|
Question 1. Which of the following is NOT an attribute of a Jukebox resource? A. Match Bar Codes B. Max Parallelism C. Target Sessions D. Auto Media Management Answer: C Question 2. Which two of the following statements are TRUE? (Choose two.) A. Label templates can be ignored when volumes use barcodes. B. Label templates are used to determine volume names. C. A pool must exist before a label template can be created for it. D. Label templates are limited to 24 characters in length. Answer: A, B Question 3. Which of the following utilities can you use to generate reports about the contents of a Client File Index (CFI)? A. nsrinfo B. nsrck C. mminfo D. nsrrpt Answer: A Question 4. You work as a network administrator at ITCertKeys.com. ITCertKeys.com has a Net Worker data zone that owns tapes in an autochanger. This autochanger is also shared by applications other than Net Worker. Which of the following library types does ITCertKeys.com have? A. NDMP library B. shared autochanger C. silo library D. standalone autochanger E. dynamically shared autochanger Answer: C Question 5. Which three of the following attributes can you extract using mminfo? (Choose three.) A. save time B. record number C. contents of the Client File Index (CFI) D. volume identifier E. volume subscript F. save date Answer: A, B, D Question 6. You work as a network administrator at ITCertKeys.com. You have marked files with nwrecover or winworkr. You then click on Required Volumes to see which volumes are required. Which of the following statement would be TRUE for the Required Volumes? A. Net Worker prepares the files list from the media database. B. Net Worker prepares the files list from the Client File Index (CFI). C. Net Worker prepares the volumes list from the Client File Index (CFI). D. Net Worker prepares the volumes list from the media database. Answer: D Question 7. Which two of the following items are displayed by inquire command? (Choose two.) A. The device file information of installed tape devices. B. The speed of installed tape devices. C. The SCSI address of connected devices. D. The media capacity of connected tape drives. Answer: A, C Question 8. Which of the following Net Worker log file contains changes made in the Net Worker Administrator GUI? A. rap.log B. networker.log C. messages D. res.log E. daemon.log Answer: A Question 9. You work as a network administrator at ITCertKeys.com. Client flute is backed up to a file type device connected to the storage node alpha. The file type device runs out of space during the backup. What would be the result? A. The backup will fail. It will then be restarted and will use the next available device. B. The backup will be suspended, expired save sets will be deleted, and the backup will continue if enough space is cleared. C. The backup will be suspended and will wait for the administrator to clear space. D. The volume will be marked as full and the save set will span another volume. Answer: D Question 10. You work as a network administrator at ITCertKeys.com. You want to withdraw media from an auto changer using the Net Worker Administrator GUI. Which operation must you perform on a volume before it can be withdrawn? A. mounted and ready in a drive B. unmounted and in a slot C. mounted and ready in a slot D. marked for eject from the Net Worker Administrator GUI E. unmounted and in a drive Answer: B Question 11. You work as a network administrator at ITCertKeys.com. ITCertKeys.com has a Net Worker 7.1 server with three tape drives. You have set server parallelism to 20. During backup, sixteen sessions are started. You want to set the target sessions per drive to 4. What will occur? A. The backup will be aborted because the target sessions are too low. B. Only twelve sessions will start writing to tapes and four will be aborted. C. Twelve sessions will start writing to the tape drives immediately with the remaining four sessions beginning once the fist twelve have finished. D. All sixteen sessions will start writing to the tape drives. Answer: D Question 12. You work as a network administrator at ITCertKeys.com. ITCertKeys.com has disabled autostart save groups and uses a custom scheduler for backup. A bootstrap is saved after each save group is run. You want to reconfigure the system so that only one bootstrap is backed up daily. What should you do? A. Run a savegrp -O manually for each group. B. Run a savefs -O manually for each group. C. Place the Net Worker server in an auto started group by itself. D. Disable manual saves in the server configuration. Answer: C Question 13. You work as a network administrator at ITCertKeys.com. You want to review information about the server-initiated backup of Group1 on a