Administration of Veritas Cluster Server 6.0 for UNIX v6.0 (VCS-253)

Page:    1 / 16   
Total 235 questions

An employee received the following email notification:
*******************************************************************************************************
*****************
Dear Bob,
Your email to [email protected] with subject Account Info you requested violates the company's Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy.
Please note that this violation has also been reported to your manager. Confidential data protection is every employee's responsibility.
Thank you,
Corporate Information Security Team
*******************************************************************************************************
*****************
Which recommended item is missing from this email notification?

  • A. A contact person
  • B. The severity of the violation
  • C. The affected business unit
  • D. The name of the file that caused the violation


Answer : A

When making offline configuration changes, which command should be run to ensure the main.cf file has the correct syntax?

  • A. haconf –verify
  • B. hagrp –verify
  • C. haclus –verify
  • D. hacf –verify


Answer : D

What is the master administrator user (created during installation) unable to do?

  • A. Remove a detection server from system configuration without uninstalling the detection server
  • B. Create a policy author role that has access to just one policy group
  • C. Create an incident responder role that sees incidents only from Endpoint Discover scans
  • D. Dave custom reports and then share them with others in the system


Answer : D

Refer to the exhibit.


The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage devices via dual-hosted SCSI cables.
Why is this an inefficient configuration?

  • A. Storage should be shared by more than two nodes.
  • B. Clusters should have at most two nodes.
  • C. NAS is preferred over SAN for shared storage.
  • D. NFS is the preferred way to share storage within a cluster.


Answer : A

Which two standard Veritas Cluster Server resource types can determine if an application has unexpectedly exited? (Select two.)

  • A. Process
  • B. FileOnOff
  • C. Proxy
  • D. Application
  • E. Phantom


Answer : A,D

Which two response rule actions should be avoided in Exact Data Matching (EDM) policies? (Select two.)

  • A. Endpoint: Notify
  • B. Protect: Copy File
  • C. Network: Block HTTP/HTTPS
  • D. Protect: Quarantine File
  • E. Endpoint: Block
  • F. Network: Remove HTTP/HTTPS Content


Answer : A,E

Which two actions must be taken to upgrade an application under Veritas Cluster Server control? (Select two.)

  • A. Verify that the application agent supports the new version
  • B. Verify that the new version is supported with haagent -verify
  • C. Freeze the application service group
  • D. Freeze the application resources
  • E. Stop the application agent on all systems


Answer : A,C

An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?

  • A. Application, File System, Volume, Disk Group, IP, NIC
  • B. Application, Volume, Disk Group, IP, Proxy
  • C. Application, File System, Volume, Disk Group, IP, Proxy
  • D. Application, Volume, Disk Group, IP, Phantom


Answer : B

Refer to the exhibit.


Given the configuration in the exhibit, in which two ways are resources or the service group affected? (Select two.)

  • A. Any resource fault leads to a faulted state for the resource.
  • B. Any resource fault leads to the service group failing over.
  • C. Any resource fault will lead to the service group being taken offline.
  • D. Any resource fault will leave the service group partially online.
  • E. Any resource fault detected leads to the service group remaining online.


Answer : A,D

Which actions are required to enable a service group to run on all systems in a cluster simultaneously?

  • A. Run the hagrp -modify [service group] Parallel 1 command and the service group will automatically restart on all systems
  • B. Take the service group offline, add all cluster systems to the AutoStartList, and bring the service group back online with the -all option
  • C. Stop Veritas Cluster Server, edit main.cf to turn the Parallel attribute on, add all cluster systems to the AutoStartList, and restart Veritas Cluster Server
  • D. Stop Veritas Cluster Server, edit main.cf so the service group AutoStartList attribute includes all cluster systems, and restart Veritas Cluster Server


Answer : C

What are two major functions of Low Latency Transport (LLT)? (Select two.)

  • A. Cluster communications
  • B. Traffic distribution
  • C. Cluster membership
  • D. Heartbeating
  • E. Broadcast message


Answer : B,D

Why should Network Monitor be configured to filter out low-threat traffic?

  • A. Because the product is unable to filter out high-threat traffic
  • B. To ensure that CPU cycles are spent processing high-threat traffic
  • C. Because no other traffic will be monitored until this is accomplished
  • D. To verify that the filtering process is actually working


Answer : B

Which Storage Foundation feature is used to send data changes to a remote site via an IP network?

  • A. Volume Replicator
  • B. Storage Replicator
  • C. NetBackup
  • D. Replication Exec


Answer : C

Offline configuration changes made to Veritas Cluster Server (VCS) are missing when viewing it in one of the GUIs or the CLI.
What is the likely cause of this issue?

  • A. VCS was started on the node where the changes were made.
  • B. VCS was started on the node without the changes being made.
  • C. VCS was started on the node with the lowest priority in the SystemList.
  • D. VCS was started on the node with the highest priority in the SystemList.


Answer : B

When setting different severity levels, which level should be set as the default?

  • A. The highest level available in the system
  • B. The lowest level available in the system
  • C. The lowest level the policy manager wants to assign
  • D. The highest level the policy manager wants to assign


Answer : C

Page:    1 / 16   
Total 235 questions