1.
The log files used to verify that a custom application is being properly monitored are located in which directory?
2.
What should be considered before enabling the Preventing Concurrency Violation (ProPCV) attribute in a service group?
3.
An administrator is planning to configure a new application service in a Veritas cluster. In the case of an application failure, the company requires that the node with the fewest running service groups be selected as the failover target. Which failover policy should the administrator implement to achieve this requirement?
4.
Which component is directly responsible for communicating online configuration changes to all nodes in the cluster?
5.
Which attribute can be configured to allow a service group to come back online after a persistent resource has faulted and other nodes are unavailable?
6.
An administrator wants to change the name of an existing NIC resource from net0nic to net4nic. The resource is configured in the websg service group. What is the most efficient method to rename the NIC resource?
7.
Which component do all Veritas Cluster Server agents use to communicate their status?
8.
What is a required characteristic of an application that is to be placed under the control of Veritas Cluster Server?
9.
A Veritas Cluster Server (VCS) administrator has to change NICs used as the heartbeat links due to network reconfiguration. What is the correct order for the cluster and heartbeat protocols to be shut down?
10.
Which characteristic of Veritas Cluster Server attributes allows the public interface to be different for each of the systems in the cluster?