities must an application have in order to be made highly available using Veritas Cluster
Server? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: AC
QUESTION 28
How does a system administrator verify that a Network Monitor Server is healthy?
A.
B.
C.
D.
By checking Incident Queue and Message Wait Time on the System Overview page
By verifying the configuration details of the System Settings page
By determining whether system alert message emails are generated or received
By reviewing the results of the Environmental Check Utility (ECU)
Correct Answer: A
QUESTION 29
Which two traffic feed sources should be used for Network Monitor? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: AC
QUESTION 30
An administrator is configuring another application service in high availability. The application's logical IP
address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw
devices.
Which types of resources should the administrator consider to configure in the service group?
A.
B.
C.
D.
Correct Answer: B
QUESTION 31
Which product can replace a confidential document residing on a public share with a Marker File
explaining why the document was removed?
A.
B.
C.
D.
Network Prevent
Network Protect
Network Monitor
Network Discover
Correct Answer: B
QUESTION 32
During testing, an administrator configures a Network Discover target to identify and quarantine
confidential files. The target is set up with a Default credential that has read-only permissions on the file
server. After running the scan and checking the results, the administrator finds several incidents from the
scan, but observes that all confidential files are still in their original location, and the configured quarantine
directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: BE
QUESTION 33
Which two characteristics must be present when preparing an application to be configured for high
availability using Veritas Cluster Server? (Select two.)
A. Ability to run on multiple independent servers
B.
C.
D.
E.
Correct Answer: AD
QUESTION 34
An administrator is planning to migrate a locally hosted application to high availability. Data migration on
the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the configuration of
the application service? (Select two.)
A.
B.
C.
D.
E.
configure the operating system to automatically mount the file systems involved
configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
link the application resource to the file system resources, with appropriate dependencies
unconfigure the operating system to automatically mount the file systems involved
set up the appropriate file system contention mechanism in the correct sequence
Correct Answer: BD
QUESTION 35
An administrator is planning to configure a new application service in a Veritas cluster. In the case of an
application failure, the company requires that the node with the fewest running service groups be selected
as the failover target.
Which failover policy should the administrator implement to achieve this requirement?
A.
B.
C.
D.
Priority
RoundRobin
Quorum
Prerequisites
Correct Answer: B
QUESTION 36
Which data locations should an organization scan first?
A.
B.
C.
D.
Correct Answer: B
QUESTION 37
Which detection method is used for fingerprinting and protecting unstructured data, such as source code
documents or merger and acquisition documents?
A.
B.
C.
D.
Correct Answer: C
QUESTION 38
The log files used to verify that a custom application is being properly monitored are located in which
directory?
A.
B.
C.
D.
/var/VRTSvcs/log/
/opt/VRTSvcs/log/
/var/VRTSvcs/agent/log/
/opt/VRTSvcs/agent/log/
Correct Answer: B
QUESTION 39
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a
service group?
A.
B.
C.
D.
The MonitorProgram attribute must be configured for the Application resource type.
The MonitorProcesses attribute must be configured for the Application resource type.
The Mode value for the IMF attribute of the Application type resource is set to 1.
The ProPCV attribute is prevented from being changed when the service group is active.
Correct Answer: B
QUESTION 40
What are two resource types that Proxy resources can reference? (Select two.)
A.
B.
C.
D.
E.
NIC
IP
Quorum
DNS
ElifNone
Correct Answer: AE
QUESTION 41
On a cluster, what does the following command display?
Hares -display -ovalues
A.
B.
C.
D.
Correct Answer: B
QUESTION 42
Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server
(VCS) has been successfully started or stopped? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: BD
QUESTION 43
Which resource type creates a dependency between applications that are configured in different Veritas
Proxy
RemoteGroup
Phantom
Application
Correct Answer: B
QUESTION 44
What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?
A.
B.
C.
D.
Correct Answer: C
QUESTION 45
How is Intelligent Monitoring Framework configured?
A.
B.
C.
D.
Correct Answer: A
QUESTION 46
On which system can you set UseMpathd=1 in a MultiNICB resource?
A.
B.
C.
D.
Solaris
Linux
AIX
HP-UX
Correct Answer: D
QUESTION 47
Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offline
unexpectedly before faulting the resource?
A.
B.
C.
D.
