What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)
A. Cluster File System Option enabled
B. Arrays with SCSI3-PR enabled
C. A minimum of two private heartbeat connections
D. LUNs visible within the vxdisk list output
E. LUNs validated with the hacf -verify command
Which Veritas Cluster Server utility can be used to prototype cluster logic using minimal hardware?
A. Simulator
B. AgentServer
C. Fencing
D. AgentTester
The procedure for making changes to the Veritas Cluster Server (VCS) cluster communications involves stopping the components in the communications stack, modifying the configuration files, and restarting the stack.
In what order should the components be stopped?
A. LLT, GAB, I/O fencing
B. VCS, I/O fencing, GAB, LLT
C. VCS, I/O fencing, LLT, GAB
D. I/O fencing, VCS, GAB, LLT
Which three options can incident responders select when deleting incidents? (Select three.)
A. Delete the incident completely
B. Delete the original message and retain the incident
C. Delete the incident and retain the violating attachments or files
D. Delete the incident and export incident details to .csv file
E. Delete the non-violating attachments or files and retain the incident
Refer to the exhibit.
A two-node cluster has three failover service groups as shown in the exhibit. The websg and appsg service groups are online on sym1 the dbsg service group is online on sym2. All resources are enabled and critical.
Which action does Veritas Cluster Server take when a resource in the appsg service group faults?
A. The appsg service group enters a faulted state, and the websg service group remains online.
B. The appsg service group enters a faulted state on sym1, and the dbsg service group is taken offline.
C. The appsg service group enters a faulted state on sym1 and fails over to sym2.
D. The appsg service group enters a faulted state on sym1, and the websg service group is taken offline.
The postoffline trigger is enabled for the websg service group for all cluster nodes, and the trigger location has been configured for the default location. Two separate trigger action executables named T1action1 and T2action2 are to be configured.
Where will Veritas Cluster Server look for the two trigger executables?
A. $VCS_HOME/bin/triggers/postoffline/T1action1 $VCS_HOME/bin/triggers/postoffline/T2action2
B. $VCS_HOME/bin/websg/postoffline/T1action1 $VCS_HOME/bin/websg/postoffline/T2action2
C. $VCS_HOME/bin/triggers/websg/T1action1 $VCS_HOME/bin/triggers/websg/T1action2
D. $VCS_HOME/bin/postoffline/T1action1 $VCS_HOME/bin/postoffline/T2action2
All users, regardless of their role permissions, are allowed to configure which two reporting options? (Select two.)
A. Ability to delete incidents
B. Ability to set the default report
C. Ability to look up custom attributes
D. Ability to print reports to PDF
E. Ability to select reports to display
Refer to the following information:
OnlineTimeoutInterval = 60 OnlineRetryLimit = 2 MonitorInterval = 120 RestartLimit = 0
What will occur if an application takes 70 seconds to come online during the online process?
A. The application will come online without any issues.
B. The applications monitor will timeout and cause the application to failover.
C. The application will fail to be brought online and will attempt to failover to another cluster node.
D. The application will fail to be brought online and will try again.
In addition to creating an automated response rule, which action must a policy manager take for the rule to execute?
A. Turn on response rules from the Settings page
B. Add the response rule to the appropriate policy
C. Click the Response Rule button to execute
D. Enable Remediate Incidents privilege in the appropriate role
Refer to the exhibit.
How many servers are seeded in the GAB port membership?
A. The GAB port membership has two nodes: 01 and 12.
B. The GAB port membership has three nodes: 0, 1, and 12.
C. The GAB port membership has three nodes: 0, 1, and 21.
D. The GAB port membership has four nodes: 0, 1, 21, and 22.