|
Question 1. You want to configure Replication Manager/SE to automatically backup an SQL replica as part of the nightly backup job. The backup Administrator has provided you with a script that will backup the mount location that Replication Manager/SE will use. Which Replication Manager/SE script field do you configure to utilize this script? A. Pre Replication Script B. Post Mount Script C. Backup Script D. Post Replication Script Answer: B Question 2. ITCertkeys.com asked you to design a new backup solution for its environment. They currently have a single backup server and a tape library connected to the SAN. Which solution requires the least amount of change and optimizes its current investment? A. CLARiiON Disk Library B. CLARiiON CX with ATA disks C. Celerra NS with ATA disks D. New Tape Library Answer: A Question 3. As part of a disaster recovery process, what should you do to recover the NetWorker resource database? A. Recover the bootstrap save set B. Recover the SYSTEM save set C. Perform a browsable recovery of the /nsr/res directory D. Perform a save set recovery of the save set containing the /nsr/res directory Answer: A Question 4. Your task is to develop a backup to disk solution for ITCertkeys.com. After an initial analysis, you decide to include one DL720 to be used as the primary backup device. The customer has been using a physical library with DLT8000 drives for many years and would like to have the capability to recover from the old tapes. The solution must result in the fewest possible changes to the backup server. How can you best address these requirements? A. Connect the existing physical library to the back-end of the DL720. Create a virtual library and virtual tape drives matching the physical drive types. B. Install the IP Replication agent on the backup server that controls the physical library. Copy all physical tapes over the network to virtual tapes on the DL720. C. Have the DL720 and the physical library connected to the SAN, so both will be visible from the backup software perspective. D. Create a separate environment in an offsite location to be used for recovery purposes only. Connect the physical library to this new environment and make all physical tapes available at the same location. Answer: A Question 5. ITCertkeys.com currently backs up, on average, 600 GB a day Sunday through Friday and 3 TB on Saturday. They would like to keep four weeks of backups on the CLARiiON Disk Library without compression. They expect their disk usage to grow 10% a year. Which model of CLARiiON Disk Library do you recommend as a solution that will be good for three years? A. DL210 B. DL720 C. DL520 D. DL740 Answer: B Question 6. ITCertkeys.com is using Cloning Offsite Vaulting Strategy. After a first backup is performed, a copy of the data is sent to the vault location. What happens with the data on the primary site? A. The data is moved to tape B. The data is kept in the primary site C. The data is marked as recyclable D. No copy is saved in the primary site Answer: B Question 7. A NetWorker server manages three tape drives. Server parallelism is set to 24. All save sets are directed to the Default pool. During a group backup, 16 save sessions are started. If each device resource has a Target Sessions value of 4, which statement is correct? A. NetWorker aborts the group because there are not enough sessions available B. 16 save streams are directed to the tape drives C. 12 save streams are directed to tape drives and 4 save sets wait until another save session finishes D. 12 save streams are directed to tape drives and 4 save sets are aborted Answer: B Question 8. ITCertkeys.com has been using NetWorker in evaluation mode for a week. Their backup devices are disk based. After adding the Network Edition enabler, all backups start to fail. What is missing? A. PowerSnap enabler B. All devices need to be reconfigured C. The server needs to be rebooted D. DBO enabler Answer: D Question 9. ITCertkeys.com wants to keep all backups onsite for possible restores. They also need to store all backups at an offsite location. Which backup strategy best satisfies this requirement? A. Archive B. Rotation C. Mirroring D. Cloning Answer: D Question 10. ITCertkeys.com currently backs up, on average, 1.5 TB a day Monday through Friday and 7 TB on Saturday. They would like to keep four weeks of backups on the CLARiiON Disk Library. They expect their disk usage to grow 30% a year. They want a solution that will be good for three years. Which model of CLARiiON Disk Library would you recommend? A. DL740 B. DL520 C. DL710 D. DL310 Answer: A Question 11. How do you configure a Replication Manager job to backup a Clone once it has been fractured from a production volume? A. Configure Replication Manager to mount the volume and then execute a backup script. B. In the job Wizard, select the customer's backup product from the drop down list. Next select the desired save set to run. C. Create a Backup Job. Associate the Backup job to the Clone job and select the "run at job completion" check box. D. Replication Manager does not natively interface with backup software. Answer: A Question 12. What is a requirement for an Auto Archive operation to successfully happen? A. The physical tape must be bigger than the virtual tape B. The CLARiiON Disk Library must be running at least version 1.2 of the emulation software C. The Auto Archive license must be installed D. Barcodes on the physical library must match the barcodes on the virtual library Answer: D Question 13. In a NetWorker data zone, what determines the maximum number of save sets that may be backed up simultaneously? A. Target sessions B. Client parallelism C. Server parallelism D. Max parallelism Answer: C Question 14. ITCertkeys.com was running NetWorker Server backups under an evaluation mode license. The live NetWorker license codes have just been entered on the NetWorker Server. ITCertkeys.com can no longer backup to the tape devices even though they have all the necessary license codes entered. What is the most likely cause of the problem and how can you resolve it. A. Since live NetWorker licenses were entered, all tape devices need to be re-configured. B. The tape devices need to be cleaned. C. You cannot replace an evaluation mode license with live NetWorker licenses. They must de- install and re-install the NetWorker software. D. The tape devices became disabled when entering the live license codes and they need to re- enable the tape devices. Answer: D Question 15. You are proposing a new backup solution for ABC Corporation, using a DL720 as the backup target. Eight ports will be connected to the customers SAN. How many ports are available to be connected to a back-end physical library? A. 6 B. 10 C. 8 D. 4 Answer: C Question 16. The customer has individually zoned the front-end ports of a DL720 to each one of the four HBAs on a host. How can you balance the virtual tape devices across these HBAs? A. Assign different virtual tape devices to each target B. Assign different virtual tape devices to each initiator C. Assign all virtual tape devices to all targets and use PowerPath D. Assign all virtual tape devices to all initiators and use PowerPath Answer: B Question 17. In NetWorker, which save set characteristics can be specified within a pool resource? A. Group name, client schedule, client name B. Client name, save set size, backup level C. Client name, backup level, group name D. Volume name, save set name, client schedule Answer: C Question 18. Which RAID type would you select when configuring FC storage for backup-to-disk purposes on a CLARiiON array? A. RAID-5 B. RAID-3 C. RAID-0 D. RAID-10 Answer: A Question 19. ITCertkeys.com is running NetWorker 7.3. All Cloned save sets are written to one backup Clone pool. What is the effect of setting a retention policy for that backup Clone pool? A. All Clone instances expire when the save set expires B. All Clone instances of a save set will have the same Clone retention time C. Each Clone instance of a save set will have a different Clone retention time D. All Clone instances of a save set will have the same pool retention time Answer: C Question 20. What is an NDMP implementation option? A. Remote B. Two Way C. Direct Access D. Remote Access Answer: C
