New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Veritas > InfoScale > VCS-260

VCS-260 Administration of Veritas InfoScale Availability 7.3 for UNIX/Linux Question and Answers

Question # 4

An administrator is responsible for a strechted cluster between two data centers in different locations. The data is mirrored between sites.

How should the configuration be deployed to maximize resiliency if the administrator wants to set up I/O fencing?

A.

three coordinator disks at the primary site and three coordinator disks at the secondary site

B.

the coordinator disks at the primary site must be mirrored to coordinator disks at the secondary site

C.

three coordinator disks at the primary site and a coordinator disk at the secondary site, and a coordination point server at a third site

D.

one coordinator disk at the primary site, one coordinator disk at the secondary site, and a coordination point server at a third site

Full Access
Question # 5

When is the resstatechange trigger unable to detect a resource state transition?

A.

when a resource is faulted

B.

when a resource is brought online

C.

when a resource is enabled

D.

when a resource fault is cleared

Full Access
Question # 6

Which resource type can an administrator use to mirror the state of another persistent resource?

A.

Phantom

B.

Proxy

C.

VolumeSet

D.

NotifierMngr

Full Access
Question # 7

What does it mean when a cluster node is in the REMOTE_BUILD state?

A.

The in-memory cluster configuration is being built by copying the in-memory configuration from another running cluster node.

B.

The node is building the in-memory cluster configuration from the primary main.cf file on a remote node.

C.

The in-memory configuration on the node is being updated to reflect configuration changes being made on a remote node.

D.

It is the last node to join the cluster and must wait to build the in-memory configuration until all other nodes have their in-memory configuration.

Full Access
Question # 8

All LLT links fail simultaneously in a two-mode cluster with disk-based fencing configured. Node0 won the race for the coordinator disks, and Node1 panics and restarts as a result of losing the race. Node1 is now unable to join Node0 to form a cluster.

What happens if the administrator forces GAB to seed on Node1?

A.

Node1 joins the cluster, but it is in jeopardy membership.

B.

The administrator inadvertently causes a split-brain condition.

C.

The fencing driver sees only registration keys for Node0 and disables itself.

D.

The fencing driver on Node1 writes registration keys to the coordinator disks and HAD starts up.

Full Access
Question # 9

Which utility is used to configure the container resource when configuring application monitoring within a Docker container?

A.

vxdockerconfig

B.

installer -docker

C.

dockerconfig

D.

hadockersetup

Full Access
Question # 10

Which log can an administrator review to determine why a resource failed to come online?

A.

/var/VRTSvcs/log/vbs_state_notify.log

B.

/var/VRTSvcs/log/ProcessOnOnly_A.log

C.

/var/VRTSvcs/log/HostMonitor_A.log

D.

/var/VRTSvcs/log/engine_A.log

Full Access
Question # 11

A cluster is configured to use coordination point servers for data protection.

What happens to the service groups if connectivity between one of the nodes and the coordination point servers is lost?

A.

The service groups fail over to systems that remain connected to the coordination point servers.

B.

The service groups remain online, but offline groups are unable to come online.

C.

The service groups remain online and related messages are logged.

D.

The service groups are taken offline until connectivity is resumed with the coordination point servers.

Full Access
Question # 12

Which command should an administrator use to generate an encrypted password for editing a resource in the main.cf file?

A.

vcsencrypt –vcs

B.

hares –modify

C.

vcsencrypt –agent

D.

hatype –modify

Full Access