Q) What does Network Monitor use to identify network traffic going to a nonstandard port?
a) The originating domain
b) Total packet size
c) Either UDP or TCP
d) Protocol signature
Q) While Veritas Cluster Server supports nodes in a cluster using different hardware or operating system versions, this is potentially undesirable for which two reasons? (Select two.) a) User security
b) Inability to handle load on failover
c) Cluster upgrades
d) Operational complexity Network connectivity
Q) What are two operating systems supported by Veritas Cluster Server? (Select two.)
b) Red Hat Enterprise Server
d) Mac OS AIX
Q) What is a characteristic of the web-based installer?
a) It can be automated with a response file.
b) It can be run using Internet Explorer, Firefox, or Safari.
c) It can install on multiple operating systems at the same time.
d) It runs the same commands as the command line installer.
Q) What is a feature of keyless licensing?
a) It works on all versions of Veritas Cluster Server
b) It requires an accessible Veritas Operations Manager (VOM) server.
c) It requires that at least one key be installed on each cluster host.
d) It must be enabled before installation of Veritas Cluster Server