How does a volume created by VxVM appear in the operating system?
A. As remotely-hosted disks
B. As simple disks
C. As SAN disks
D. As physical disks
You need to increase the size of an existing volume to 10 gigabytes. You also want to exclude storages on the controller c1 from being allocated. To meet the required goal, you execute the following command, but when executed, the command fails.
vxassist -g mydg1 growto vol1 10g \use_storage='noneof("Controller"="c1")'
What could be the possible cause for the failure?
A. You cannot exclude the c1 controller.
B. The size specified is smaller than the current size of the volume.
C. The growto parameter needs to be replaced by growby parameter.
D. The growto parameter needs to be replaced by maxby parameter.
You are auditing a current storage environment that is utilizing storage tiering. You will use the information gained from the audit in setting up policies for this tiered storage environment. When assigning the policy, you want to take into account applications that run concurrently that compete for I/O resources when data is placed on separate storage devices with separate access paths. Which policy factor should you use for the above scenario?
A. Availability
B. Business considerations
C. Expected access patterns
D. Load Balancing
Which structure records are stored in the private region?(Each correct answer presents part of the solution. Select three.)
A. Disk group configuration
B. Disk and disk group ID
C. File system metadata
D. Disk group kernel log
E. Partition tables
How should an administrator determine which Database version is running?
A. run the command select database version from database;
B. right click on database folder and select version
C. run the command select * from v$version;
D. look in add/remove programs for the database program
Which version of Oracle does Symantec Data Loss Prevention version 12.0 require for new installations or upgrading from 11.x to 12.0?
A. 10.2.0.1
B. 10.2.0.4
C. 11.2.0.2
D. 11.2.0.3
A user is unable to log in as sysadmin. The Data Loss Prevention system is configured to use Active Directory authentication. The user is a member of two roles: sysadmin and remediator.
How should the user log in to the user interface in the sysadmin role?
A. sysadmin\username@domain
B. sysadmin\username
C. domain\username
D. username\sysadmin
A Network Monitor server has been installed and the networking components configured accordingly. The server is receiving traffic, but fails to detect incidents. Running Wireshark indicates that the desired traffic is reaching the detection server.
What is the most likely cause for this behavior?
A. The mirrored port is sending corrupted packets.
B. The wrong interface is selected in the configuration.
C. The configuration is set to process GET requests.
D. The communication to the database server is interrupted.
You want to preserve data on existing slices on the disk and want to put this disk under Volume Manager control without loosing any data. How will you preserve the data?
A. By encapsulating the disk
B. By initializing
C. By saving the data on the disk
D. By exporting data to another disk
You have installed and configured Veritas Volume Manager on a UNIX server. You want to install and configure Veritas Enterprise Administrator (VEA) server to manage the VEA agents that you will be installing on Windows and UNIX client computers. You want to ensure you are able to successfully install VEA server. What should you do?
A. Install VEA server on a remote server that needs to be administered.
B. Install VEA on the server where Veritas Volume Manager is installed.
C. Install a Windows server and install Java Runtime 1.4 and then install VEA.
D. Install VEA server on each Storage Foundation 5.0 server that needs to be administered.