Page 1

Symantec

250-253

Administration of Veritas Cluster Server(R) 6.0 for Unix

Download Full version : http://killexams.com/pass4sure/exam-detail/250-253


QUESTION: 226

A two-node Veritas Cluster with I/O fencing configured has two service groups running,

one on each node. What happens when all heartbeat links are lost simultaneously?

A. All service groups remain where they are. B. All nodes race for the data disks, and one node panics. C. All nodes race for the coordinator disks, and one node panics. D. All service groups fault and shut down.

Answer: C

QUESTION: 227 In a two node Veritas cluster, all Ethernet heartbeats failed simultaneously. I/O fencing and linklowpri heartbeat are yet to be configured. What is the resulting condition of this problem?

A. Split-cluster B. Jeopardy C. Split-brain D. Panic

Answer: C

QUESTION: 228 What should be used to exclude email going to any email address in the partner.com domain?

A. IP filter B. L7 filter C. Content filter D. Sender/User Matches pattern

Answer: B

QUESTION: 229


Which three protocols are system-configured and are recognized by Network Monitor by their individual signatures? (Select three.)

A. FTP B. IM: ICQ C. IM: AIM D. NNTP E. TFTP

Answer: A, C, D

QUESTION: 230 An administrator adds a new user within a cluster that is running in a non-secure mode. In which file will the user name be stored?

A. /etc/VRTSvcs/conf/config/secure.cf B. /etc/VRTSvcs/conf/config/main.cf C. /etc/VRTSvcs/conf/config/types.cf D. /opt/VRTSvcs/conf/config/users.cf

Answer: B

QUESTION: 231

What must a policy manager do when working with Exact Data Matching (EDM) indexes?

A. Re-index large data sources on a daily or weekly basis B. Index the original data source on the detection server C. Deploy the index only to specific detection servers D. Create a new data profile if data source schema changes

Answer: D

QUESTION: 232

What is one function of a Network Discover scanner?


A. It scans an organization's network to identify Network Discover targets. B. It collects content and metadata from a variety of repositories. C. It sends collected content to the Enforce Server for processing. D. It specifies the types of repositories that can be scanned.

Answer: B

QUESTION: 233

What should an administrator do when the License Key expires?

A. Enter a new key on the Advanced Settings page B. Enter a new key on the System Settings page C. Edit the key in the VontuManager.conf file D. Edit the key in the Protect.properties file

Answer: B

QUESTION: 234

Which three does the Environment Check Utility (ECU) provide? (Select three.)

A. Software build numbers B. System events records C. Days remaining on the current license D. Operating system version of servers E. Installation configuration settings

Answer: A, D, E

QUESTION: 235 On which protocols does Symantec Data Loss Prevention 9.0 use port-based protocol recognition?

A. Secure tunneling protocols B. Pre-defined UDP protocols


C. User-configured TCP protocols D. System-defined UDP and TCP protocols

Answer: C


For More exams visit http://killexams.com ­

Kill your exam at First Attempt....Guaranteed!

Get high marks in 250-253 exam with these dumps  

killexams.com top rate 250-253 Exam Testing Tool is very facilitating for our customers for the exam preparation. All important features, to...

Get high marks in 250-253 exam with these dumps  

killexams.com top rate 250-253 Exam Testing Tool is very facilitating for our customers for the exam preparation. All important features, to...

Advertisement