Free Veritas VCS-253 Exam Questions (page: 6)

Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)

  1. Ability to run on multiple independent servers
  2. Remote monitoring capability
  3. Data stored on internal disks
  4. Well-defined start and stop procedures
  5. Refresh capability after sudden failures

Answer(s): A,D



An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)

  1. configure the operating system to automatically mount the file systems involved
  2. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
  3. link the application resource to the file system resources, with appropriate dependencies
  4. unconfigure the operating system to automatically mount the file systems involved
  5. set up the appropriate file system contention mechanism in the correct sequence

Answer(s): B,D



An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target.
Which failover policy should the administrator implement to achieve this requirement?

  1. Priority
  2. RoundRobin
  3. Quorum
  4. Prerequisites

Answer(s): B



Which data locations should an organization scan first?

  1. Private individual directories
  2. Centralized repositories
  3. Password protected shares
  4. Regionalized repositories

Answer(s): B



Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?

  1. Exact Data Matching (EDM)
  2. Directory Group Matching (DGM)
  3. Indexed Document Matching (IDM)
  4. Described Content Matching (DCM)

Answer(s): C



The log files used to verify that a custom application is being properly monitored are located in which directory?

  1. /var/VRTSvcs/log/
  2. /opt/VRTSvcs/log/
  3. /var/VRTSvcs/agent/log/
  4. /opt/VRTSvcs/agent/log/

Answer(s): B



What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?

  1. The MonitorProgram attribute must be configured for the Application resource type.
  2. The MonitorProcesses attribute must be configured for the Application resource type.
  3. The Mode value for the IMF attribute of the Application type resource is set to 1.
  4. The ProPCV attribute is prevented from being changed when the service group is active.

Answer(s): B



What are two resource types that Proxy resources can reference? (Select two.)

  1. NIC
  2. IP
  3. Quorum
  4. DNS
  5. ElifNone

Answer(s): A,E



Viewing page 6 of 31



Post your Comments and Discuss Veritas VCS-253 exam prep with other Community members:

VCS-253 Exam Discussions & Posts