1.
What is the impact to unsaved configuration changes in Veritas Cluster Server when an administrator stops the cluster with a force option from the command-line interface?
2.
The implementation of Veritas Cluster Server with I/O fencing requires which capability of the storage array?
3.
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
4.
Why should the vxfentsthdw utility be used with great care?
5.
The log files used to verify that a custom application is being properly monitored are located in which directory?
6.
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?
7.
An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?
8.
Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?
9.
Which attribute can be configured to allow a service group to come back online after a persistent resource has faulted and other nodes are unavailable?
10.
An administrator wants to change the name of an existing NIC resource from net0nic to net4nic. The resource is configured in the websg service group. What is the most efficient method to rename the NIC resource?