How does a system administrator verify that a Network Monitor Server is healthy?
How does a system administrator verify that a Network Monitor Server is healthy?
Which two traffic feed sources should be used for Network Monitor?
Which two traffic feed sources should be used for Network Monitor? (Select two.)
Which types of resources should the administrator consider to configure in the service group?
An administrator is configuring another application service in high availability. The
application’s logical IP address will rely on the same NIC used by the ClusterService service
group. Data will be stored on raw devices. Which types of resources should the
administrator consider to configure in the service group?
Which product can replace a confidential document residing on a public share with a Marker File explaining why
Which product can replace a confidential document residing on a public share with a Marker
File explaining why the document was removed?
Which two Discover target configuration mistakes might be causing the problem?
During testing, an administrator configures a Network Discover target to identify and
quarantine confidential files. The target is set up with a Default credential that has read-only
permissions on the file server. After running the scan and checking the results, the
administrator finds several incidents from the scan, but observes that all confidential files
are still in their original location, and the configured quarantine directory is empty (contains
none of the confidential files). Which two Discover target configuration mistakes might be
causing the problem? (Select two.)
Which two characteristics must be present when preparing an application to be configured for high availability
Which two characteristics must be present when preparing an application to be configured
for high availability using Veritas Cluster Server? (Select two.)
Which two actions must the administrator perform for the storage in order to complete the configuration of the
An administrator is planning to migrate a locally hosted application to high availability. Data
migration on the shared storage has been properly completed. Which two actions must the
administrator perform for the storage in order to complete the configuration of the
application service? (Select two.)
Which failover policy should the administrator implement to achieve this requirement?
An administrator is planning to configure a new application service in a Veritas cluster. In
the case of an application failure, the company requires that the node with the fewest
running service groups be selected as the failover target. Which failover policy should the
administrator implement to achieve this requirement?
Which data locations should an organization scan first?
Which data locations should an organization scan first?
Which detection method is used for fingerprinting and protecting unstructured data, such as source code docume
Which detection method is used for fingerprinting and protecting unstructured data, such as
source code documents or merger and acquisition documents?