A system with a single, locally mounted file system loses power and is subsequently restarted. All hardware is functioning properly and the intent log is valid. The administrator then mounts the file system using the mount command.
What is the expected behavior?
A. Mount will replay the intent log.
B. Mount prints an error stating that a fsck log replay will be required.
C. Mount succeeds silently as normal.
D. Mount prints an error message stating that a full fsck will be required.
The file system Storage Checkpoint Visibility feature is configured when mounting the primary fileset. What are the possible configuration options?
A. ro, off, rw
B. auto, ondemand
C. ondemand, remove
D. yes, no, error
If a system fails during a volume relayout, what happens to the transformation after the system is restored?
A. Transformation continues after the system is restored.
B. Volume configuration can be restored from config copy backed up by vxconfigdbackupd.
C. Transformation is reversed and may have to be repeated manually.
D. Data may become corrupted and may have to be restored from backup.
Which three are functions of the Control Center? (Select three.)
A. consolidates logging information
B. houses email Spam Quarantine messages
C. generates encrypted structured data indexes
D. executes email policies
Which two content compliance features are included with the Premium Content Control subscription? (Select two.)
A. document training
B. pre-built policy templates
C. incident management
D. structured data matching
E. message level encryption
How are shrunk spaces reclaimed on shrinking Veritas Volume Manager (VxVM) volumes based on thin reclaimable LUNs?
A. through automatic reclamation asynchronously
B. through aggressive reclamation
C. manually, by the administrator using the fsadm command
D. by using Veritas Operations Manager (VOM)
When creating a policy to check outbound messages for inappropriate dissemination of credit card numbers, which policy resource should be leveraged in the policy?
A. Smart identifiers
B. Patterns
C. Dictionaries
D. Annotations
Which attribute is configurable for alert notifications?
A. email address that appears in the FROM: line of the alert
B. subject line
C. HTML formatting
D. user name of recipient in LDAP
Which operation can be performed during a volume relayout?
A. Create a volume snapshot
B. Stop and reverse the relayout
C. Change the number of mirrors in the volume
D. Perform another concurrent relayout on the volume
Which two commands are used to configure the site awareness feature? (Select two.)
A. vxconfigd
B. vxdctl
C. vxdisksetup
D. vxdg
E. vxmend