You execute the vxtrace command without any option to collect I/O trace data on all virtual disk drives during peak I/O operations. When you start to analyze the data, you notice that vxtrace displays a record indicating records are lost. You want to reduce the likelihood of the kernel discarding records so that you don't have to rerun vxtrace to capture the records.
What should you do?
A. Print vxtrace event records to a file
B. Increase the kernel buffer
C. Wait until I/O operations have decreased
D. Increase the kernel buffer using the –o option
Which traffic type is excluded from analysis when an administrator uses Network Monitor?
A. Skype
B. Yahoo! Instant Messenger
C. NNTP
D. Telnet
You are using Veritas Enterprise Administrator (VEA) to create a volume set. You need to have e is a pre-requisite in place before you can create the new volume set.
What should you do?
A. Ensure that you have minimum 256 volumes to be configured in a volume set.
B. Ensure that the new volume is a /ext file system.
C. Ensure that the volume set is a raw I/O.
D. Ensure that you have at least one volume created.
You have installed Storage Foundation 5.0 on the Unix platform and need to add licenses. You want to ensure that the licenses are correctly installed on the system.
What should you do?
A. Add the valistat package.
B. Add the VRTSvlic package.
C. Add the vxlicrep package.
D. Add the VRTSspt package.
You are managing a Storage Foundation 5.0 server and want to capture an image of a file system at a selected instant for use in applications.
Which feature will you use to capture the image?
A. Veritas FlashSnap Point-in-Time copy
B. Veritas Volume Replicator
C. Configure the Veritas Storage Checkpoint option
D. Configure the Veritas Quick I/O option
A DLP administrator needs to forward data loss incidents to the company's Security Information and Event Management (SIEM) system. Which response rule action provides the administrator with the ability to accomplish this task?
A. All: Send Email Notification
B. All: Log to a Syslog Server
C. All: Add Note
D. All: Set Attribute
You have already removed a mirror from volume using vxassist command. After removing a mirror you will be left with only one mirror. However, you need to have at least two mirrors on a volume. What should you do to resolve this situation?
A. Change the rule to allow the mirror to be removed
B. Use the –b option with the vxassist command
C. The rule will not allow you to complete this operation.
D. Use the –f option with the vxdg command
A DLP administrator needs to configure an Automated Response rule that can execute while end-users are off the corporate network. Which response rule condition will enable the administrator to accomplish this task?
A. Endpoint Location
B. Endpoint Device
C. Protocol or Endpoint Destination
D. Sender/User Matches Pattern
You have a nonredundant concatenated volume named datavol in a disk group named datadg. The volume has a file system on it. One of the underlying disks of the volume called datadg02 fails temporarily due to a power failure. You fix the problem of the power failure, and ensure that the disk is powered back again. You ensure that both the system and VxVM can see the disk again. Then, you reattach the disk back to the disk media record.
Which command will you execute next to be able to run fsck on the file system?
A. vxvol –g datadg start datavol
B. vxrecover –s datavol
C. vxrecover -ns
D. vxvol –g datadg –f start datavol
You are monitoring a file system on a Solaris operating system using Veritas Volume Manager when the following kernel message appears: WARNING. msgcnt x: mesg 069: V-2-69: memory usage specified by the vxfs:vxfs_ninode and vxfs:vx_bc_bufhwm parameters exceeds available memory; the system may hang under heavy load.
You need to resolve this error. What should you do?
A. Increase the value of one or both parameters to 100% of physical memory or to 100% of kernel virtual memory
B. Remove either the physical memory parameter or the kernel virtual memory parameter.
C. Leave the parameters at current levels and disregard the system message because it is a false message.
D. Reduce the value of one or both parameters to less than 50% of physical memory or to 66% of kernel virtual memory
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Symantec exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 250-513 exam preparations and Symantec certification application, do not hesitate to visit our Vcedump.com to find your solutions here.