RestartLimit
RetryLimit
AutoRestartLimit
AutoRestart
Correct Answer: A
QUESTION 48
Given a service group with all resources online, what should be done to prevent the top resource in a
dependency tree from causing a failover when it is taken offline outside the cluster?
A. Freeze the resource
B. Disable the dependency links for the resource
C. Set the Critical attribute for the resource to 0
Correct Answer: D
QUESTION 50
When setting different severity levels, which level should be set as the default?
A.
B.
C.
D.
Correct Answer: C
QUESTION 51
Which actions are required to enable a service group to run on all systems in a cluster simultaneously?
A. Run the hagrp -modify [service group] Parallel 1 command and the service group will automatically
restart on all systems
B. Take the service group offline, add all cluster systems to the AutoStartList, and bring the service group
back online with the -all option
C. Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the
AutoStartList, and restart Veritas Cluster Server
D. Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all cluster
systems, and restart Veritas Cluster Server
Correct Answer: C
QUESTION 52
Which type of resources are considered by Veritas Cluster Server when determining whether a service
group is online?
A.
B.
C.
D.
OnOnly
OnOff
Persistent
None
Correct Answer: B
QUESTION 53
Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each
of the systems in the cluster?
A.
B.
C.
D.
Global
Local
Custom
Proxy
Correct Answer: B
QUESTION 54
What happens when a DLP Agent is unable to connect to its preferred Endpoint Server?
A. If any detection server in the system is running, the agent automatically connects to it after a period of
time.
B. If any Endpoint Server is running, the agent automatically connects to it after a period of time.
C. If any Endpoint Server is running, and if the agent is configured to recognize it, the agent connects to it
after a period of time.
D. If any detection server is running, and if the agent is configured to recognize it, the agent connects to it
after a period of time.
Correct Answer: C
QUESTION 55
Which statement describes a DLP Agent encryption feature?
A.
B.
C.
D.
Correct Answer: C
QUESTION 56
How can a system administrator obtain the log files for a detection server? (Select three.)
A.
B.
C.
D.
E.
Incident Snapshot
Auditlog Table
Incident Actions
System Events
Correct Answer: A
QUESTION 58
Refer to the following service group example:
group websg (
SystemList = { sym1 = 0, sym2 = 1 }
AutoStart = 0
AutoStartList = { sym2 }
)
DiskGroup webdg (
DiskGroup = webdg
)
IP webip (
Device = eth0
Address = "169.254.128.12"
NetMask = "255.255.255.0"
)
Mount webmnt (
MountPoint = "/web1"
BlockDevice = "/dev/vx/dsk/webdg/webvol"
FSType = vxfs
MountOpt = rw
FsckOpt = "-y"
)
NIC webnic (
Device = eth0
)
Application webproc (
MonitorProgram = "/usr/local/bin/web -monitor"
StartProgram = "/usr/local/bin/web -start"
StopProgram = "/usr/local/bin/web -stop"
)
webip requires webproc
webproc requires webmnt
webip requires webnic
webmnt requires webdg
Which resource will start online last?
A.
B.
C.
D.
webip
webmnt
webproc
webdg
Correct Answer: A
QUESTION 59
An application is experiencing failures. The application administrator wants Veritas Cluster Server to take
all resources offline after failure. The application should remain offline.
Which attribute can accomplish this?
A.
B.
C.
D.
ManageFaults
FailOverPolicy
AutoFailover
Critical
Correct Answer: C
QUESTION 60
Which three statements apply to communication between the Enforce Server and detection servers?
(Select three.)
A. By default, the Enforce Server and the detection servers communicate over port 8100.
B. Port 3389 must be open between the Enforce Server and the detection servers.
C. The same port number must be used for all detection servers.
D. The servers can be configured to use any port higher than 1024.
E. IPSec must be configured on the Enforce Server and the detection servers.
Correct Answer: ACD
QUESTION 61
Which service group attribute enables specifying preferred nodes for failover?
A.
B.
C.
D.
SystemZones
AutostartList
ClusterList
IntentionalOnlineList
Correct Answer: A
QUESTION 62
Which two are default behaviors of Veritas Cluster Server service groups? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: AC
QUESTION 63
System capacity and service group load are the main components for which FailOverPolicy?
A.
B.
C.
D.
Load
Order
Limit
Capacity
Correct Answer: A
QUESTION 64
Consider the following configuration:
group websg (
SystemList = { sym1 = 1, sym2 = 2 }
AutoStartList = { sym1 }
Frozen = 1
)
While websg is online, all of the systems in the cluster are rebooted simultaneously. All of the systems
finish booting and successfully join the cluster.
