Вы находитесь на странице: 1из 6

Administration of Veritas Cluster Server 6.

0 for UNIX
Sample Exam
Contents
SAMPLE QUESTIONS .............................................................................................................................................. 1
ANSWERS ............................................................................................................................................................... 6

Sample Questions
1. Which two text files record a successful run of installvcs -installonly? (Select two.)
a.
b.
c.
d.
e.

installation log
engine log
configuration file
response file
trace log

2. Which two communication configuration files need to be modified on the existing nodes if a new node is
added to the cluster? (Select two.)
a.
b.
c.
d.
e.

/etc/gabtab
/etc/llttab
/etc/gabhosts
/etc/llthosts
/etc/hosts

3. A parallel service group named websg is online on sym1, sym2, and sym3 in a three-node cluster. The
service group contains a critical NIC resource and a non-critical Phantom resource.
If the network device specified in the NIC attribute fails on sym1, what is the resulting state for the websg
service group?
a.
b.
c.
d.

faulted on sym1, online on sym2 and sym3


faulted on sym1, sym2, and sym3
offline on sym1, online on sym2 and sym3
partially online on sym1, online on sym2 and sym3

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

4. Which two should be considered when manually taking a service group offline with service group
dependencies? (Select two.)
a. For all soft dependencies, the child group can go offline regardless of the state of the parent group.
b. With firm dependencies, if the parent group is online, the child group offline is rejected.
c. For the online local hard dependency, if the parent group is online, the child group online is
rejected.
d. The parent group offline is rejected only when the child group is online.
e. For hard dependencies, if the parent group goes offline, the child is taken offline automatically.

5. A parent service group has up to ten child service groups that require a single-level service group
dependency.
Given the above scenario, what is the maximum number of dependencies that can be configured for the
parent service group?
a.
b.
c.
d.

3
5
10
11

6. What are two valid methods of notification from within Veritas Cluster Server? (Select two.)
a.
b.
c.
d.
e.

NACP
SMTP
SNMP
NNTP
PPTP

7. Which host component characteristic is unsupported for a Veritas Cluster Server node?
a.
b.
c.
d.

a single host bus adapter


a single Ethernet interface
a single local disk
a single CPU

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Page: 2

8. At which two attribute levels can the TriggerPath attribute be set? (Select two.)
a.
b.
c.
d.
e.

cluster attribute
system attribute
service group attribute
resource attribute
resource type attribute

9. Which command should an administrator run to implement fencing within a running cluster?
a.
b.
c.
d.

/opt/VRTSvxfen/install -fencing
/opt/VRTS/install/installvcs -fencing
/opt/VRTS/install/installfencing
/opt/VRTSvxfen/installfencing

10. What are two considerations when running a virtual fire drill on a failover service group? (Select two.)
a.
b.
c.
d.
e.

The service group must be offline across the cluster.


The service group must be online in the cluster.
It checks all types of infrastructure components.
It can check some types of infrastructure components.
All resources have defined actions for virtual fire drills.

11. What is the purpose of the Quorum resource type in a fencing environment?
a.
b.
c.
d.

It monitors the database of Coordination Point (CP) clients on the CP Server.


It monitors the coordinator disk groups to see if all disks are online.
It provides high availability for network connectivity on the CP Server.
It can be used to implement third-party fencing solutions in Veritas clusters.

12. Which system attribute should be maintained in order to implement capacity and load management in a
Veritas cluster where the system load is determined externally to Veritas Cluster Server?
a.
b.
c.
d.

Load
DynamicLoad
Capacity
AvailableCapacity

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Page: 3

13. What occurs when an administrator runs the command hastop -all -force?
a.
b.
c.
d.

LLT and GAB are brought offline on each cluster node.


Applications are brought offline, and the cluster stops.
HAD and hashadow processes are stopped on each cluster node.
All applications are forcibly brought offline, but the cluster remains online.

14. What is the default service group type when creating a new service group to bring an application under
Veritas Cluster Server control?
a.
b.
c.
d.

Failover
Hybrid
Load Balancing
Parallel

15. An application identified for clustering by the system administrator is hard-coded so that it must be installed
in /usr/local/app.
What are two considerations for clustering the application? (Select two.)
a. The application could be clustered by mounting a file system from the shared storage on
/usr/local/app.
b. The application is an inappropriate candidate to be clustered without creating a link to
/opt/VRTSvcs.
c. The application could be clustered by creating a new directory under the root directory.
d. The application is an inappropriate candidate to be clustered without rewriting the source code.
e. The application could be clustered by creating a soft link from /usr/local/app to a shared file
system.

16. Which process must be running on the installation server to use the webinstaller for Veritas Cluster Server
via a web browser?
a.
b.
c.
d.

xprtld
xprtlwid
vxsvcd
vxwebsvcd

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Page: 4

17. Which file has coordinator disk group information while configuring I/O fencing?
a.
b.
c.
d.

vxfentab
vxfendg
vxfenmode
vxfencoorddg

18. Which two agents are classified as testing agents according to the Veritas Cluster Server Bundled Agents
Reference Guide? (Select two.)
a.
b.
c.
d.
e.

ElifNone
FileNone
Phantom
Volume
Proxy

19. An administrator is verifying the prerequisites of an application to ensure it can be placed under Veritas
Cluster Server (VCS) control.
Which two prerequisites must be met to accomplish this goal? (Select two.)
a.
b.
c.
d.
e.

The operating system automatically starts the application.


The application is available to all nodes.
The shutdown process should be graceful performing cleanup operations.
The hardware administrative IP addresses are configured by VCS on all nodes.
The shared storage is managed by Veritas Volume Manager.

20. In the event that all heartbeats are lost on all interfaces, what should be implemented to reduce the
likelihood of a split brain condition?
a.
b.
c.
d.

configure AutoRestart for LLT


configure and enable postonline_ipc trigger
enable SCSI 2 disk reservation
configure membership arbitration

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Page: 5

Answers
1-a&d, 2-a&d, 3-a, 4-a&b, 5-c, 6-b&c, 7-b, 8-c&d, 9-b, 10-b&d, 11-c, 12-b, 13-c, 14-a, 15-a&e, 16-b, 17-b,
18-a&b, 19-b&c, 20-d

VCS-253: Administration of Veritas Cluster Server 6.0 for UNIX

October 2015

2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Page: 6

Вам также может понравиться