An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target.
Which failover policy should the administrator implement to achieve this requirement?
A. Priority
B. RoundRobin
C. Quorum
D. Prerequisites
An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)
A. configure the operating system to automatically mount the file systems involved
B. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
C. link the application resource to the file system resources, with appropriate dependencies
D. unconfigure the operating system to automatically mount the file systems involved
E. set up the appropriate file system contention mechanism in the correct sequence
Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)
A. Ability to run on multiple independent servers
B. Remote monitoring capability
C. Data stored on internal disks
D. Well-defined start and stop procedures
E. Refresh capability after sudden failures
During testing, an administrator configures a Network Discover target to identify and quarantine confidential files. The target is set up with a Default credential that has read-only permissions on the file server. After running the scan and checking the results, the administrator finds several incidents from the scan, but observes that all confidential files are still in their original location, and the configured quarantine directory is empty (contains none of the confidential files).
Which two Discover target configuration mistakes might be causing the problem? (Select two.)
A. The sharelist excludes all directories on the host being scanned.
B. The Quarantine/Copy Share credentials are invalid.
C. The Default credentials are invalid.
D. The Copy option is selected.
E. The Protect credential is unspecified.
Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?
A. Network Prevent
B. Network Protect
C. Network Monitor
D. Network Discover
An administrator is configuring another application service in high availability. The application's logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?
A. Application, File System, Volume, Disk Group, IP, NIC
B. Application, Volume, Disk Group, IP, Proxy
C. Application, File System, Volume, Disk Group, IP, Proxy
D. Application, Volume, Disk Group, IP, Phantom
Which two traffic feed sources should be used for Network Monitor? (Select two.)
A. Test Access Port (TAP)
B. trunking port on a hub
C. Switched Port Analyzer (SPAN) port
D. router LAN port
E. tunneled port on a VPN router
How does a system administrator verify that a Network Monitor Server is healthy?
A. By checking Incident Queue and Message Wait Time on the System Overview page
B. By verifying the configuration details of the System Settings page
C. By determining whether system alert message emails are generated or received
D. By reviewing the results of the Environmental Check Utility (ECU)
Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)
A. The ability to monitor each instance of the application independently
B. The ability to be installed on shared storage
C. The ability to determine if the application is running
D. The ability to notify the administrator of the state
E. The ability to disconnect users from the application
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A. It must have the ability to be monitored.
B. It must have the ability to store all required data and configuration information on shared disks.
C. It must have the ability to store all required data on SATA disks.
D. It must have the ability to copy configuration information between cluster nodes.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-253 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.