What will happen to the websg service group?
A.
B.
C.
D.
Correct Answer: B
QUESTION 65
The service group named websg is currently online on the sym3 node. All other nodes are running.
Consider the following partial main.cf definition:
Group websg (
SystemList = { sym1=0, sym2=1, sym3=2 }
AutoStartList = {sym2, sym3 }
FailOverPolicy = Priority
)
The operator incorrectly shuts down a critical resource in the websg service group outside of Veritas
Cluster Server.
Based on the information provided, what will happen to the websg service group?
A.
B.
C.
D.
Correct Answer: B
QUESTION 66
What should be done before removing a resource named webdg from a running service group?
A.
B.
C.
D.
Correct Answer: B
QUESTION 67
Which Network Discover option is used to determine whether confidential data exists without having to
scan the entire target?
A.
B.
C.
D.
Exclude Filtering
File Throttling
Byte Throttling
Inventory Mode Scanning
Correct Answer: D
QUESTION 68
Under which high-level node in the left navigation panel can administrators find the System Events report?
A.
B.
C.
D.
Reports
Policy
System Health
Administration
Correct Answer: D
QUESTION 69
Which two are valid settings for FailoverPolicy? (Select two.)
A. Priority
B. RoundRobin
C. Order
D. Failover
E. Dynamic
Correct Answer: AB
QUESTION 70
Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?
A.
B.
C.
D.
Simulator
AgentServer
Fencing
AgentTester
Correct Answer: C
QUESTION 71
An additional email address was added to the Veritas Cluster Server notifier resource without any other
actions being taken. All but one user is receiving notifications.
How can this problem be solved?
A.
B.
C.
D.
Correct Answer: B
QUESTION 72
A system administrator examines the results of a completed scan.
Which information is available on a scan listing on the Discover Targets page? (Select three.)
A.
B.
C.
D.
E.
F.
One
Three
Five
Ten
Correct Answer: B
QUESTION 74
The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves
stopping the components in the communications stack, modifying the configuration files, and restarting the
stack.
In what order should the components be stopped?
A.
B.
C.
D.
Correct Answer: B
QUESTION 75
What is a characteristic of the Veritas Cluster Server communication stack?
A.
B.
C.
D.
Correct Answer: B
QUESTION 76
A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due to
network reconfiguration.
What is the correct order for the cluster and heartbeat protocols to be shut down?
A.
B.
C.
D.
Correct Answer: A
QUESTION 77
Which three options can incident responders select when deleting incidents? (Select three.)
A.
B.
C.
D.
E.
gabconfig -x
gabconfig -n2
lltconfig -x
lltconfig -n2
Correct Answer: A
QUESTION 79
Which three products support virtualization and can be run on virtual machines? (Select three.)
A. Endpoint Discover
B.
C.
D.
E.
Network Discover
Network Prevent (Web)
Network Monitor
Network Prevent (Email)
Replace the LUN and create the disk as a Veritas Volume Manager (VxVM) Disk
Replace the LUN and create the disk as a Logical Volume Manager (LVM) Disk
Replace the LUN and create the disk as either a VxVM or LVM Disk
Run the installvcs -fencing command to replace the removed LUNs
Run the vxfenadm command to replace the removed LUNs
Correct Answer: AD
QUESTION 81
What are two reasons to implement SCSI-3 I/O fencing? (Select two.)
A.
B.
C.
D.
E.
Disk-based heartbeat
Data protection
Lock disk
Cluster communication
Membership arbitration
Correct Answer: BE
QUESTION 82
In which two cases will the agent status remain green (good) on the Agent Events page? (Select two.)
A.
B.
C.
D.
E.
Correct Answer: AE
QUESTION 83
Which Preferred Fencing policy should be configured to ensure that the node with the preferred application
survives a fencing event?
A.
B.
C.
D.
PreferredFencingPolicy = Disabled
PreferredFencingPolicy = Site
PreferredFencingPolicy = System
PreferredFencingPolicy = Group
Correct Answer: D
QUESTION 84
Refer to the exhibit.
To Read the Whole Q&As, please purchase the Complete Version from Our website.
Need Help
Please provide as much detail as possible so we can best assist you.
To update a previously submitted ticket: