Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "E20-590" Exam

Backup and Recovery Specialist Exam

 Question 1.
You want to configure Replication Manager/SE to automatically backup an SQL replica as part of the nightly backup job. The backup Administrator has provided you with a script that will backup the mount location that Replication Manager/SE will use. 

Which Replication Manager/SE script field do you configure to utilize this script?

A. Pre Replication Script
B. Post Mount Script
C. Backup Script
D. Post Replication Script

Answer: B

Question 2.
ITCertkeys.com asked you to design a new backup solution for its environment. They currently have a single backup server and a tape library connected to the SAN. 

Which solution requires the least amount of change and optimizes its current investment?

A. CLARiiON Disk Library
B. CLARiiON CX with ATA disks
C. Celerra NS with ATA disks
D. New Tape Library

Answer: A

Question 3.
As part of a disaster recovery process, what should you do to recover the NetWorker resource database?

A. Recover the bootstrap save set
B. Recover the SYSTEM save set
C. Perform a browsable recovery of the /nsr/res directory
D. Perform a save set recovery of the save set containing the /nsr/res directory

Answer: A

Question 4.
Your task is to develop a backup to disk solution for ITCertkeys.com. After an initial analysis, you decide to include one DL720 to be used as the primary backup device. The customer has been using a physical library with DLT8000 drives for many years and would like to have the capability to recover from the old tapes. The solution must result in the fewest possible changes to the backup server.

How can you best address these requirements?

A. Connect the existing physical library to the back-end of the DL720. Create a virtual library and 
    virtual tape drives matching the physical drive types.
B. Install the IP Replication agent on the backup server that controls the physical library. Copy all 
    physical tapes over the network to virtual tapes on the DL720.
C. Have the DL720 and the physical library connected to the SAN, so both will be visible from the 
    backup software perspective.
D. Create a separate environment in an offsite location to be used for recovery purposes only. 
    Connect the physical library to this new environment and make all physical tapes available at 
    the same location.

Answer: A

Question 5.
ITCertkeys.com currently backs up, on average, 600 GB a day Sunday through Friday and 3 TB on Saturday. They would like to keep four weeks of backups on the CLARiiON Disk Library without compression. They expect their disk usage to grow 10% a year.

Which model of CLARiiON Disk Library do you recommend as a solution that will be good for three years?

A. DL210
B. DL720
C. DL520
D. DL740

Answer: B

Question 6.
ITCertkeys.com is using Cloning Offsite Vaulting Strategy. After a first backup is performed, a copy of the data is sent to the vault location. 

What happens with the data on the primary site?

A. The data is moved to tape
B. The data is kept in the primary site
C. The data is marked as recyclable
D. No copy is saved in the primary site

Answer: B

Question 7.
A NetWorker server manages three tape drives. Server parallelism is set to 24. All save sets are directed to the Default pool. During a group backup, 16 save sessions are started. 

If each device resource has a Target Sessions value of 4, which statement is correct?

A. NetWorker aborts the group because there are not enough sessions available
B. 16 save streams are directed to the tape drives
C. 12 save streams are directed to tape drives and 4 save sets wait until another save session 
    finishes
D. 12 save streams are directed to tape drives and 4 save sets are aborted

Answer: B

Question 8.
ITCertkeys.com has been using NetWorker in evaluation mode for a week. Their backup devices are disk based. After adding the Network Edition enabler, all backups start to fail. 

What is missing?

A. PowerSnap enabler
B. All devices need to be reconfigured
C. The server needs to be rebooted
D. DBO enabler

Answer: D

Question 9.
ITCertkeys.com wants to keep all backups onsite for possible restores. They also need to store all backups at an offsite location. 

Which backup strategy best satisfies this requirement?

A. Archive
B. Rotation
C. Mirroring
D. Cloning

Answer: D

Question 10.
ITCertkeys.com currently backs up, on average, 1.5 TB a day Monday through Friday and 7 TB on Saturday. They would like to keep four weeks of backups on the CLARiiON Disk Library. They expect their disk usage to grow 30% a year. They want a solution that will be good for three years. 

