Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Symantec 250-352 Exam -

Free 250-352 Sample Questions:

Q: 1
Which two system components are verified during a pre-installation check for Veritas Storage Foundation and High Availability Solutions 6.0 for Windows? (Select two.)
A. shared disk storage compatibility
B. total physical memory
C. aggregate CPU performance
D. Active Directory
E. available installation disk space
Answer: B,E

Q: 2
What is the minimum permission required to install Veritas Storage Foundation and High Availability Solutions 6.0 for Windows?
A. Domain Administrator
B. Local Administrator
C. Domain Operator
D. Local User
Answer: B

Q: 3
What is the default load balancing setting for the Dynamic Multi-Pathing (DMP) Active/Active mode?
A. Balanced Path
B. Round-robin
C. Weighted Paths
D. Least Blocks
Answer: C

Q: 4
Which feature is used to improve initial mirror synchronization time?
A. FastResync
B. SmartSnap
C. FastSync
D. SmartMove
Answer: D

Q: 5
What are the two site-based allocations for the site-aware allocation feature? (Select two.)
A. site-separated allocation
B. site-based allocation
C. site-specific allocation
D. site-confined allocation
E. site-campus allocation
Answer: A,D

Q: 6
Which utility is used to back up the private region?
A. vxcbr
B. vxsnap
C. vxassist
D. vxdg
Answer: A

Q: 7
Which feature is available when Veritas Cluster Server (VCS) is configured in secure mode?
A. SSL to encrypt communication between cluster nodes
B. a single sign-on mechanism to connect to a cluster
C. an isolated and secure environment for running applications
D. root broker configured in a stand-alone system outside cluster
Answer: B

Q: 8
What is the recommended number of NICs per system to configure a two node cluster?
A. 2
B. 3
C. 4
D. 5
Answer: B

© 2014, All Rights Reserved