Veritas VCS-253 Exam Questions
Administration of Veritas Cluster Server 6.0 for UNIX (Page 8 )

Updated On: 21-Feb-2026

Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?

  1. Network Prevent
  2. Network Protect
  3. Network Monitor
  4. Network Discover

Answer(s): B



During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)

  1. The sharelist excludes all directories on the host being scanned.
  2. The Quarantine/Copy Share credentials are invalid.
  3. The Default credentials are invalid.
  4. The Copy option is selected.
  5. The Protect credential is unspecified.

Answer(s): B,E



Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)

  1. Ability to run on multiple independent servers
  2. Remote monitoring capability
  3. Data stored on internal disks
  4. Well-defined start and stop procedures
  5. Refresh capability after sudden failures

Answer(s): A,D



An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)

  1. configure the operating system to automatically mount the file systems involved
  2. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
  3. link the application resource to the file system resources, with appropriate dependencies
  4. unconfigure the operating system to automatically mount the file systems involved
  5. set up the appropriate file system contention mechanism in the correct sequence

Answer(s): B,D



An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target.
Which failover policy should the administrator implement to achieve this requirement?

  1. Priority
  2. RoundRobin
  3. Quorum
  4. Prerequisites

Answer(s): B






Post your Comments and Discuss Veritas VCS-253 exam dumps with other Community members:

Join the VCS-253 Discussion