Free Veritas VCS-253 Exam Questions (page: 5)

Which Storage Foundation feature is used to send data changes to a remote site via an IP network?

  1. Volume Replicator
  2. Storage Replicator
  3. NetBackup
  4. Replication Exec

Answer(s): C



What is a characteristic of an application that is to be clustered with Veritas Cluster Server?

  1. It must have the ability to be monitored.
  2. It must have the ability to store all required data and configuration information on shared disks.
  3. It must have the ability to store all required data on SATA disks.
  4. It must have the ability to copy configuration information between cluster nodes.

Answer(s): A



Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)

  1. The ability to monitor each instance of the application independently
  2. The ability to be installed on shared storage
  3. The ability to determine if the application is running
  4. The ability to notify the administrator of the state
  5. The ability to disconnect users from the application

Answer(s): A,C



How does a system administrator verify that a Network Monitor Server is healthy?

  1. By checking Incident Queue and Message Wait Time on the System Overview page
  2. By verifying the configuration details of the System Settings page
  3. By determining whether system alert message emails are generated or received
  4. By reviewing the results of the Environmental Check Utility (ECU)

Answer(s): A



Which two traffic feed sources should be used for Network Monitor? (Select two.)

  1. Test Access Port (TAP)
  2. trunking port on a hub
  3. Switched Port Analyzer (SPAN) port
  4. router LAN port
  5. tunneled port on a VPN router

Answer(s): A,C



An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?

  1. Application, File System, Volume, Disk Group, IP, NIC
  2. Application, Volume, Disk Group, IP, Proxy
  3. Application, File System, Volume, Disk Group, IP, Proxy
  4. Application, Volume, Disk Group, IP, Phantom

Answer(s): B



Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?

  1. Network Prevent
  2. Network Protect
  3. Network Monitor
  4. Network Discover

Answer(s): B



During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)

  1. The sharelist excludes all directories on the host being scanned.
  2. The Quarantine/Copy Share credentials are invalid.
  3. The Default credentials are invalid.
  4. The Copy option is selected.
  5. The Protect credential is unspecified.

Answer(s): B,E



Viewing page 5 of 31



Post your Comments and Discuss Veritas VCS-253 exam prep with other Community members:

VCS-253 Exam Discussions & Posts