Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Veritas VCS-256 - Administration of Veritas InfoScale Availability 7.1 for UNIX/Linux

Page: 2 / 3
Total 84 questions

Match all five Veritas Cluster Server global cluster options on the left to the corresponding definitions on the right.

An administrator adds a new Mount resource using the command line. After running the hastatus-sum command, the administrator notices the state of the resource is RESOURCES NOT PROBED.

Which command should the administrator run to allow the resource to be probed?

A.

hares –refreshinfo Log02_Mount -sys server101

B.

hares –modify Log02_Mount Enabled 1

C.

hares –probe Log02_Mount –sys server101

D.

hares –action Log02_Mount ProbeReTry

An administrator is testing a network interface under Veritas Cluster Server (VCS) control and wants to minimize the time for VCS to detect the fault. How can this be accomplished without affecting any other network interfaces under VCS control?

A.

localize the NIC resource type MonitorInterval attribute and modify it to desired value for that particular resource

B.

enable Intelligent Monitoring Framework for that particular NIC type resource to allow asynchronous monitoring

C.

adjust the NIC resource type MonitorInterval attribute for that particular resource by modifying the value in types.cf

D.

override the NIC resource type MonitorInterval attribute and assign it a desired value for that particular resource

What is the purpose of the AutoClearLimit attribute?

A.

It defines the number of attempts to clear the Faulted state of a resource on all nodes.

B.

It defines the number of attempts to clear the Faulted state of a service group on all nodes.

C.

It defines the number of attempts to clear the AutoDisabled state of a service group on a node.

D.

It defines the number of attempts to clear Faulted state of a resource on a single node.

Which resource type can an administrator use to mirror the state of another persistent resource?

A.

Phantom

B.

Proxy

C.

VolumeSet

D.

RemoteGroup

Which two capabilities can an administrator use to ensure availability within Docker Containers? (Select two.)

A.

provide HA to the application within the container for failover and app restart

B.

provide provisioning of a new container when an application within the container fails

C.

first restart the application within the container and if continued app failures then provision a new container

D.

provide HA to the container and move it between cluster nodes

E.

provide provisioning of a new container when a container fails

A cluster administrator wants to deploy a complex cluster configuration that will include over six nodes, I/O fencing, and multiple private cluster interconnections. The administrator has a week to prepare before the actual cluster nodes become available for software installation.

Which method will help the administrator to implement rapid cluster deployment?

A.

prepare a custom main.cf file using the sample template files

B.

generate a custom installation script using the Veritas Services and Operations Readiness Tools (SORT) website

C.

prepare a custom response file in Veritas InfoScale Operations Manager and push out to the new cluster

D.

prepare a custom response file to build the new cluster configuration

What are two resource types that Proxy resources can reference? (Select two.)

A.

NIC

B.

IP

C.

Mount

D.

DNS

E.

ElifNone

Refer to the exhibit.

The exhibit shows an N-to-1 cluster configuration, in which nodes are connected to storage devices via dual-hosted SCSI cables.

Why is this an inefficient configuration?

A.

Storage should be shared by more than two nodes, obtaining a N+1 cluster configuration.

B.

Clusters should have at most two nodes.

C.

NAS is preferred over SAN for shared storage.

D.

NFS is the preferred way to share storage within a cluster.

An administrator is responsible for a stretched cluster between two data centers in different locations. The data is mirrored between sites. How should the configuration be deployed to maximize resilience if the administrator wants to set up I/O fencing?

A.

three coordinator disks at the primary site and three coordinator disks at the secondary site

B.

two coordinator disks at the primary site and one coordinator disk at the secondary site

C.

one coordinator disk at the primary site, one coordinator disk at the secondary site, and a coordination point server at the third site

D.

three coordinator disks at the primary site must be mirrored to coordinator disks at the secondary site