What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?
A. GAB network IDs must be unique across the clusters.
B. All node IDs must be unique across the clusters.
C. Cluster IDs must be unique across the clusters.
D. All LLT node IDs must be unique across the clusters.
Which detection method includes keyword rules?
A. Exact Data Matching (EDM)
B. Directory Group Matching (DGM)
C. Described Content Matching (DCM)
D. Indexed Document Matching (IDM)
Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)
A. Examine the online log file
B. Examine the engine log file
C. View the Security Log from the VCS Java GUI
D. View the Log Desk from the VCS Java GUI
E. View the Application_A.log file
Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?
A. Global
B. Local
C. Custom
D. Proxy
Where can an incident responder view all actions that have occurred for an incident?
A. Incident Snapshot
B. Auditlog Table
C. Incident Actions
D. System Events
The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack.
In what order should the components be stopped?
A. LLT, GAB, I/O fencing
B. VCS, I/O fencing, GAB, LLT
C. VCS, I/O fencing, LLT, GAB
D. I/O fencing, VCS, GAB, LLT
What is an advantage of using a Dashboard report?
A. Incident reponders can execute Smart Responses from them.
B. They allow incidents to be viewed across multiple products.
C. They can be used as work queues for incident responders.
D. Incident responders can see the history of each incident.
What is a likely outcome of filtering network traffic in Network Monitor?
A. monitoring of outbound traffic before inbound traffic
B. monitoring of traffic important to the customer
C. decrease in the detection accuracy
D. increase in Network Monitor demand for RAM
The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured.
Where will Veritas Cluster Server look for the two trigger executables?
A. $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2
B. $VCS_HOME/bin/websg/postoffline/T1action1 $VCS_HOME/bin/websg/postoffline/T2action2
C. $VCS_HOME/bin/triggers/websg/T1action1 $VCS_HOME/bin/triggers/websg/T1action2
D. $VCS_HOME/bin/postoffline/T1action1 $VCS_HOME/bin/postoffline/T2action2
When resolving or dismissing incidents, Symantec recommends that an incident responder completes which action?
A. Add comments
B. Delete incidents
C. Set severity
D. Export incidents
How should a policy manager write policies that adhere to compliance regulations effectively and easily?
A. By copying an existing policy and editing as necessary
B. By creating a new blank policy and adding fitting rules
C. By using a policy template and editing as necessary
D. By using a compliance data identifier in the policy
Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?
A. in the Incident Snapshot
B. in the Marker File
C. in the System Event
D. in the Discover Target configuration
In a four-node cluster configuration, main.cf is modified to remove one of the four nodes. That node is decommissioned, and the remaining cluster configuration is unchanged. A power failure causes all three remaining nodes to shut down.
What happens when all three nodes are powered on?
A. The three nodes form a cluster.
B. Veritas Cluster Server will need manual intervention to come online.
C. LLT will fail because the fourth node is in the llthosts.
D. Veritas Cluster Server will go into ADMIN_WAIT.
What is the master administrator user (created during installation) unable to do?
A. Remove a detection server from system configuration without uninstalling the detection server
B. Create a policy author role that has access to just one policy group
C. Create an incident responder role that sees incidents only from Endpoint Discover scans
D. Dave custom reports and then share them with others in the system
What is one function of a Network Discover scanner?
A. It scans an organization's network to identify Network Discover targets.
B. It collects content and metadata from a variety of repositories.
C. It sends collected content to the Enforce Server for processing.
D. It specifies the types of repositories that can be scanned.