Which Network Protect feature is a system administrator unable to configure?
Which Network Protect feature is a system administrator unable to configure?
Which Storage Foundation feature is used to send data changes to a remote site via an IP network?
Which Storage Foundation feature is used to send data changes to a remote site via an IP
network?
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
What is a characteristic of an application that is to be clustered with Veritas Cluster Server?
Which two capabilities must an application have in order to be made highly available using Veritas Cluster Ser
Which two capabilities must an application have in order to be made highly available using
Veritas Cluster Server? (Select two.)
How does a system administrator verify that a Network Monitor Server is healthy?
How does a system administrator verify that a Network Monitor Server is healthy?
Which two traffic feed sources should be used for Network Monitor?
Which two traffic feed sources should be used for Network Monitor? (Select two.)
Which types of resources should the administrator consider to configure in the service group?
An administrator is configuring another application service in high availability. The
application’s logical IP address will rely on the same NIC used by the ClusterService service
group. Data will be stored on raw devices. Which types of resources should the
administrator consider to configure in the service group?
Which product can replace a confidential document residing on a public share with a Marker File explaining why
Which product can replace a confidential document residing on a public share with a Marker
File explaining why the document was removed?
Which two Discover target configuration mistakes might be causing the problem?
During testing, an administrator configures a Network Discover target to identify and
quarantine confidential files. The target is set up with a Default credential that has read-only
permissions on the file server. After running the scan and checking the results, the
administrator finds several incidents from the scan, but observes that all confidential files
are still in their original location, and the configured quarantine directory is empty (contains
none of the confidential files). Which two Discover target configuration mistakes might be
causing the problem? (Select two.)
Which two characteristics must be present when preparing an application to be configured for high availability
Which two characteristics must be present when preparing an application to be configured
for high availability using Veritas Cluster Server? (Select two.)