Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.
Thinking specifically about data disks, which two cluster configuration requirements must be met to implement this? (Select two.)
A. The application using the disks must be managed by a VCS Application resource type.
B. The disks must be in a Veritas Volume Manager disk group.
C. The service group containing the disks must include an IP resource.
D. The disks must be managed by a VCS DiskGroup resource type.
E. The disks must contain at least one *.dbf file.
An administrator is planning to migrate a locally hosted application to high availability. Data migration on the shared storage has been properly completed.
Which two actions must the administrator perform for the storage in order to complete the configuration of the application service? (Select two.)
A. configure the operating system to automatically mount the file systems involved
B. configure the MountPoint, BlockDevice, FSType, and FsckOpt attributes for all the file systems involved
C. link the application resource to the file system resources, with appropriate dependencies
D. unconfigure the operating system to automatically mount the file systems involved
E. set up the appropriate file system contention mechanism in the correct sequence
Refer to the exhibit.
A two-node cluster has three failover service groups as shown in the exhibit. The websg and appsg service groups are online on sym1 the dbsg service group is online on sym2. All resources are enabled and critical.
Which action does Veritas Cluster Server take when a resource in the appsg service group faults?
A. The appsg service group enters a faulted state, and the websg service group remains online.
B. The appsg service group enters a faulted state on sym1, and the dbsg service group is taken offline.
C. The appsg service group enters a faulted state on sym1 and fails over to sym2.
D. The appsg service group enters a faulted state on sym1, and the websg service group is taken offline.
Which type of installation requires the most additional memory on the Enforce Server machine to host multiple server instances?
A. Three-tier
B. Two-tier
C. Single-tier
D. Stand-alone
The websg service group is online on node sym1. The dbsg service group is online on node sym2. No fencing is configured. One of the two heartbeat links has been down for 30 minutes. The cable is unplugged from the last working heartbeat link.
What will happen to the dbsg service group?
A. It will also start on sym1.
B. It will migrate to sym1.
C. It will go to a FAULTED state.
D. It will remain on sym2.
Which report helps a compliance officer understand how the company is complying with its data security policies over time?
A. Policy Trend report, summarized by policy, then quarter
B. Policy Trend report, summarized by policy, then severity
C. Policy report, filtered on quarter, and summarized by policy
D. Policy report, filtered on date, and summarized by policy
Which incidents appear in the Network Incident List when the Network Prevent Action filter is set to "Modified"?
A. incidents in which confidential content was removed from an SMTP email
B. incidents in which an SMTP email was changed to include a specified header
C. incidents in which confidential content was removed from a Web mail
D. incidents in which confidential content resulted in a blocked Web mail
What are three valid reasons for adding comments to incidents? (Select three.)
A. To provide detail to the next responder when escalating an incident
B. To allow the next responder to more quickly prioritize incidents for review
C. To allow the next responder to more quickly understand the incident history
D. To provide detail when closing an incident
E. To provide detail for report filtering
An administrator is manually adding a node named sym3 to an existing two-node cluster.
What must be done after installing Veritas Cluster Server and configuring cluster communications on the new node?
A. Run hastart -add sym3 on any node
B. Run hasys -force sym3 on the new node
C. Run haclus -addnode sym3 on the new node
D. Run hastart on the new node
What is the impact to unsaved configuration changes in Veritas Cluster Server when an administrator stops the cluster with a force option from the command-line interface?
A. Changes are prompted to be saved.
B. Changes are prompted to be discarded.
C. Changes are automatically saved.
D. Changes are automatically discarded.