What is a characteristic of the Veritas Cluster Server communication stack?
A. The HAD processes propagates information to other nodes by way of agents.
B. Agents communicate resource status information with HAD.
C. LLT determines cluster membership by monitoring heartbeats over GAB.
D. Agents can communicate with each other directly over GAB.
The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack.
In what order should the components be stopped?
A. LLT, GAB, I/O fencing
B. VCS, I/O fencing, GAB, LLT
C. VCS, I/O fencing, LLT, GAB
D. I/O fencing, VCS, GAB, LLT
When configured as default, the Veritas Cluster Server Notifier receives queued messages on a schedule every how many minutes?
A. One
B. Three
C. Five
D. Ten
A system administrator examines the results of a completed scan.
Which information is available on a scan listing on the Discover Targets page? (Select three.)
A. User who initiated the scan
B. Elapsed time and total time for each scan
C. Number of items scanned
D. Number of items changed since the previous scan
E. File structure and location
F. Errors encountered
An additional email address was added to the Veritas Cluster Server notifier resource without any other
actions being taken. All but one user is receiving notifications.
How can this problem be solved?
A. Refresh the mailbox of the impacted user
B. Restart the notifier resource
C. Restart the SNMP daemon
D. Restart the HAD daemon
Which two are valid settings for FailoverPolicy? (Select two.)
A. Priority
B. RoundRobin
C. Order
D. Failover
E. Dynamic
Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?
A. Simulator
B. AgentServer
C. Fencing
D. AgentTester
Under which high-level node in the left navigation panel can administrators find the System Events report?
A. Reports
B. Policy
C. System Health
D. Administration
Which Network Discover option is used to determine whether confidential data exists without having to scan the entire target?
A. Exclude Filtering
B. File Throttling
C. Byte Throttling
D. Inventory Mode Scanning
What should be done before removing a resource named webdg from a running service group?
A. The service group must be taken offline.
B. All parent resources of webdg must be taken offline.
C. All child resources of webdg must be taken offline.
D. The service group must be disabled.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.