Veritas VCS-256 Exam (page: 1)
Veritas Administration of InfoScale Availability 7.1 for UNIX/Linux
Updated on: 31-Mar-2026

Viewing Page 1 of 12

What is the primary benefit of implementing the Intelligent Monitoring Framework feature for resources?

  1. monitoring of cluster-to-cluster heartbeat
  2. monitoring of Virtual machines
  3. immediate notification of resource state change
  4. monitoring application outside cluster configuration

Answer(s): C



As part of the consolidation efforts in a data center, the administrator decides to merge two two- node Veritas Cluster Server (VCS) clusters into a four-node VCS cluster. The source and target clusters are on the same networks for LLT communication. The administrator performs the following tasks as preparation for the merge while both clusters are still running:
modifies /etc/llttab files on the source cluster systems so the cluster ID is changed to the cluster ID of the target cluster modifies /etc/llthosts files on all systems to include the four nodes modifies /etc/gabtab files on all systems to require the four systems to seed ensures the source cluster systems can see the fencing disks used by the target cluster copies the fencing configuration files from the target cluster systems to the source cluster systems adds the source cluster systems to the target cluster configuration using the hasys ­add command After the preparation is complete, the administrator stops the source cluster leaving the applications running, then stops the whole communication stack and restarts it in the correct order.
When the administrator attempts to start the cluster again on the source cluster systems, they fail to join the four-node cluster.
Which preparation step that the administrator failed to perform is preventing the source cluster systems from joining the four-node cluster?

  1. The cluster needs to be manually seeded using gabconfig -x on the source cluster systems.
  2. The target main.cf file needs to be copied to the source cluster systems.
  3. The service group configuration of the source cluster needs to be applied to the target cluster.
  4. The cluster UUID from the target cluster needs to be copied to the source cluster.

Answer(s): D



An administrator needs to set up a three-node cluster with the following characteristics:
The cluster manages an application that depends on a database. The application and database can be online on the same or a different node. If the database faults, the application must continue to be online.
Which type of service group dependency should be created to ensure this behavior?

  1. online global soft, where the application is the parent
  2. online global soft, where the database is the parent
  3. online global firm, where the application is the parent
  4. online global firm, where the database is the parent

Answer(s): A



An administrator wants to make a single instance Oracle database highly available and take advantage of Veritas Cluster File System.
Which solution should the administrator deploy?

  1. InfoScale Enterprise
  2. InfoScale Availability
  3. InfoScale Storage
  4. InfoScale Foundation and InfoScale Availability

Answer(s): C



The administrator of a four-node Veritas cluster has configured notifications as highly available for all notification methods. How many notification manager resources are running when all nodes are considered?

  1. only one
  2. one for each ServiceGroup
  3. one for each node
  4. two resources (one for SMTP, one for SNMP)

Answer(s): A



Which two standard Veritas Cluster Server resource types can determine if an application is taken offline unexpectedly outside the cluster's control? (Select two.)

  1. Process
  2. FileOnOnly
  3. CoordPoint
  4. Application
  5. Phantom

Answer(s): A,E



Which log can an administrator review to determine why a resource failed to come online?

  1. /etc/VRTSvcs/conf/config/main_log
  2. /var/VRTSvcs/log/messages_A.log
  3. /var/VRTSvcs/log/resources_A.log
  4. /var/VRTSvcs/log/engine_A.log

Answer(s): D



An administrator wants to configure a custom event trigger to be invoked when the online script fails to execute and ManageFaults = NONE. Which trigger should the administrator configure?

  1. resstatechange
  2. resfault
  3. postonline
  4. resadminwait

Answer(s): A



Viewing Page 1 of 12



Share your comments for Veritas VCS-256 exam with other users:

x-men 5/23/2023 1:02:00 AM

q23, its an array, isnt it? starts with [ and end with ]. its an array of objects, not object.
UNITED STATES


abuti 7/21/2023 6:24:00 PM

cool very helpfull
Anonymous


Krishneel 3/17/2023 10:34:00 AM

i just passed. this exam dumps is the same one from prepaway and examcollection. it has all the real test questions.
INDIA


Regor 12/4/2023 2:01:00 PM

is this a valid prince2 practitioner dumps?
UNITED KINGDOM


asl 9/14/2023 3:59:00 PM

all are relatable questions
CANADA


Siyya 1/19/2024 8:30:00 PM

might help me to prepare for the exam
Anonymous


Ted 6/21/2023 11:11:00 PM

just paid and downlaod the 2 exams using the 50% sale discount. so far i was able to download the pdf and the test engine. all looks good.
GERMANY


Paul K 11/27/2023 2:28:00 AM

i think it should be a,c. option d goes against the principle of building anything custom unless there are no work arounds available
INDIA


ph 6/16/2023 12:41:00 AM

very legible
Anonymous


sephs2001 7/31/2023 10:42:00 PM

is this exam accurate or helpful?
Anonymous


ash 7/11/2023 3:00:00 AM

please upload dump, i have exam in 2 days
INDIA


Sneha 8/17/2023 6:29:00 PM

this is useful
CANADA


sachin 12/27/2023 2:45:00 PM

question 232 answer should be perimeter not netowrk layer. wrong answer selected
Anonymous


tomAws 7/18/2023 5:05:00 AM

nice questions
BRAZIL


Rahul 6/11/2023 2:07:00 AM

hi team, could you please provide this dump ?
INDIA


TeamOraTech 12/5/2023 9:49:00 AM

very helpful to clear the exam and understand the concept.
Anonymous


Curtis 7/12/2023 8:20:00 PM

i think it is great that you are helping people when they need it. thanks.
UNITED STATES


sam 7/17/2023 6:22:00 PM

cannot evaluate yet
Anonymous


nutz 7/20/2023 1:54:00 AM

a laptops wireless antenna is most likely located in the bezel of the lid
UNITED STATES


rajesh soni 1/17/2024 6:53:00 AM

good examplae to learn basic
INDIA


Tanya 10/25/2023 7:07:00 AM

this is useful information
Anonymous


Nasir Mahmood 12/11/2023 7:32:00 AM

looks usefull
Anonymous


Jason 9/30/2023 1:07:00 PM

question 81 should be c.
CANADA


TestPD1 8/10/2023 12:22:00 PM

question 18 : response isnt a ?
EUROPEAN UNION


ally 8/19/2023 5:31:00 PM

plaese add questions
TURKEY


DIA 10/7/2023 5:59:00 AM

is dumps still valid ?
FRANCE


Annie 7/7/2023 8:33:00 AM

thanks for this
EUROPEAN UNION


arnie 9/17/2023 6:38:00 AM

please upload questions
Anonymous


Tanuj Rana 7/22/2023 2:33:00 AM

please upload the question dump for professional machinelearning
Anonymous


Future practitioner 8/10/2023 1:26:00 PM

question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
Anonymous


Ace 8/3/2023 10:37:00 AM

number 52 answer is d
UNITED STATES


Nathan 12/17/2023 12:04:00 PM

just started preparing for my exam , and this site is so much help
Anonymous


Corey 12/29/2023 5:06:00 PM

question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
Anonymous


Rajender 10/18/2023 3:54:00 AM

i would like to take psm1 exam.
Anonymous