최신 250-252 무료덤프 - Symantec Administration of Veritas Storage Foundation 6.0 for Unix
Which two operations can be performed with a Veritas Operations Manager (VOM) Management Server (MS) with all add-ons installed? (Select two.)
정답: A,D
Which virtual storage configuration can be created with Veritas Storage Foundation 6.0 for UNIX?
정답: C
Refer to the exhibit.

What is the disk access name for the device displayed in the vxdisk list output?

What is the disk access name for the device displayed in the vxdisk list output?
정답: B
Which two statements are true regarding the LiveUpdate section in the Virus settings area? (Select two.)
정답: A,D
Why is FastResync enabled automatically for volumes created on thin LUNs?
정답: C
Which two conditions are applicable to disks of a disk group that have been destroyed with the vxdg destroy command without re-deploying the disks? (Select two.)
정답: C,D
At which point during the installation process do you register the product?
정답: D
File system write performance starts to be affected on mirrored volumes assigned to a specific disk array. A path failure is suspected.
Which two commands could be used to determine the controllers to the specified disk array? (Select two.)
Which two commands could be used to determine the controllers to the specified disk array? (Select two.)
정답: B,E
Which would receive a spam verdict from Symantec?
정답: A
Which command line utility is used to view Veritas Volume Manager (VxVM) plexes?
정답: B
Given the following command:
vxassist -g datadg make datavol 10g layout=stripe !ctrl:c2
Which instruction does the !ctrl:c2 attribute prompt Veritas Storage Foundation 6.0 for UNIX to follow?
vxassist -g datadg make datavol 10g layout=stripe !ctrl:c2
Which instruction does the !ctrl:c2 attribute prompt Veritas Storage Foundation 6.0 for UNIX to follow?
정답: A
When performing a dry run for deduplication, fsdedupadm may take a '-o threshold=percentage' argument.
This argument will initiate an actual deduplication run when the metric reaches which given value?
This argument will initiate an actual deduplication run when the metric reaches which given value?
정답: C
Which command allows the removal of a mirror from a volume?
정답: A
Which operation can be performed during a volume relayout?
정답: D
Which statement is true regarding the encrypted attachment disposition in the Virus policy settings?
정답: A
During which stage of the installation process is external Internet connectivity mandatory?
정답: D