Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two capabilities can an administrator use to ensure availability within Docker Containers? (Select two.)

A.

provide HA to the application within the container for failover and app restart

B.

provide provisioning of a new container when an application within the container fails

C.

first restart the application within the container and if continued app failures then provision a new container

D.

provide HA to the container and move it between cluster nodes

E.

provide provisioning of a new container when a container fails

Where is the sysoffline trigger executed if a node goes into a jeopardy state or leaves the cluster?

A.

on all nodes in the cluster regardless of state

B.

on the node that goes offline by entering a jeopardy state or leaving the cluster

C.

on all the nodes in the cluster that are still in a RUNNING state

D.

on the lowest numbered system in the cluster with a RUNNING state

As part of the consolidation efforts in a data center, the administrator decides to merge two two-node Veritas Cluster Server (VCS) clusters into a four-node VCS cluster. The source and target clusters are on the same networks for LLT communication. The administrator performs the following tasks as preparation for the merge while both clusters are still running:

    modifies /etc/llttab files on the source cluster systems so the cluster ID is changed to the cluster ID of the target cluster

    modifies /etc/llthosts files on all systems to include the four nodes

    modifies /etc/gabtab files on all systems to require the four systems to seed

    ensures the source cluster systems can see the fencing disks used by the target cluster

    copies the fencing configuration files from the target cluster systems to the source cluster systems

    adds the source cluster systems to the target cluster configuration using the hasys –add command

After the preparation is complete, the administrator stops the source cluster leaving the applications running, then stops the whole communication stack and restarts it in the correct order. When the administrator attempts to start the cluster again on the source cluster systems, they fail to join the four-node cluster.

Which preparation step that the administrator failed to perform is preventing the source cluster systems from joining the four-node cluster?

A.

The cluster needs to be manually seeded using gabconfig -x on the source cluster systems.

B.

The target main.cf file needs to be copied to the source cluster systems.

C.

The service group configuration of the source cluster needs to be applied to the target cluster.

D.

The cluster UUID from the target cluster needs to be copied to the source cluster.

An installed cluster has been licensed with the keyless licensing option. The administrator has yet to configure the cluster to be managed by Veritas InfoScale Operations Manager (VIOM). What will happen when 60 days have passed since installation?

A.

The cluster will shut down.

B.

The cluster will log messages related to licensing.

C.

The cluster will disallow administrative changes until licensed.

D.

The cluster will cease to respond if a resource faults.

What are two effects of a failed resource in the service group configuration below? (Select two.)

A.

Any resource fault leads to a faulted state for the resource.

B.

Any resource fault leads to the service group failing over.

C.

Any resource fault leads to the service group being taken offline.

D.

Any resource fault leaves the service group partially online.

E.

Any resource fault leaves the service group fully online.

The administrator of a four-node Veritas cluster has configured notifications as highly available for all notification methods. How many notification manager resources are running when all nodes are considered?

A.

only one

B.

one for each ServiceGroup

C.

one for each node

D.

two resources (one for SMTP, one for SNMP)

An administrator needs to create a new two-node cluster.

Which configuration allows the administrator to firm a cluster using Veritas InfoScale Availability?

A.

different operating system vendors for the two servers that share the same big-endian or little-endian format

B.

one server running Solaris x86 and the other server running Solaris SPARC

C.

one server running Linux RHEL 6 and the other server running Oracle Linux 6

D.

one server configured as a virtual machine and the other server configured as a physical machine

Which agent is used to automatically refresh fencing keys if they are missing on fencing servers or disks?

A.

Fencing agent

B.

Phantom agent

C.

CoordPoint agent

D.

Notifier agent

Which two meters can the administrator use for the system capacity calculation when the FailOverPolicy of a service group is set to BiggestAvailable? (Select two.)

A.

Network

B.

Swap

C.

Storage

D.

Semaphores

E.

CPU

An administrator is adding a node to a running cluster. The administrator has successfully installed Veritas InfoScale Availability 7.1 and has configured and started LLT.

Which command will allow the new node to communicate with the cluster?

A.

gabconfig -c

B.

hastart

C.

sh /etc/gabconfig

D.

hasys -force