|
Question 1.
Which NetWorker software must be installed on a host backed up using a NetWorker module?
A. Storage Node
B. Server
C. Management Console
D. Client
Answer: D
Question 2.
Which statement is true about Celerra Replicator?
A. Is a pointer based view of a Production File System
B. Is a point-in-time copy of a Production File System
C. Is implemented over campus distances only
D. Is bi-directional
Answer: B
Question 3.
What is a function of NetWorker?
A. Create replicas of mission-critical information on disk arrays
B. Manage capacity of front-end storage devices
C. Centralize and automate backup and recovery
D. Enable failover to remote servers
Answer: C
Question 4.
What is the purpose of a backup?
A. Prevent unauthorized access of data
B. Prevent data corruption
C. Restore the original data in the event of data loss
D. Allow multiple, simultaneous access of data
Answer: C
Question 5.
Replication Manager provides which additional capability over Replication Manager/SE?
A. Mount multiple replicas on the same mount host
B. Mount replicas to alternate hosts
C. Support Symmetrix arrays with TimeFinder
D. Store replicas on remote arrays using SAN Copy
Answer: C
Question 6.
What is the first step in a snapshot operation performed by a NetWorker Module?
A. Freeze application
B. Shut down application
C. Take snapshot
D. Flush buffers
Answer: A
Question 7.
Which operating systems are supported in Replication Manager?
A. Windows 2000, Windows 2003, Solaris, RedHat Linux, AS400
B. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX, AS400
C. Windows 2000, Windows 2003, Windows XP
D. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX
Answer: D
Question 8.
Which NetWorker Modules use snapshot technology?
A. OraSnap and PowerSnap
B. MicroSnap and SnapImage
C. OraSnap and MicroSnap
D. PowerSnap and SnapImage
Answer: D
Question 9.
You wish to create a consistent backup of a changing file system on an EMC CLARiiON.
Which NetWorker Module is used?
A. SnapImage
B. PowerSnap
C. SnapView
D. SnapCL
Answer: B
Question 10.
Which NetWorker resource is used to determine the backup level for a client?
A. Schedule
B. Client
C. Pool
D. Group
Answer: A
Question 11.
Which type of backup is performed for regulatory compliance?
A. Disaster Recovery
B. Archive
C. Cumulative
D. Differential
Answer: B
Question 12.
A file system contains seven 1 gigabyte files. Each day of the week, a different file changes.
Which backup strategy will minimize the overall time that it takes to do a recovery of the file system on Friday?
A. Full backup on Saturday and incremental backups on all other days
B. Full backup on Saturday, cumulative backup on Wednesday and incremental backups on all
other days
C. Full backup on Saturday and Tuesday, incremental backups on all other days
D. Full backup on Saturday, cumulative backups on all other days
Answer: D
Question 13.
How many NetWorker ClientPak licenses are required in the data zone displayed in the exhibit? Click on the exhibit button below.
Exhibit:
A. 4
B. 5
C. 1
D. 2
Answer: D
Question 14.
A user asks to have a corrupted file restored. Which type of backup satisfies this request?
A. Operational
B. Archival
C. Disaster Recovery
D. Regulatory
Answer: A
Question 15.
You wish to backup all data regardless of when it was last backed up.
What type of backup is used?
A. Full
B. Cumulative
C. Incremental
D. Differential
Answer: A
Question 16.
Where is the backup level specified for backups using NetWorker Module for Oracle?
A. NetWorker server's "Module" attribute
B. RMAN backup script
C. Client's "Schedule" attribute
D. Client's "Level" attribute
Answer: B
Question 17.
What does NetWorker use to interface with the database server's native API during a backup?
A. The NetWorker save command
B. The value of the NetWorker client's Backup command attribute
C. The value of the NetWorker client's Backup interface attribute
D. The value of the NetWorker server's Backup interface attribute
Answer: B
Question 18.
What does NetWorker use to interface with a third-party application during a recovery?
A. A module-specific recovery command on the Client
B. The standard NetWorker recovery command on the Client
C. The standard NetWorker recovery command on the Server
D. The value of the "Recovery Interface" attribute
Answer: A
|
Question 1. Both switches and hubs are being utilized within the ITCertKeys network. Which of the following is true regarding the use of switches and hubs for network connectivity in this network? A. Switches take less time to process frames than hubs take B. Hubs can filter frames C. Switches do not forward broadcasts D. Switches increase the number of collision domains in the network E. Using hubs can increase the amount of bandwidth available to hosts F. None of the above Answer: D Explanation: The biggest benefit of using switches instead of hubs in your internetwork is that each switch port is actually its own collision domain. (Conversely, a hub creates one large collision domain.) But even armed with a switch, you still can't break up broadcast domains. Neither switches nor bridges will do that. They'll typically simply forward all broadcasts instead. Switch creates the collision domain per port, so we can say switch increase the number of collision domains. Question 2. Which one of the following characteristics is true regarding the use of hubs and switches? A. Hubs can have their ports be configured with VLANs B. Using hubs is costly with regard to bandwidth availability. C. Switches can not forward broadcasts. D. Switches are more efficient than hubs in processing frames. E. Switches increase the number of collision domains in the network. Answer: E Explanation: Switches increases the number of collisions domains in the network. Switches that are configured with VLANs will reduce the size of the collision domains by increasing the number of collision domains in a network, but making them smaller than that of one big, flat network. Incorrect Answers: A. Switches are capable of VLAN configurations, but hubs are not. B. Hubs are generally the least costly method possible to connect multiple devices together in a network. C. Switches forward broadcasts and multicasts, by default, to all ports within the same VLAN. Only routers block all broadcast traffic by default. D. Switches and hubs can be equally efficient in processing frames, in theory. In practice, switches are generally more efficient as they usually have more CPU and memory allocated to them, and are generally much more expensive than a simple hub. Question 3. When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices) A. Bridges are faster than switches because they have fewer ports. B. A switch is a multiport bridge, C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received. D. A bridge will forward a broadcast but a switch will not. E. Bridges and switches increase the size of a collision domain. F. None of