On which system can you set UseMpathd=1 in a MultiNICB resource?
A. Solaris
B. Linux
C. AIX
D. HP-UX
What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?
A. Prevention of concurrency violations
B. Monitoring of resources running on remote clusters
C. Immediate notification of resource state change
D. Monitoring of resources without need of configuration
Which resource type creates a dependency between applications that are configured in different Veritas Cluster Server clusters?
A. Proxy
B. RemoteGroup
C. Phantom
D. Application
On a cluster, what does the following command display?
Hares -display -ovalues
A. all online resource attributes
B. all overridden resource attributes
C. all uncommitted resource attributes
D. all default resource attributes
Which two actions can be taken to determine whether an application clustered with Veritas Cluster Server (VCS) has been successfully started or stopped? (Select two.)
A. Examine the online log file
B. Examine the engine log file
C. View the Security Log from the VCS Java GUI
D. View the Log Desk from the VCS Java GUI
E. View the Application_A.log file
What are two resource types that Proxy resources can reference? (Select two.)
A. NIC
B. IP
C. Quorum
D. DNS
E. ElifNone
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?
A. The MonitorProgram attribute must be configured for the Application resource type.
B. The MonitorProcesses attribute must be configured for the Application resource type.
C. The Mode value for the IMF attribute of the Application type resource is set to 1.
D. The ProPCV attribute is prevented from being changed when the service group is active.
The log files used to verify that a custom application is being properly monitored are located in which directory?
A. /var/VRTSvcs/log/
B. /opt/VRTSvcs/log/
C. /var/VRTSvcs/agent/log/
D. /opt/VRTSvcs/agent/log/
Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?
A. Exact Data Matching (EDM)
B. Directory Group Matching (DGM)
C. Indexed Document Matching (IDM)
D. Described Content Matching (DCM)
Which data locations should an organization scan first?
A. Private individual directories
B. Centralized repositories
C. Password protected shares
D. Regionalized repositories
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.