최신 250-253 무료덤프 - Symantec Administration of Veritas Cluster Server 6.0 for Unix
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
정답: B
When making offline configuration changes, which command should be run to ensure the main.cf file has the correct syntax?
정답: C
Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?
정답: C
All users, regardless of their role permissions, are allowed to configure which two reporting options? (Select two.)
정답: A,C
A two-node Veritas Cluster with I/O fencing configured has two service groups running, one on each node.
What happens when all heartbeat links are lost simultaneously?
What happens when all heartbeat links are lost simultaneously?
정답: D
An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?
Which types of resources should the administrator consider to configure in the service group?
정답: D
Symantec Operation Readiness Tools (SORT) provides which service?
정답: D
Refer to the following information: OnlineTimeoutInterval = 60
OnlineRetryLimit = 2
MonitorInterval = 120
RestartLimit = 0
What will occur if an application takes 70 seconds to come online during the online process?
OnlineRetryLimit = 2
MonitorInterval = 120
RestartLimit = 0
What will occur if an application takes 70 seconds to come online during the online process?
정답: B
On a cluster, what does the following command display?
Hares -display -ovalues
Hares -display -ovalues
정답: D
Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?
정답: D
What are three valid reasons for adding comments to incidents? (Select three.)
정답: A,B,C
A system administrator examines the results of a completed scan.
Which information is available on a scan listing on the Discover Targets page? (Select three.)
Which information is available on a scan listing on the Discover Targets page? (Select three.)
정답: B,E,F
What must a policy manager do when working with Exact Data Matching (EDM) indexes?
정답: A
Which kind of detection server can block file transfer protocol (FTP) requests?
정답: B
What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?
정답: B
Refer to the exhibit.

Symantec 250-253 Exam
A two-node cluster has three failover service groups as shown in the exhibit. The websg and appsg service groups are online on sym1 the dbsg service group is online on sym2. All resources are enabled and critical.
Which action does Veritas Cluster Server take when a resource in the appsg service group faults?

Symantec 250-253 Exam
A two-node cluster has three failover service groups as shown in the exhibit. The websg and appsg service groups are online on sym1 the dbsg service group is online on sym2. All resources are enabled and critical.
Which action does Veritas Cluster Server take when a resource in the appsg service group faults?
정답: C
What should an administrator do when the License Key expires?
정답: C
Which two traffic feed sources should be used for Network Monitor? (Select two.)
정답: B,D
Which Veritas Cluster Server command is used to override static resource type attribute values for a specific resource?
정답: A
Which three options can incident responders select when deleting incidents? (Select three.)
정답: B,C,E