Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Veritas > InfoScale > VCS-256

VCS-256 Administration of Veritas InfoScale Availability 7.1 for UNIX/Linux Question and Answers

Question # 4

An administrator is bringing a service group online. One of the resources is remaining offline, and is shown in waiting to go online state. Which command should the administrator run to stop Veritas Cluster Server from attempting to bring the resource online to troubleshoot the issue?

A.

hares -clear

B.

hares -offline

C.

hagrp -offline

D.

hagrp -flush

Full Access
Question # 5

How can an administrator remove existing keys from the coordinator disks?

A.

by restarting HAD, fencing, and GAB

B.

by rebooting all the cluster nodes

C.

by running the vxfenclearpre command

D.

by restarting fencing

Full Access
Question # 6

Which action should the administrator perform to ensure the coordination point (CP) service is highly available when adding a CP server into a Veritas Cluster Server environment?

A.

configure multiple CP server instances on the same node

B.

configure the CP server as a resource in a Veritas cluster

C.

configure the CP server over iSCSI

D.

ensure the CP server is on a reliable network

Full Access
Question # 7

Which two actions must an administrator take to upgrade an application under cluster control? (Select two.)

A.

verify the application agent supports the new version

B.

switch the application service group to another node

C.

freeze the application service group

D.

freeze the application resources

E.

stop the application agent on all systems

Full Access
Question # 8

Which behavior should an administrator expect when using the Veritas InfoScale Availability online upgrade process using the installer?

A.

The cluster remains online and the kernel processes are swapped during the upgrade process.

B.

The cluster is taken offline one node at a time during the package upgrade.

C.

The cluster is taken offline during the upgrade process, but the applications stay online.

D.

The cluster remains online until the next reboot and an alternative boot disk is used.

Full Access
Question # 9

Which agent is used to automatically refresh fencing keys if they are missing on fencing servers or disks?

A.

Fencing agent

B.

Phantom agent

C.

CoordPoint agent

D.

Notifier agent

Full Access
Question # 10

Match all five fencing technologies on the left with the corresponding attribute on the right.

Full Access
Question # 11

Which two resource attributes must the administrator set correctly to prevent an outage when a new resource is brought online? (Select two.)

A.

AutoDisabled

B.

Critical

C.

Enabled

D.

Frozen

E.

MonitorOnly

Full Access
Question # 12

Which utility is used to configure the container resource when configuring application monitoring within a Docker container?

A.

vxdockerconfig

B.

installer -docker

C.

dockerconfig

D.

hadockersetup

Full Access