Veritas VCS-253 Exam Questions
Administration of Veritas Cluster Server 6.0 for UNIX (Page 7 )

Updated On: 21-Feb-2026

What is a characteristic of an application that is to be clustered with Veritas Cluster Server?

  1. It must have the ability to be monitored.
  2. It must have the ability to store all required data and configuration information on shared disks.
  3. It must have the ability to store all required data on SATA disks.
  4. It must have the ability to copy configuration information between cluster nodes.

Answer(s): A



Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)

  1. The ability to monitor each instance of the application independently
  2. The ability to be installed on shared storage
  3. The ability to determine if the application is running
  4. The ability to notify the administrator of the state
  5. The ability to disconnect users from the application

Answer(s): A,C



How does a system administrator verify that a Network Monitor Server is healthy?

  1. By checking Incident Queue and Message Wait Time on the System Overview page
  2. By verifying the configuration details of the System Settings page
  3. By determining whether system alert message emails are generated or received
  4. By reviewing the results of the Environmental Check Utility (ECU)

Answer(s): A



Which two traffic feed sources should be used for Network Monitor? (Select two.)

  1. Test Access Port (TAP)
  2. trunking port on a hub
  3. Switched Port Analyzer (SPAN) port
  4. router LAN port
  5. tunneled port on a VPN router

Answer(s): A,C



An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?

  1. Application, File System, Volume, Disk Group, IP, NIC
  2. Application, Volume, Disk Group, IP, Proxy
  3. Application, File System, Volume, Disk Group, IP, Proxy
  4. Application, Volume, Disk Group, IP, Phantom

Answer(s): B






Post your Comments and Discuss Veritas VCS-253 exam dumps with other Community members:

Join the VCS-253 Discussion