1.
The application administrator has brought the application offline through Veritas Cluster Server using the hares -offline command. If the cluster administrator switches the application service group to another node in the cluster, what is the state of the application after the service group switches nodes?
2.
A newly created failover service group configured with resources remains offline when the cluster is started. Which attribute should an administrator investigate to determine why the service group remains offline?
3.
By default, which port does the Enforce Server use to connect to all detection servers?
4.
When should blocking of network transmissions and quarantining of exposed confidential files begin?
5.
Which resource type can be used to mirror the state of another persistent resource?
6.
Why should Network Monitor be configured to filter out low-threat traffic?
7.
A policy manager wants to apply policies only to certain employees with a specific classification level. Which TrueMatch detection method can help accomplish this?
8.
Refer to the configuration below:
group dbsg (
SystemList = { sym1=0, sym2=1, sym3=2, sym4=3 }
SystemZones = { sym1=0, sym2=0, sym3=1, sym4=1 }
AutoFailOver = 2
)
Which action will Veritas Cluster Server (VCS) take when dbsg faults if it is currently online on sym1?
9.
Which feature is a key benefit of onscreen notification?
10.
Where can an incident responder find the exact location of the file copy created by the Protect: Copy File response action?