Which two system configuration items must be verified for Veritas Cluster Server (VCS) compatibility? (Select two.)
A. the processors are 32 bit
B. the number of NICs on each system
C. the amount of memory on each system
D. the number of processors on each system
E. the number of HBAs
Symantec Backup Exec System Recovery Manager 8.5 Server is supported on which three operating systems? (Select three.)
A. Windows Vista Ultimate
B. Windows Server 2008
C. Windows Server 2003 x64 (SP1)
D. Windows Small Business Server 2003 (SP1)
E. Windows Advanced Server 2000 (SP4)
What is a required attribute of a service group?
A. AutoStart
B. AutoStartList
C. SystemList
D. SystemStartList
An administrator needs to remove a system from a 32 node cluster. The administrator launches the Cluster Configuration Wizard and gets to the Cluster Configuration Options page.
Which option should the administrator select to remove the system?
A. Modify Existing Cluster
B. Edit Existing Cluster
C. Reconfigure
D. RemoveNodes
Microsoft Exchange Server 2007 is clustered using Veritas Storage Foundation and High Availability Solutions 6.0 for Windows and the mailbox database is set to mount on start up. The database state is displayed as dismounted on the primary node of the cluster.
Which attribute must be set to ensure that the service group fails over to the secondary node?
A. FaultOnMonitorTimeout
B. FaultOnMountFailure
C. ToleranceLimit
D. ResFaultPoilcy
What is the maximum number of Offsite Copy destinations that each backup job can have?
A. 1
B. 2
C. 3
D. 4
Symantec Backup Exec System Recovery 8.5 (BESR 8.5) provides the ability to recover a system to hardware that is dissimilar from the original hardware on which the backup image was initially created.
Which BESR 8.5 feature is used when recovering a system backup to dissimilar hardware?
A. Offsite Copy
B. Granular Restore Option (GRO)
C. Restore Anyware
D. LightsOut Restore
Storage Foundation for Windows has just been installed.
Which step verifies successful installation?
A. start the VEA GUI and connect to the system
B. from the command prompt, type the vxverify -install command
C. from the command prompt, type the vxdctl -verify command
D. start the Cluster Manager Java Console and connect to the system
Which utility is used to run risk analysis?
A. Configuration Checker
B. VxExplorer
C. hagetcf
D. Windows Data Collector
Which two tasks are performed by the rolling upgrade wizard during the upgrade process? (Select two.)
A. backs up configuration data
B. performs pre-installation checks
C. evacuates online service groups
D. assigns temporary cluster ID
E. upgrades nodes without rebooting
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Veritas exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your VCS-352 exam preparations and Veritas certification application, do not hesitate to visit our Vcedump.com to find your solutions here.