SCS Symantec Cluster Server for UNIX Symantec

Symantec 250-254 Practice Test, Most Hottest Symantec 250-254 Exam Questions Vce On Store

Free sharing of new updated Symantec 250-254  exam practice test. If you are looking to get certified in short possible time, better try Flydumps latest new version Symantec 250-254  with all new questions and answers added,visit Flydumps.com to free Symantec 250-254  download vce and pdf files.

QUESTION 1
Refer to the exhibit.

The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage devices via dual-hosted SCSI cables.
Why is this an inefficient configuration?
A. Storage should be shared by more than two nodes.
B. Clusters should have at most two nodes.
C. NAS is preferred over SAN for shared storage.
D. NFS is the preferred way to share storage within a cluster.

Correct Answer: A QUESTION 2
An administrator is verifying the prerequisites of an application to ensure it can be placed under Symantec Cluster Server control.
Which two prerequisites must be met to accomplish this goal? (Select two.)
A. The operating system automatically starts the application.
B. The application is available to all nodes.
C. The shutdown process should be graceful performing cleanup operations.
D. The hardware administrative IP addresses are configured by Cluster Server on all nodes.
E. The shared storage is managed by Symantec Volume Manager.

Correct Answer: BC QUESTION 3
While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)
A. User security
B. Inability to handle load on failover
C. Cluster upgrades
D. Operational complexity
E. Network connectivity

Correct Answer: BD QUESTION 4
What are two operating systems supported by Veritas Cluster Server? (Select two.)
A. Fedora
B. Red Hat Enterprise Server
C. openSuSe
D. Mac OS
E. AIX

Correct Answer: BE
QUESTION 5
What is a characteristic of the web-based installer?
A. It can be automated with a response file.
B. It can be run using Internet Explorer, Firefox, or Safari.
C. It can install on multiple operating systems at the same time.
D. It runs the same commands as the command line installer.

Correct Answer: D
QUESTION 6
What is a feature of keyless licensing?
A. It works on all versions of Veritas Cluster Server.
B. It requires an accessible Veritas Operations Manager (VOM) server.
C. It requires that at least one key be installed on each cluster host.
D. It must be enabled before installation of Veritas Cluster Server.

Correct Answer: B
QUESTION 7
Symantec Operation Readiness Tools (SORT) provides which service?
A. It automates installation of product updates.
B. It manages notifications for changes in patches.
C. It stores operating system patches required for upgrade.
D. It maintains common config files required for Disaster Recovery.
Correct Answer: B
QUESTION 8
When run in a two node cluster, what does the lltstat -nvv command show?
A. only LLT information for the node the command was run on
B. LLT information for all configured nodes in the cluster
C. LLT information for any cluster nodes attached to the same switch
D. only LLT information for nodes verified by Veritas Cluster Server to be active
Correct Answer: B
QUESTION 9
Which roles configuration tab is used to set the custom attributes that a certain role can view or edit?
A. General tab
B. Incident Access tab
C. Policy Management tab
D. Users tab

Correct Answer: A
QUESTION 10
Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?
A. LLT
B. IMF
C. GAB
D. HAD

Correct Answer: D
QUESTION 11
At which two attribute levels can the TriggerPath attribute be set? (Select two.)
A. cluster attribute
B. system attribute
C. service group attribute
D. resource attribute
E. resource type attribute

Correct Answer: CD
QUESTION 12
What is required in order to have two separate Veritas clusters share a common private heartbeat network switch?
A. GAB network IDs must be unique across the clusters.
B. All node IDs must be unique across the clusters.
C. Cluster IDs must be unique across the clusters.
D. All LLT node IDs must be unique across the clusters.

Correct Answer: C
QUESTION 13
Which two are characteristics of a Veritas Cluster Server resource? (Select two.)
A. Corresponds to a hardware or software component
B. Allows cyclical dependencies without a clear starting point
C. Allows only persistent resources to be a parent
D. Has a unique name throughout the cluster
E. Has a single entry point that the agent uses to control the resource
Correct Answer: AD
QUESTION 14
What information must be specified when adding a resource to a service group?
A. Cluster identifier
B. System name
C. Attribute values
D. Service group name
Correct Answer: D QUESTION 15
What are two requirements for configuring disk-based I/O fencing on supported storage arrays? (Select two.)
A. Cluster File System Option enabled
B. Arrays with SCSI3-PR enabled
C. A minimum of two private heartbeat connections
D. LUNs visible within the vxdisk list output
E. LUNs validated with the hacf -verify command

Correct Answer: BD QUESTION 16
Veritas Cluster Server (VCS) includes a disk-based I/O fencing mechanism.
Thinking specifically about data disks, which two cluster configuration requirements must be met to implement this? (Select two.)
A. The application using the disks must be managed by a VCS Application resource type.
B. The disks must be in a Veritas Volume Manager disk group.
C. The service group containing the disks must include an IP resource.
D. The disks must be managed by a VCS DiskGroup resource type.
E. The disks must contain at least one *.dbf file.

