New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Veritas VCS-261 Exam - Topic 8 Question 37 Discussion

Actual exam question for Veritas's VCS-261 exam
Question #: 37
Topic #: 8
[All VCS-261 Questions]

A system with a single, locally mounted file system loses power and is subsequently restarted. All hardware is functioning properly and the intent log is valid. The administrator then mounts the file system using the mount command.

What is the expected behavior?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Odelia
4 months ago
D doesn't make sense here, it should mount normally.
upvoted 0 times
...
Kate
4 months ago
C seems right too, but I lean towards A.
upvoted 0 times
...
Danica
4 months ago
Wait, are you sure? I thought it needed a manual fsck first.
upvoted 0 times
...
Claudio
4 months ago
Totally agree, that's how it works!
upvoted 0 times
...
Gail
4 months ago
A is correct! Intent log replay happens automatically.
upvoted 0 times
...
Della
5 months ago
I vaguely recall that mounting read-only is a safety measure, but I can't remember if that's the case here. Option D could be a possibility, but I hope it's not!
upvoted 0 times
...
Charlesetta
5 months ago
I practiced a similar question, and I think it mentioned that an fsck log replay is needed if the intent log isn't valid. So, I'm leaning towards option B being wrong.
upvoted 0 times
...
Markus
5 months ago
I'm not entirely sure, but I feel like if the intent log is valid, it should allow the mount to succeed without issues. Maybe option C?
upvoted 0 times
...
Iola
5 months ago
I remember something about intent logs being crucial for recovery, so I think option A might be correct.
upvoted 0 times
...
Cecily
5 months ago
I'm confident the answer is 6M. That's the standard way to set up a Fishbone Diagram, so I'll select that option.
upvoted 0 times
...
Wynell
5 months ago
This question reminds me of a practice one where we discussed trusted subsystems and the potential ripple effects of attacks. I wonder if it's all services in the inventory or just some.
upvoted 0 times
...
Audrie
5 months ago
Okay, I think I've got a good handle on subqueries. Let me go through these options one by one and see which ones are true.
upvoted 0 times
...

Save Cancel