최신 250-253 무료덤프 - Symantec Administration of Veritas Cluster Server 6.0 for Unix

During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)

정답: B,D
Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to "Modified"?

정답: A
The failover service group websg is online when it is frozen persistently. The cluster is stopped by running the command hastop -all -force.
What happens to the websg service group after all of the systems have the cluster started?

정답: A
What is a characteristic of the web-based installer?

정답: B
There is a two-node Veritas cluster with two independent heartbeat connections, and fencing is disabled.
What happens when one of the heartbeat connections is lost?

정답: D
Which Network Protect feature is a system administrator unable to configure?

정답: D
An employee received the following email notification:
**************************************************************************************************************** ********
Dear Bob,
Your email to [email protected] with subject Account Info you requested violates the company's Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy.
Please note that this violation has also been reported to your manager. Confidential data protection is every employee's responsibility.
Thank you,
Corporate Information Security Team
**************************************************************************************************************** ********
Which recommended item is missing from this email notification?

정답: C
Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?

정답: D
The log files used to verify that a custom application is being properly monitored are located in which directory?

정답: A
The administrator of a four-node Veritas cluster has configured notifications as highly available for all notification methods.
How many notification manager resources are running when all nodes are considered?

정답: C
Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)

정답: C,D
How can a system administrator obtain the log files for a detection server? (Select three.)

정답: A,C,E
An administrator needs to set up a service group dependency with the following characteristics:
The parent group depends on the child group being online on the same system.
If the child group faults, the parent group should be taken offline.
If the parent group faults, then the child group should go offline.
Which type of dependency is this?

정답: D
Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?

정답: B
In a Veritas cluster, when all high priority links fail, the low priority links are promoted to high priority in which manner?

정답: C
The I/O fencing configuration for a Veritas cluster uses one Coordination Point (CP) server and two local coordinator disks. There are two network connections between the cluster and the CP server. A resource of type CoordPoint has been configured in the cluster using all default resource attribute values.
Which resource attribute value for the resource of type CoordPoint needs to be modified so that the resource will fault only when both network connections to the CP server fail even though the coordination disks are still accessible?

정답: B
How should a policy manager write policies that adhere to compliance regulations effectively and easily?

정답: B
Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?

정답: A

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기