|
Question 1. ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed? A. The Presentation Servers hosting MfgData+ should be deployed in all locations. B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore. C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City, Shanghai and Bangalore. D. Servers hosting MfgData+ should be deployed in New York. Answer: B Question 2. ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing. Why are only user-based Group Policies required? A. This is determined by the location of the timeout settings. B. User configuration Group Policies will satisfy the access requirements for the mission critical applications. C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security requirements. D. Policies for Presentation Server can only be applied on the user level. Answer: A Question 3. ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation. Why should Web Interface be deployed within the internal network? A. By placing the Web Interface servers on the internal network port 443 does not have to be opened. B. This prevents internal users from having to traverse the DMZ to access Web Interface through port 443 or port 80. C. By placing the Web Interface servers on the internal network, external access can be limited to the Access Gateway appliance through port 443. D. This is the only way to avoid opening port 80 on the internal firewall. Answer: A Question 4. ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment. Why is downloading from the ITCertKeys.com intranet site the best option? A. All clients can be downloaded automatically. B. All clients can be downloaded. Clients for Windows and Java download automatically. C. Users have access to this source and can get clients. D. Users can get the most up-to-date clients independently. Answer: A Question 5. ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. Which features of Access Gateway should they recommend to best maximize security? A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point analysis features should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created. B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point analysis features should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts. C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point analysis should be configured for the Access Gateway. Active Directory authentication should be used, making it necessary that user account be created. D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point analysis should be configured for the Access Gateway. Users will access by means of Active Directory guest accounts. Answer: C Question 6. ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner? A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts. B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of Active Directory guest accounts. C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of Active Directory guest accounts. D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory authentication should be used, necessitating the need for the creation of user accounts. Answer: A Question 7. Which type of Terminal Services profile should be deployed? A. Mandatory profiles with folder redirection B. Mandatory profiles C. Roaming profiles with folder redirection D. Roaming profiles Answer: C Question 8. ITCertKeys.com plans to implement Presentation Server for users in Shanghai. Why should a static port be defined? A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is more secure. B. By defining a static port, system resources can be conserved. C. There is no other way to establish communication over firewalls other than defining a static port. D. A static port will allow for License Server communications to be more secure, this, this is optimal. Answer: D Question 9. How should ITCertKeys.com deploy required Citrix hot fixes? A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should be done. B. Emergency hot fixes should be deployed through manual installation with limited documentation. All other hot fixes should be deployed by means if Installation Manger with full documentation. C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be done. D. All required hot fixes should be deployed by means of Installation Manager. Testing should be done. Answer: D Question 10. In regard to ITCertKeys.com's Advanced Access Control deployment. Why should an Advanced Access Control web server be placed at this customer's location? A. Adding an Advanced Access Control deployment enables the customer to incorporate their own security standards. B. Adding an Advanced Access Control deployment expedites administrative changes because approval chain is closer to the customer. C. Adding an Advanced Access Control web server will provide better load balancing across existing hardware. D. Adding an Advanced Access Control deployment makes administration more cost-effective for the customer. Answer: A Question 11. In the context of the endpoint analysis solution of ITCertKeys.com which is implemented to meet the requirements for employees and customers. To meet the access requirements for remote employees, how should the scanning solution be implemented. A. Creating an endpoint analysis that checks for security updates, scans the operating system and ensures that the appropriate version of the antivirus software is installed. Create a continuous scan to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network. B. Creating a continuous scan that checks for security updates, scans the operating system and ensures that the appropriate version of the antivirus software is installed. Create an endpoint analysis to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network. C. Creating an endpoint analysis that ensures that the appropriate version of the antivirus software is installed. Create a continuous scan to check the registry for the asset tag and to ensure that the proper antivirus software is running on the client device while connected to the network. D. Creating an endpoint analysis that checks against the registry for asset tags, scan the operating system and ensures that the appropriate versions of antivirus software is installed. Create a continuous scan to ensure that the proper antivirus software is running on the client device while connected to the network. Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.