Net Worker for Windows server. Which three of the following will allow you to accomplish this task? (Choose three.) A. View the savegrp.log file. B. View details for Group1. C. View the networker.log file. D. View the Application Event Log. E. View the System Event Log. Answer: A, B, D Question 14. You work as a network administrator at ITCertKeys.com. All ITCertKeys.com clients are in the Default group. You want to backs up only the Client File Indexes (CFIs) and the bootstrap. Which of the following commands will allow you to accomplish this task? A. savegrp Default B. savegrp -n Default C. savegrp -v Default D. savegrp -G Default E. savegrp -O Default Answer: E Question 15. You work as a network administrator at ITCertKeys.com. You have just configured a standalone device. You want to verify its functionality in Net Worker. Which of the following commands would allow you to accomplish this task? A. nsrim B. nsrwatch C. sjimm D. nsrmm E. nsrjb Answer: D
|
Question 1. Which of the following configurations on Quidway S3026 is true?( ) A. The user privilege level command is used to set the command level that can be accessed after the user log in from a certain interface and to execute the command within this level. B. In default, the command level that can be accessed after AUX login is level 0. C. In default, the command level that can be accessed after VTY login is level 3. Answer: A Question 2. Which command is used to set the maximum learned addresses by the port? A. mac-address max_mac_count B. mac-address max-mac-count max_mac_count C. max-mac-count max_mac_count Answer: A Question 3. Which command is used to set the login password in the user interface on the Quidway S3026 switch? A. password { simple | cipher } password B. set authentication password { simple | cipher } password C. enable password { simple | cipher } password D. password enable password Answer: B Question 4. On Quidway S3026 switch, the address learning function of the port is enabled by defaultA. A. True B. False Answer: A Question 5. If executing the [Quidway-ui-vty0]user privilege level 3 command to configure the user priority, which of the following descriptions is true? A. The user is not affected and can see all the commands B. The user is affected and can only see the commands of level 3. C. The user is affected and can only see the commands below level 3. Answer: C Question 6. If executing the display users all command on the console terminal, the result is as. [Quidway]display users all UI Delay IPaddress Username I 0 AUX 0 00.00.00 * 1 VTY 0 00.00.23 10.110.34.125 2 VTY 1 3 VTY 2 4 VTY 3 5 VTY 4 Which of the following descriptions is true? A. *. Terminal that are being used B. I. Terminal that are being used works in the asynchronous interaction status C. Username. This stands for the user names of the users using this user-interface, also the login username. D. Delay. The time interval from the login till now with minute as the unit Answer: C Question 7. For the resource exhaustion of the switch address table caused by the attack by the frames with different source addresses, which of the following security measures can be adopted? A. Configure the user priority B. Set the maximum learned address by the port C. Set whether the port continues to learn addresses D. Set the timeout disconnection function of EXEC users. Answer: B, C Question 8. As shown in the following figure, the corresponding links of Port 1 ~ Port 4 are the trunk links allowing all the VLANs to pass and the GVRP protocol is activated. The GVRP registration mode of Port 4-switch 3 is set to be Forbidden and the GVRP registration modes of the ports on other switches are set to be Normal. VLAN5 and VLAN6 are configured on the switch 1 and VLAN 6 and VLAN 7 are configured on the switch 3. The following are the VLAN configuration situations of the ports of the switch except the default VLAN. Which of the items are true? A. VLAN 5 and VLAN 6 are configured over port 1. B. VLAN 5~VLAN 6 are configured over port 2. C. VLAN 6 and VLAN 7 are configured over port 3. D. VLAN 6 and VLAN 7 are configured over port 4. Answer: A, B Question 9. The layer 2 switch supporting VLAN has solved the following problem. A. Security B. High efficiency C. Flexible management D. All the above items are false. Answer: A, B, C Question 10. Which of the following descriptions of the transparent bridge is false?( ) A. The transparent bridge can learn the MAC address by itselB. B. The transparent bridge can expand LAN. C. The transparent bridge needs to modify the IP packet first, and then forward iA. D. The transparent bridge is the equipment working on the layer 2. Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.