Which model of CLARiiON Disk Library would you recommend?

A. DL740
B. DL520
C. DL710
D. DL310

Answer: A

Question 11.
How do you configure a Replication Manager job to backup a Clone once it has been fractured from a production volume?

A. Configure Replication Manager to mount the volume and then execute a backup script.
B. In the job Wizard, select the customer's backup product from the drop down list. Next select 
    the desired save set to run.
C. Create a Backup Job. Associate the Backup job to the Clone job and select the "run at job 
    completion" check box.
D. Replication Manager does not natively interface with backup software.

Answer: A

Question 12.
What is a requirement for an Auto Archive operation to successfully happen?

A. The physical tape must be bigger than the virtual tape
B. The CLARiiON Disk Library must be running at least version 1.2 of the emulation software
C. The Auto Archive license must be installed
D. Barcodes on the physical library must match the barcodes on the virtual library

Answer: D

Question 13.
In a NetWorker data zone, what determines the maximum number of save sets that may be backed up simultaneously?

A. Target sessions
B. Client parallelism
C. Server parallelism
D. Max parallelism

Answer: C

Question 14.
ITCertkeys.com was running NetWorker Server backups under an evaluation mode license. The live NetWorker license codes have just been entered on the NetWorker Server. ITCertkeys.com can no longer backup to the tape devices even though they have all the necessary license codes entered. 

What is the most likely cause of the problem and how can you resolve it.

A. Since live NetWorker licenses were entered, all tape devices need to be re-configured.
B. The tape devices need to be cleaned.
C. You cannot replace an evaluation mode license with live NetWorker licenses. They must de-
    install and re-install the NetWorker software.
D. The tape devices became disabled when entering the live license codes and they need to re-
    enable the tape devices.

Answer: D

Question 15.
You are proposing a new backup solution for ABC Corporation, using a DL720 as the backup target. Eight ports will be connected to the customers SAN. 

How many ports are available to be connected to a back-end physical library?

A. 6
B. 10
C. 8
D. 4

Answer: C

Question 16.
The customer has individually zoned the front-end ports of a DL720 to each one of the four HBAs on a host. 

How can you balance the virtual tape devices across these HBAs?

A. Assign different virtual tape devices to each target
B. Assign different virtual tape devices to each initiator
C. Assign all virtual tape devices to all targets and use PowerPath
D. Assign all virtual tape devices to all initiators and use PowerPath

Answer: B

Question 17.
In NetWorker, which save set characteristics can be specified within a pool resource?

A. Group name, client schedule, client name
B. Client name, save set size, backup level
C. Client name, backup level, group name
D. Volume name, save set name, client schedule

Answer: C

Question 18.
Which RAID type would you select when configuring FC storage for backup-to-disk purposes on a CLARiiON array?

A. RAID-5
B. RAID-3
C. RAID-0
D. RAID-10

Answer: A

Question 19.
ITCertkeys.com is running NetWorker 7.3. All Cloned save sets are written to one backup Clone pool. 

What is the effect of setting a retention policy for that backup Clone pool?

A. All Clone instances expire when the save set expires
B. All Clone instances of a save set will have the same Clone retention time
C. Each Clone instance of a save set will have a different Clone retention time
D. All Clone instances of a save set will have the same pool retention time

Answer: C

Question 20.
What is an NDMP implementation option?

A. Remote
B. Two Way
C. Direct Access
D. Remote Access

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1Y0-614 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1Y0-614" Exam

Citrix Access Suite 4.0: Design

 Question 1.
ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed?

A. The Presentation Servers hosting MfgData+ should be deployed in all locations.
B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore.
C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City, 
    Shanghai and Bangalore.
D. Servers hosting MfgData+ should be deployed in New York.

Answer: B

Question 2.
ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing.

Why are only user-based Group Policies required?

A. This is determined by the location of the timeout settings.
B. User configuration Group Policies will satisfy the access requirements for the mission critical 
    applications.
C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security 
    requirements.
D. Policies for Presentation Server can only be applied on the user level.

