Veritas Administration of InfoScale Availability 7.1 for UNIX/Linux VCS-256 Exam Questions in PDF

Free Veritas VCS-256 Dumps Questions (page: 1)

What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?

  1. monitoring of cluster-to-cluster heartbeat
  2. monitoring of Virtual machines
  3. immediate notification of resource state change
  4. monitoring application outside cluster configuration

Answer(s): C



As part of the consolidation efforts in a data center, the administrator decides to merge two two- node Veritas Cluster Server (VCS) clusters into a four-node VCS cluster. The source and target clusters are on the same networks for LLT communication. The administrator performs the following tasks as preparation for the merge while both clusters are still running:
modifies /etc/llttab files on the source cluster systems so the cluster ID is changed to the cluster ID of the target cluster modifies /etc/llthosts files on all systems to include the four nodes modifies /etc/gabtab files on all systems to require the four systems to seed ensures the source cluster systems can see the fencing disks used by the target cluster copies the fencing configuration files from the target cluster systems to the source cluster systems adds the source cluster systems to the target cluster configuration using the hasys ­add command After the preparation is complete, the administrator stops the source cluster leaving the applications running, then stops the whole communication stack and restarts it in the correct order.
When the administrator attempts to start the cluster again on the source cluster systems, they fail to join the four-node cluster.
Which preparation step that the administrator failed to perform is preventing the source cluster systems from joining the four-node cluster?

  1. The cluster needs to be manually seeded using gabconfig -x on the source cluster systems.
  2. The target main.cf file needs to be copied to the source cluster systems.
  3. The service group configuration of the source cluster needs to be applied to the target cluster.
  4. The cluster UUID from the target cluster needs to be copied to the source cluster.

Answer(s): D



An administrator needs to set up a three-node cluster with the following characteristics:
The cluster manages an application that depends on a database. The application and database can be online on the same or a different node. If the database faults, the application must continue to be online.
Which type of service group dependency should be created to ensure this behavior?

  1. online global soft, where the application is the parent
  2. online global soft, where the database is the parent
  3. online global firm, where the application is the parent
  4. online global firm, where the database is the parent

Answer(s): A



An administrator wants to make a single instance Oracle database highly available and take advantage of Veritas Cluster File System.
Which solution should the administrator deploy?

  1. InfoScale Enterprise
  2. InfoScale Availability
  3. InfoScale Storage
  4. InfoScale Foundation and InfoScale Availability

Answer(s): C



The administrator of a four-node Veritas cluster has configured notifications as highly available for all notification methods. How many notification manager resources are running when all nodes are considered?

  1. only one
  2. one for each ServiceGroup
  3. one for each node
  4. two resources (one for SMTP, one for SNMP)

Answer(s): A



Which two standard Veritas Cluster Server resource types can determine if an application is taken offline unexpectedly outside the cluster's control? (Select two.)

  1. Process
  2. FileOnOnly
  3. CoordPoint
  4. Application
  5. Phantom

Answer(s): A,E



Which log can an administrator review to determine why a resource failed to come online?

  1. /etc/VRTSvcs/conf/config/main_log
  2. /var/VRTSvcs/log/messages_A.log
  3. /var/VRTSvcs/log/resources_A.log
  4. /var/VRTSvcs/log/engine_A.log

Answer(s): D



An administrator wants to configure a custom event trigger to be invoked when the online script fails to execute and ManageFaults = NONE. Which trigger should the administrator configure?

  1. resstatechange
  2. resfault
  3. postonline
  4. resadminwait

Answer(s): A



Viewing page 1 of 12

Share your comments for Veritas VCS-256 exam with other users:

B
Bhagiii
11/4/2023 7:04:00 AM

well explained.

R
Rahul
8/8/2023 9:40:00 PM

i need the pdf, please.

C
CW
7/11/2023 2:51:00 PM

a good source for exam preparation

A
Anchal
10/23/2023 4:01:00 PM

nice questions

J
J Nunes
9/29/2023 8:19:00 AM

i need ielts general training audio guide questions

A
Ananya
9/14/2023 5:16:00 AM

please make this content available

S
Swathi
6/4/2023 2:18:00 PM

content is good

L
Leo
7/29/2023 8:45:00 AM

latest dumps please

L
Laolu
2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.

Z
Zaynik
9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer

M
Massam
6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump

A
Anonymous
12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.

J
Japles
5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.

F
Faritha
8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures

A
Anonymous
9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i

P
p das
12/7/2023 11:41:00 PM

very good questions

A
Anna
1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?

B
Bhavya
9/13/2023 10:15:00 AM

very usefull

R
Rahul Kumar
8/31/2023 12:30:00 PM

need certification.

D
Diran Ole
9/17/2023 5:15:00 PM

great exam prep

V
Venkata Subbarao Bandaru
6/24/2023 8:45:00 AM

i require dump

D
D
7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,

A
Ann
9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks

S
Sridhar
1/16/2024 9:19:00 PM

good questions

S
Summer
10/4/2023 9:57:00 PM

looking forward to the real exam

V
vv
12/2/2023 2:45:00 PM

good ones for exam preparation

D
Danny Zas
9/15/2023 4:45:00 AM

this is a good experience

S
SM 1211
10/12/2023 10:06:00 PM

hi everyone

A
A
10/2/2023 6:08:00 PM

waiting for the dump. please upload.

A
Anonymous
7/16/2023 11:05:00 AM

upload cks exam questions

J
Johan
12/13/2023 8:16:00 AM

awesome training material

P
PC
7/28/2023 3:49:00 PM

where is dump

Y
YoloStar Yoloing
10/22/2023 9:58:00 PM

q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.

Z
Zelalem Nega
5/14/2023 12:45:00 PM

please i need if possible h12-831,

AI Tutor 👋 I’m here to help!