1.
Scanners configured for IM filtering act as a security proxy for which type of traffic?
2.
Which command should an administrator use to discover only new devices on a system?
3.
Which command is used to restart the Veritas Volume Manager (VxVM) configuration daemon with the highest level of debugging?
4.
Dynamic Multi-Pathing (DMP) uses the I/O policy for distributing I/O load across multiple paths to a disk array or enclosure. What is the default I/O policy for all arrays?
5.
What is the default Dynamic Multi-Pathing (DMP) path restoration policy?
6.
Which command will print information for Dynamic Multi-pathing nodes on a system?
7.
What is an advantage of the Veritas Storage Foundation 6.1 for UNIX checkpoint visibility feature?
8.
A Storage Checkpoint is created with the command:
fsckptadm -R create thu_8pm /data1
Which statement about this checkpoint is correct if the file system runs out of space?
9.
A user creates a 10 MB file, which is then compressed using vxcompress to reduce the file size to 1MB. Another user copies this file to a different Veritas File System (VxFS) on the same host using cp. What is the resulting file size of the copy?
10.
When running vxfilesnap or deduplication on an already compressed file, what will happen to the compressed extents?