Академический Документы
Профессиональный Документы
Культура Документы
0 for UNIX
Sample Exam
Contents
SAMPLE QUESTIONS .............................................................................................................................................. 1
ANSWERS ............................................................................................................................................................... 6
Sample Questions
1. Which two text files record a successful run of installvcs -installonly? (Select two.)
a.
b.
c.
d.
e.
installation log
engine log
configuration file
response file
trace log
2. Which two communication configuration files need to be modified on the existing nodes if a new node is
added to the cluster? (Select two.)
a.
b.
c.
d.
e.
/etc/gabtab
/etc/llttab
/etc/gabhosts
/etc/llthosts
/etc/hosts
3. A parallel service group named websg is online on sym1, sym2, and sym3 in a three-node cluster. The
service group contains a critical NIC resource and a non-critical Phantom resource.
If the network device specified in the NIC attribute fails on sym1, what is the resulting state for the websg
service group?
a.
b.
c.
d.
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
4. Which two should be considered when manually taking a service group offline with service group
dependencies? (Select two.)
a. For all soft dependencies, the child group can go offline regardless of the state of the parent group.
b. With firm dependencies, if the parent group is online, the child group offline is rejected.
c. For the online local hard dependency, if the parent group is online, the child group online is
rejected.
d. The parent group offline is rejected only when the child group is online.
e. For hard dependencies, if the parent group goes offline, the child is taken offline automatically.
5. A parent service group has up to ten child service groups that require a single-level service group
dependency.
Given the above scenario, what is the maximum number of dependencies that can be configured for the
parent service group?
a.
b.
c.
d.
3
5
10
11
6. What are two valid methods of notification from within Veritas Cluster Server? (Select two.)
a.
b.
c.
d.
e.
NACP
SMTP
SNMP
NNTP
PPTP
7. Which host component characteristic is unsupported for a Veritas Cluster Server node?
a.
b.
c.
d.
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Page: 2
8. At which two attribute levels can the TriggerPath attribute be set? (Select two.)
a.
b.
c.
d.
e.
cluster attribute
system attribute
service group attribute
resource attribute
resource type attribute
9. Which command should an administrator run to implement fencing within a running cluster?
a.
b.
c.
d.
/opt/VRTSvxfen/install -fencing
/opt/VRTS/install/installvcs -fencing
/opt/VRTS/install/installfencing
/opt/VRTSvxfen/installfencing
10. What are two considerations when running a virtual fire drill on a failover service group? (Select two.)
a.
b.
c.
d.
e.
11. What is the purpose of the Quorum resource type in a fencing environment?
a.
b.
c.
d.
12. Which system attribute should be maintained in order to implement capacity and load management in a
Veritas cluster where the system load is determined externally to Veritas Cluster Server?
a.
b.
c.
d.
Load
DynamicLoad
Capacity
AvailableCapacity
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Page: 3
13. What occurs when an administrator runs the command hastop -all -force?
a.
b.
c.
d.
14. What is the default service group type when creating a new service group to bring an application under
Veritas Cluster Server control?
a.
b.
c.
d.
Failover
Hybrid
Load Balancing
Parallel
15. An application identified for clustering by the system administrator is hard-coded so that it must be installed
in /usr/local/app.
What are two considerations for clustering the application? (Select two.)
a. The application could be clustered by mounting a file system from the shared storage on
/usr/local/app.
b. The application is an inappropriate candidate to be clustered without creating a link to
/opt/VRTSvcs.
c. The application could be clustered by creating a new directory under the root directory.
d. The application is an inappropriate candidate to be clustered without rewriting the source code.
e. The application could be clustered by creating a soft link from /usr/local/app to a shared file
system.
16. Which process must be running on the installation server to use the webinstaller for Veritas Cluster Server
via a web browser?
a.
b.
c.
d.
xprtld
xprtlwid
vxsvcd
vxwebsvcd
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Page: 4
17. Which file has coordinator disk group information while configuring I/O fencing?
a.
b.
c.
d.
vxfentab
vxfendg
vxfenmode
vxfencoorddg
18. Which two agents are classified as testing agents according to the Veritas Cluster Server Bundled Agents
Reference Guide? (Select two.)
a.
b.
c.
d.
e.
ElifNone
FileNone
Phantom
Volume
Proxy
19. An administrator is verifying the prerequisites of an application to ensure it can be placed under Veritas
Cluster Server (VCS) control.
Which two prerequisites must be met to accomplish this goal? (Select two.)
a.
b.
c.
d.
e.
20. In the event that all heartbeats are lost on all interfaces, what should be implemented to reduce the
likelihood of a split brain condition?
a.
b.
c.
d.
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Page: 5
Answers
1-a&d, 2-a&d, 3-a, 4-a&b, 5-c, 6-b&c, 7-b, 8-c&d, 9-b, 10-b&d, 11-c, 12-b, 13-c, 14-a, 15-a&e, 16-b, 17-b,
18-a&b, 19-b&c, 20-d
October 2015
2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered trademarks of
Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Page: 6