1.
What is a consideration for properly clustering NFS under Veritas Cluster Server (VCS) control?
2.
Which agent entry point is used when running a virtual fire drill for a specific resource?
3.
How should a policy manager write policies that adhere to compliance regulations effectively and easily?
4.
Refer to the following information:
OnlineTimeoutInterval = 60
OnlineRetryLimit = 2
MonitorInterval = 120
RestartLimit = 0
What will occur if an application takes 70 seconds to come online during the online process?
5.
Which type of rule do incident responders use to remediate an incident?
6.
In addition to creating an automated response rule, which action must a policy manager take for the rule to execute?
7.
The application administrator has brought the application offline through Veritas Cluster Server using the hares -offline command. If the cluster administrator switches the application service group to another node in the cluster, what is the state of the application after the service group switches nodes?
8.
A newly created failover service group configured with resources remains offline when the cluster is started. Which attribute should an administrator investigate to determine why the service group remains offline?
9.
By default, which port does the Enforce Server use to connect to all detection servers?
10.
When should blocking of network transmissions and quarantining of exposed confidential files begin?