Answer: A

Question 3.
ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation.

Why should Web Interface be deployed within the internal network?

A. By placing the Web Interface servers on the internal network port 443 does not have to be 
    opened.
B. This prevents internal users from having to traverse the DMZ to access Web Interface through 
    port 443 or port 80. 
C. By placing the Web Interface servers on the internal network, external access can be limited to 
    the Access Gateway appliance through port 443.
D. This is the only way to avoid opening port 80 on the internal firewall.

Answer: A

Question 4.
ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment.

Why is downloading from the ITCertKeys.com intranet site the best option?

A. All clients can be downloaded automatically.
B. All clients can be downloaded. Clients for Windows and Java download automatically.
C. Users have access to this source and can get clients.
D. Users can get the most up-to-date clients independently.

Answer: A

Question 5.
ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. 

Which features of Access Gateway should they recommend to best maximize security?

A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Active Directory authentication 
    should be used, making it necessary that user account be created.
B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Users will access by means of 
    Active Directory guest accounts.
C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Active Directory authentication should  
   be used, making it necessary that user account be created.
D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Users will access by means of Active 
    Directory guest accounts.

Answer: C

Question 6.
ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. 

Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner?

A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication 
    should be used, necessitating the need for the creation of user accounts.
B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory 
    authentication should be used, necessitating the need for the creation of user accounts.

Answer: A

Question 7.
Which type of Terminal Services profile should be deployed?

A. Mandatory profiles with folder redirection
B. Mandatory profiles
C. Roaming profiles with folder redirection
D. Roaming profiles

Answer: C

Question 8.
ITCertKeys.com plans to implement Presentation Server for users in Shanghai.

Why should a static port be defined?

A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is 
    more secure.
B. By defining a static port, system resources can be conserved.
C. There is no other way to establish communication over firewalls other than defining a static 
    port.
D. A static port will allow for License Server communications to be more secure, this, this is 
    optimal.

Answer: D

Question 9.
How should ITCertKeys.com deploy required Citrix hot fixes?

A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should 
    be done.
B. Emergency hot fixes should be deployed through manual installation with limited 
    documentation. All other hot fixes should be deployed by means if Installation Manger with full 
    documentation.
C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be 
    done.
D. All required hot fixes should be deployed by means of Installation Manager. Testing should be 
    done.

Answer: D

Question 10.
In regard to ITCertKeys.com's Advanced Access Control deployment. 

Why should an Advanced Access Control web server be placed at this customer's location?

A. Adding an Advanced Access Control deployment enables the customer to incorporate their 
    own security standards.
B. Adding an Advanced Access Control deployment expedites administrative changes because 
    approval chain is closer to the customer.
C. Adding an Advanced Access Control web server will provide better load balancing across 
    existing hardware.
D. Adding an Advanced Access Control deployment makes administration more cost-effective for 
    the customer.

Answer: A

Question 11.
In the context of the endpoint analysis solution of ITCertKeys.com which is implemented to meet the requirements for employees and customers. To meet the access requirements for remote employees, how should the scanning solution be implemented.

A. Creating an endpoint analysis that checks for security updates, scans the operating system 
    and ensures that the appropriate version of the antivirus software is installed. Create a 
    continuous scan to check the registry for the asset tag and to ensure that the proper antivirus 
    software is running on the client device while connected to the network.
B. Creating a continuous scan that checks for security updates, scans the operating system and 
    ensures that the appropriate version of the antivirus software is installed. Create an endpoint 
    analysis to check the registry for the asset tag and to ensure that the proper antivirus software 
    is running on the client device while connected to the network.
C. Creating an endpoint analysis that ensures that the appropriate version of the antivirus 
    software is installed. Create a continuous scan to check the registry for the asset tag and to 
    ensure that the proper antivirus software is running on the client device while connected to the 
    network.
D. Creating an endpoint analysis that checks against the registry for asset tags, scan the 
    operating system and ensures that the appropriate versions of antivirus software is installed. 
    Create a continuous scan to ensure that the proper antivirus software is running on the client 
    device while connected to the network.

Answer: A



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.