What is the default level of authorization of a new VCS user?
A. Cluster Administrator
B. Cluster Operator
C. Cluster Guest
D. Group Administrator
E. Group Operator
Which procedure must be followed to remove the resource type TypeA from an active VCS cluster?
A. Remove all resources of TypeA, remove TypeA, and remove TypeA packages
B. Remove TypeA, then execute the hatype esync command
C. Stop VCS, remove all resources of TypeA, and start VCS
D. Execute the hatype -remove command which will remove all the resources
You are adding a system to a running cluster. You have successfully performed these steps on the system that you are adding:
1.
Installed, configured, and tested all application resources required
2.
Installed VCS
3.
Configured and started VCS communications (LLT and GAB)
What is the next step that you perform?
A. Update the resource attributes to enable resources to run on the new system
B. Update the service group attributes to enable groups to run on the new system
C. Change the cluster attribute for VCS user names to match accounts on the new system
D. Change the owner of the system attributes so that all cluster systems are the same
Which conditions are recommended for a successful VCS patch installation? (Choose two.)
A. The clustered application must be shut down.
B. VCS must be shut down only on the server being patched.
C. VCS must be shut down on all cluster nodes.
D. GAB and LLT must be shut down on all cluster nodes.
E. GAB and LLT must remain running and connected.
Which directive in the llttab file defines a network interface for a heartbeat?
A. Nic
B. Link
C. Heartbeat
D. Hbdev
Which components are installed when you execute the installvcs script? (Choose two.)
A. Bundled agents
B. Database agents
C. Cluster file system
D. Gab driver
E. Cluster volume manager
VCS is to be installed in a secure environment where remote installation between systems is impossible. The VCS configuration parameters were captured in a file using the installation script on the first system. What can be used to read the contents of the configuration file when executing locally on the remaining systems?
A. -autoconfig
B. -configfile
C. -vcsconfig
D. -responsefile
Which text files are created at the end of a successful run of installvcs -installonly? (Choose three.)
A. Log
B. Response
C. Gabtab
D. Llttab
E. Summary
Which statement is true about the violation trigger?
A. A violation trigger must be written as a shell script.
B. A violation trigger and notification are mutually exclusive.
C. A violation trigger is dependent on notification to work.
D. A violation trigger is automatically executed when events occur.
During a test of a NIC resource the VCS engine log indicates that the service group and the IP resource enter the FAULTED state on all systems in the cluster. The NIC resource enters the ONLINE state after the root cause of the fault is corrected. Which default attribute setting allows the service group to attempt to start without manual intervention?
A. AutoStart
B. AutoClear
C. AutoRestart
D. AutoFailover
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-251 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.