the above statements are true. Answer: B, C Explanation: Both bridges and switches build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch. Incorrect Answers: A. Switches are generally faster than bridges. Bridges also do not necessarily have fewer ports than switches. D. Both bridges and switches will forward broadcast and multicast traffic, assuming that the traffic remains in the same VLAN. E. The use of VLANs in a switch can decrease the size of the collision domain, by creating additional, smaller collision domains. Question 4. Which of the following correctly describe the various functions and virtues of a router? (Select all valid answer choices) A. Packet switching B. Collision prevention on a LAN segment. C. Packet filtering D. Broadcast domain enlargement E. Broadcast forwarding F. Internetwork communication G. None of the above Answer: A, C, F Explanation: The main function of a router is to connect different, separated networks together. In doing so, switching packets from one network to another is a primary function, along with providing for communication between networks. As an additional feature, routers are capable of providing filtering on a network address and application port level, so choice C is also correct. Incorrect Answers: B. Routers can indeed be used to segment a network separate a collision domain, since routers do not forward LAN broadcasts and multicasts to other interfaces. However, routers alone can not prevent all collisions from occurring on any given LAN segment. D. Routers actually segment LANs into smaller broadcast domains. E. Routers do not forward broadcast and multicast traffic out the additional interfaces by default. Unless bridging or IP helpers are configured on the router, LAN broadcasts are blocked at the router level. Question 5. The LAN needs are expanding at the ITCertKeysCorporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the ITCertKeys network. Which of the following are layer 1 devices that you can use? (Choose all that apply.) A. A switch B. A router C. A network adapter card D. A hub E. A repeater Answer: D, E Explanation: A hub simply repeats the electrical signal and makes no attempt to interpret the electrical signal (layer 1) as a LAN frame (Layer 2). So, a hub actually performs OSI layer 1 functions, repeating an electrical signal, whereas a switch performs OSI layer 2 functions, actually interpreting Ethernet header information, particularly addresses, to make forwarding decisions. Hubs can be used to increase the number of stations that can be supported on a LAN. Because the repeater does not interpret what the bits mean, but does examine and generate electrical signals, a repeater is considered to operate at Layer 1. Repeaters can be used to physically extend the LAN to greater distances. Question 6. Cisco is the leader in the router market space. What basic functions do their routers perform in a network? (Choose two) A. The microsegmentation of broadcast domains B. Path selection C. Packet switching D. Bridging between LAN segments E. Access layer security F. VLAN membership assignment G. Application optimization Answer: B, C Explanation: The primary functions of a router are: Packet Switching and Path Selection. It is the routers job to determine the best method for delivering the data, and switching that data as quickly as possible. Question 7. Both bridges are switches are being used throughout the ITCertKeys LAN. Which of the following statements are true regarding bridges and switches in this network? (Choose 3) A. Switches are primarily software based while bridges are hardware based. B. Switches usually have a higher number of ports than most bridges. C. Bridges are frequently faster than switches. D. Bridges define broadcast domains while switches define collision domains. E. Both bridges and switches forward Layer 2 broadcasts. F. Both bridges and switches make forwarding decisions based on Layer 2 addresses. Answer: B, E, F Question 8. As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a WAN? (Choose three) A. A CSU/DSU terminates a digital local loop. B. A router is commonly considered a DCE device. C. A modem terminates an analog local loop. D. A router is commonly considered a DTE device. E. A modem terminates a digital local loop. F. A CSU/DSU terminates an analog local loop. G. A modem is used to terminate a T1 Answer: A, C, D Explanation: Layer 2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC). ASICs can run up to gigabit speeds with very low latency rates. Switches usually have higher port number then bridge. Generally bridges have two ports. Both operates on Data link layer. Question 9. The ITCertKeys network administrator needs to determine what LAN devices to install on the ITCertKeys network. What are two advantages of using Layer 2 Ethernet switches over hubs? (Choose two) A. Allowing simultaneous frame transmissions B. Increasing the size of broadcast domains C. Increasing the maximum length of UTP cabling between devices D. Filtering frames based on MAC addresses E. Decreasing the number of collision domains Answer: A, D Explanation: A: A half duplex connection is where only one device can send or receive at a time. A full duplex connection is where both devices can send and receive at the same time. Thus, if you have a 100Mb half-duplex connection, only sending at 100Mb OR receiving at 100Mb can happen at the same time. If you have a 100Mb full duplex connection, you can effectively get 200Mb out of the link because you could be sending 100Mb and receiving 100Mb at the same time. D: Switches are capable of filtering frames based on any Layer 2 fields. For example, a switch can be programmed to reject (not forward) all frames sourced from a particular network. Because link layer information often includes a reference to an upper-layer protocol, switches usually can filter on this parameter. Furthermore, filters can be helpful in dealing with unnecessary broadcast and multicast packets. Question 10. CDP is being used throughout the ITCertKeys network. What are two reasons why the ITCertKeys network administrator would use CDP? (Choose two) A. To determine the status of network services on a remote device B. To obtain the IP Address of a connected device in order to telnet to the device C. To verify the type of cable interconnecting two devices D. To verify Layer 2 connectivity between two devices when Layer 3 fails E. To obtain VLAN information from directly connected switches F. To determine the status of the routing protocols between directly connected routers G. To support automatic network failover during outages Answer: B, D Explanation: Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting and documenting the network. You can use: Show cdp neighbor Show cdp neighbor details Commands to gather the information of connected neighbors.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.