While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.)
A. Inability to handle load on failover
B. Network connectivity
C. Cluster upgrades
D. User security
E. Operational complexity
正解:A,E
質問 2:
Which detection method includes keyword rules?
A. Indexed Document Matching (IDM)
B. Exact Data Matching (EDM)
C. Described Content Matching (DCM)
D. Directory Group Matching (DGM)
正解:C
質問 3:
When a policy is applied for detection, how are exceptions evaluated?
A. Exceptions then response rules
B. Exceptions then detection rules
C. Response rules then exceptions
D. Detection rules then exceptions
正解:B
質問 4:
Which command allows the administrator to leave services currently under Veritas Cluster Server control in a running state while performing configuration changes?
A. hastop -all -force
B. haconf -all -force
C. haconf -all -evacuate
D. hastop -all -evacuate
正解:A
質問 5:
What should an administrator do when the License Key expires?
A. Edit the key in the Protect.properties file
B. Edit the key in the VontuManager.conf file
C. Enter a new key on the Advanced Settings page
D. Enter a new key on the System Settings page
正解:D
質問 6:
Which two characteristics must be present when preparing an application to be configured for high availability using Veritas Cluster Server? (Select two.)
A. Well-defined start and stop procedures
B. Refresh capability after sudden failures
C. Data stored on internal disks
D. Ability to run on multiple independent servers
E. Remote monitoring capability
正解:A,D
白鸟** -
問題集にある問題がたくさん出てきました。Pass4Testの問題集は信頼できます。250-253に合格しました。ありがとうございます。