cert24.com real exam is regarded as one of the most favorite Certification. Many IT professionals prefer to add exam among their credentials. cert24.com not only caters you all the information regarding the exam but also provides you the excellent study guide cert24 250-253 640-554 Preparation Materials which makes the certification exam easy for you.
250-253 Administration of Veritas Cluster Server 6.0 for Unix
QUESTION NO: 1
You have removed a system from a running Veritas Cluster Server cluster so that the cluster now only has seven nodes. You need to ensure the cluster will start successfully after a complete cluster shutdown. Which line should be in the /etc/gabtab file to successfully start the cluster?
A. gabconfig -c -n 7
B. clust start seed=7
C. gabconfig start seed=7
D. clust -c -n 7
Answer: A
QUESTION NO: 2
In a four-node cluster configuration, main.cf is modified to remove one of the four nodes. That node is decommissioned, and the remaining cluster configuration is unchanged. A power failure causes all three remaining nodes to shut down. What happens when all three nodes are powered on?
A. The three nodes form a cluster.
B. Veritas Cluster Server will need manual intervention to come online.
C. LLT will fail because the fourth node is in the llthosts.
D. Veritas Cluster Server will go into ADMIN_WAIT.
Answer: B
QUESTION NO: 3
An additional email address was added to the Veritas Cluster Server notifier resource without any other actions being taken. All but one user is receiving notifications. How can this problem be solved?
A. refresh the mailbox of the impacted user
B. restart the notifier resource
C. restart the SNMP daemon
D. restart the HAD daemon
Answer: B
640-554 Implementing Cisco IOS Network Security (IINS v2.0)
QUESTION NO: 1
Which two features are supported by Cisco IronPort Security Gateway? (Choose two.)
A. spam protection
B. outbreak intelligence
C. HTTP and HTTPS scanning
D. email encryption
E. DDoS protection
Answer: A,D
QUESTION NO: 2
Which option is a feature of Cisco ScanSafe technology?
A. spam protection
B. consistent cloud-based policy
C. DDoS protection
D. RSA Email DLP
Answer: B
QUESTION NO: 3
Which two characteristics represent a blended threat? (Choose two.)
A. man-in-the-middle attack
B. trojan horse attack
C. pharming attack
D. denial of service attack
E. day zero attack
Answer: B,E
QUESTION NO: 4
Under which higher-level policy is a VPN security policy categorized?
A. application policy
B. DLP policy
C. remote access policy
D. compliance policy
E. corporate WAN policy
Answer: C
QUESTION NO: 5
What does level 5 in this enable secret global configuration mode command indicate?
router#enable secret level 5 password
A. The enable secret password is hashed using MD5.
B. The enable secret password is hashed using SHA.
C. The enable secret password is encrypted using Cisco proprietary level 5 encryption.
D. Set the enable secret command to privilege level 5.
E. The enable secret password is for accessing exec privilege level 5.
Answer: E
QUESTION NO: 6
Which Cisco management tool provides the ability to centrally provision all aspects of device configuration across the Cisco family of security products?
A. Cisco Configuration Professional
B. Security Device Manager
C. Cisco Security Manager
D. Cisco Secure Management Server
Answer: C