Certbus > Symantec > SCS > 250-253 > 250-253 Online Practice Questions and Answers

250-253 Online Practice Questions and Answers

Questions 4

What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?

A. GAB network IDs must be unique across the clusters.

B. All node IDs must be unique across the clusters.

C. Cluster IDs must be unique across the clusters.

D. All LLT node IDs must be unique across the clusters.

Browse 108 Q&As
Questions 5

Which detection method includes keyword rules?

A. Exact Data Matching (EDM)

B. Directory Group Matching (DGM)

C. Described Content Matching (DCM)

D. Indexed Document Matching (IDM)

Browse 108 Q&As
Questions 6

Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)

A. Examine the online log file

B. Examine the engine log file

C. View the Security Log from the VCS Java GUI

D. View the Log Desk from the VCS Java GUI

E. View the Application_A.log file

Browse 108 Q&As
Questions 7

Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?

A. Global

B. Local

C. Custom

D. Proxy

Browse 108 Q&As
Questions 8

Where can an incident responder view all actions that have occurred for an incident?

A. Incident Snapshot

B. Auditlog Table

C. Incident Actions

D. System Events

Browse 108 Q&As
Questions 9

The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack.

In what order should the components be stopped?

A. LLT, GAB, I/O fencing

B. VCS, I/O fencing, GAB, LLT

C. VCS, I/O fencing, LLT, GAB

D. I/O fencing, VCS, GAB, LLT

Browse 108 Q&As
Questions 10

What is an advantage of using a Dashboard report?

A. Incident reponders can execute Smart Responses from them.

B. They allow incidents to be viewed across multiple products.

C. They can be used as work queues for incident responders.

D. Incident responders can see the history of each incident.

Browse 108 Q&As
Questions 11

What is a likely outcome of filtering network traffic in Network Monitor?

A. monitoring of outbound traffic before inbound traffic

B. monitoring of traffic important to the customer

C. decrease in the detection accuracy

D. increase in Network Monitor demand for RAM

Browse 108 Q&As
Questions 12

The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured.

Where will Veritas Cluster Server look for the two trigger executables?

A. $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2

B. $VCS_HOME/bin/websg/postoffline/T1action1 $VCS_HOME/bin/websg/postoffline/T2action2

C. $VCS_HOME/bin/triggers/websg/T1action1 $VCS_HOME/bin/triggers/websg/T1action2

D. $VCS_HOME/bin/postoffline/T1action1 $VCS_HOME/bin/postoffline/T2action2

Browse 108 Q&As
Questions 13

When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?

A. Add comments

B. Delete incidents

C. Set severity

D. Export incidents

Browse 108 Q&As
Questions 14

How should a policy manager write policies that adhere to compliance regulations effectively and easily?

A. By copying an existing policy and editing as necessary

B. By creating a new blank policy and adding fitting rules

C. By using a policy template and editing as necessary

D. By using a compliance data identifier in the policy

Browse 108 Q&As
Questions 15

Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?

A. in the Incident Snapshot

B. in the Marker File

C. in the System Event

D. in the Discover Target configuration

Browse 108 Q&As
Questions 16

In a four-node cluster configuration, main.cf is modified to remove one of the four nodes. That node is decommissioned, and the remaining cluster configuration is unchanged. A power failure causes all three remaining nodes to shut down.

What happens when all three nodes are powered on?

A. The three nodes form a cluster.

B. Veritas Cluster Server will need manual intervention to come online.

C. LLT will fail because the fourth node is in the llthosts.

D. Veritas Cluster Server will go into ADMIN_WAIT.

Browse 108 Q&As
Questions 17

What is the master administrator user (created during installation) unable to do?

A. Remove a detection server from system configuration without uninstalling the detection server

B. Create a policy author role that has access to just one policy group

C. Create an incident responder role that sees incidents only from Endpoint Discover scans

D. Dave custom reports and then share them with others in the system

Browse 108 Q&As
Questions 18

What is one function of a Network Discover scanner?

A. It scans an organization's network to identify Network Discover targets.

B. It collects content and metadata from a variety of repositories.

C. It sends collected content to the Enforce Server for processing.

D. It specifies the types of repositories that can be scanned.

Browse 108 Q&As
Exam Code: 250-253
Exam Name: Administration of Veritas Cluster Server 6.0 for Unix
Last Update: Apr 23, 2024
Questions: 108 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99