1.
An administrator is configuring another application service in high availability. The applications logical IP address will rely on the same NIC used by the ClusterService service group. Data will be stored on raw devices. Which types of resources should the administrator consider to configure in the service group?
2.
Which product can replace a confidential document residing on a public share with a Marker File explaining why the document was removed?
3.
An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?
4.
Which data locations should an organization scan first?
5.
Which detection method is used for fingerprinting and protecting unstructured data, such as source code documents or merger and acquisition documents?
6.
The log files used to verify that a custom application is being properly monitored are located in which directory?
7.
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?
8.
How is Intelligent Monitoring Framework configured?
9.
On which system can you set UseMpathd=1 in a MultiNICB resource?
10.
Which resource type attribute enables Veritas Cluster Server to bring a resource online after it goes offline unexpectedly before faulting the resource?