Correct Answer: BD QUESTION 17
An administrator is responsible for a cluster split between two data centers in different locations. The data is mirrored between the two sites.
If the administrator would like to set up I/O fencing, how should the configuration be deployed to maximize resilience?
A. One SCSI-3 coordinator disk at the primary site, one coordinator disk at the secondary site, and a Coordination Point Server at a third site
B. Two SCSI-3 coordinator disks at the primary site and one coordinator disk at the secondary site
C. One SCSI-3 coordinator disk at the primary site and two coordinator disks at the secondary site
D. One Coordination Point Server at the primary site, and one Coordination Point Server at the secondary site, and one Coordination Point Server at a third site

Correct Answer: A QUESTION 18
An employee received the following email notification:
***********************************************
Dear Bob,
Your email to [email protected] with subject Account Info you requested violates the company’s

Customer Data Protection policy.
If this is a legitimate business email, please add the word Encrypt in the subject line of the email. The

communication will then be automatically sent to the recipient in an encrypted form, in accordance with company policy. Please note that this violation has also been reported to your manager. Confidential data protection is
every employee’s responsibility. Thank you, Corporate Information Security Team ***************************************************** Which recommended item is missing from this email notification?
A. A contact person
B. The severity of the violation
C. The affected business unit
D. The name of the file that caused the violation

Correct Answer: A QUESTION 19
Only two local disks suitable for use as coordinator disks are available for a local muti-node cluster.
Adding a Coordination Point (CP) Server with which two properties would maximize the resiliency of the I/ O fencing configuration? (Select two.)
A. One-node CP server cluster with GAB and LLT configured
B. One-node CP server cluster with only LLT configured
C. Second network connection to the CP server cluster
D. Multi-node CP server cluster
E. I/O fencing on the CP server cluster

Correct Answer: CD QUESTION 20
To which file system folder does PacketCapture write reconstructed SMTP messages?
A. drop
B. drop_pcap
C. drop_discover
D. drop_ttd

Correct Answer: B QUESTION 21
What are two valid methods of notification from within Symantec Cluster Server? (Select two.)
A. RDMA
B. SMTP
C. SNMP
D. NTP
E. FTP

Correct Answer: BC QUESTION 22
Which host component characteristic is unsupported for a Symantec Cluster Server node?
A. a single host bus adapter
B. a single Ethernet interface
C. a single local disk

D. a single CPU Correct Answer: B QUESTION 23
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
A. Volume Replicator
B. Storage Replicator
C. NetBackup
D. Replication Exec

Correct Answer: C
QUESTION 24
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
A. It must have the ability to be monitored.
B. It must have the ability to store all required data and configuration information on shared disks.f
C. It must have the ability to store all required data on SATA disks.
D. It must have the ability to copy configuration information between cluster nodes.

Correct Answer: A
QUESTION 25
Which two capabilities must an application have in order to be made highly available using Veritas Cluster Server? (Select two.)
A. The ability to monitor each instance of the application independently
B. The ability to be installed on shared storage
C. The ability to determine if the application is running
D. The ability to notify the administrator of the state
E. The ability to disconnect users from the application

Correct Answer: AC
QUESTION 26
An administrator is configuring another application service in high availability. The application’s logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices.
Which types of resources should the administrator consider to configure in the service group?
A. Application, File System, Volume, Disk Group, IP, NIC
B. Application, Volume, Disk Group, IP, Proxy
C. Application, File System, Volume, Disk Group, IP, Proxy
D. Application, Volume, Disk Group, IP, Phantom

Correct Answer: B
QUESTION 27
Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)
A. Ability to run on multiple independent servers
B. Remote monitoring capability
C. Data stored on internal disks
D. Well-defined start and stop procedures
E. Refresh capability after sudden failures
Correct Answer: AD

CCNA Exam Certification Guide is a best-of-breed Symantec 250-254 exam study guide that has been completely updated to focus specifically on the objectives.Senior instructor and best-selling author Wendell Odom shares preparation hints and Symantec 250-254 tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge.Symantec 250-254 Material is presented in a concise manner,focusing on increasing your understanding and retention of exam topics.

microdess
We are a team that focuses on tutoring Microsoft series certification exams and is committed to providing efficient and practical learning resources and exam preparation support to candidates. As Microsoft series certifications such as Azure, Microsoft 365, Power Platform, Windows, and Graph become more and more popular, we know the importance of these certifications for personal career development and corporate competitiveness. Therefore, we rely on the Pass4itsure platform to actively collect the latest and most comprehensive examination questions to provide candidates with the latest and most accurate preparation materials. MICROSOFT-TECHNET not only provides the latest exam questions, but also allows candidates to find the required learning materials more conveniently and efficiently through detailed organization and classification. Our materials include a large number of mock test questions and detailed analysis to help candidates deeply understand the test content and master the answering skills, so as to easily cope with the test. In addition, we have also specially launched exam preparation materials in PDF format to facilitate candidates to study and review anytime and anywhere. It not only contains detailed analysis of exam questions, but also provides targeted study suggestions and preparation techniques so that candidates can prepare more efficiently. We know that preparing for exams is not just about memorizing knowledge points, but also requires mastering the correct methods and techniques. Therefore, we also provide a series of simulation questions so that candidates can experience the real examination environment in the simulation examination and better adapt to the examination rhythm and atmosphere. These simulation questions can not only help candidates test their preparation results, but also help candidates discover their own shortcomings and further improve their preparation plans. In short, our team always adheres to the needs of candidates as the guide and provides comprehensive, efficient and practical test preparation support to candidates. We believe that with our help, more and more candidates will be able to successfully pass the Microsoft series certification exams and realize their career dreams.