최신 250-253 무료덤프 - Symantec Administration of Veritas Cluster Server 6.0 for Unix

The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured.
Where will Veritas Cluster Server look for the two trigger executables?

정답: B
What is the default incident data retention behavior for Network Monitor and Network Prevent?

정답: A
Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?

정답: B
Which method encrypts the Oracle password on the Enforce Server?

정답: B
During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)

정답: B,D
Which three are examples of confidential data? (Select three.)

정답: A,C,D
Only the TriggerPath service group attribute value for the websg service group is set to "bin/websg" for cluster nodes where the websg service group can be online.
Where will Veritas Cluster Server (VCS) look for the preonline event trigger if the preonline event trigger is also enabled on all cluster systems for the websg service group?

정답: D
What is the main benefit of installing and using the Symantec Management Platform for managing DLP Agents?

정답: A
What is the impact to unsaved configuration changes in Veritas Cluster Server when an administrator stops the cluster with a force option from the command-line interface?

정답: C
Which agent entry point is used when running a virtual fire drill for a specific resource?

정답: A
Symantec Operation Readiness Tools (SORT) provides which service?

정답: D
Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)

정답: B,D
Which three options can incident responders select when deleting incidents? (Select three.)

정답: B,C,E
A system administrator examines the results of a completed scan.
Which information is available on a scan listing on the Discover Targets page? (Select three.)

정답: B,E,F
What is the sequence of message processing for Network Monitor?

정답: C
Which three functions of the communications architecture ensure that the system is able to automatically recover should a network connectivity failure occur between the detection servers and the Enforce Server? (Select three.)

정답: A,C,E
While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)

정답: C,E

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기