Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "E20-097" Exam

EMC Technology Foundations-Backup and Recovery

 Question 1.
Which NetWorker software must be installed on a host backed up using a NetWorker module?

A. Storage Node
B. Server
C. Management Console
D. Client

Answer: D

Question 2.
Which statement is true about Celerra Replicator?

A. Is a pointer based view of a Production File System
B. Is a point-in-time copy of a Production File System
C. Is implemented over campus distances only
D. Is bi-directional

Answer: B

Question 3.
What is a function of NetWorker?

A. Create replicas of mission-critical information on disk arrays
B. Manage capacity of front-end storage devices
C. Centralize and automate backup and recovery
D. Enable failover to remote servers

Answer: C

Question 4.
What is the purpose of a backup?

A. Prevent unauthorized access of data
B. Prevent data corruption
C. Restore the original data in the event of data loss
D. Allow multiple, simultaneous access of data

Answer: C

Question 5.
Replication Manager provides which additional capability over Replication Manager/SE?

A. Mount multiple replicas on the same mount host
B. Mount replicas to alternate hosts
C. Support Symmetrix arrays with TimeFinder
D. Store replicas on remote arrays using SAN Copy

Answer: C

Question 6.
What is the first step in a snapshot operation performed by a NetWorker Module?

A. Freeze application
B. Shut down application
C. Take snapshot
D. Flush buffers

Answer: A

Question 7.
Which operating systems are supported in Replication Manager?

A. Windows 2000, Windows 2003, Solaris, RedHat Linux, AS400
B. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX, AS400
C. Windows 2000, Windows 2003, Windows XP
D. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX

Answer: D

Question 8.
Which NetWorker Modules use snapshot technology?

A. OraSnap and PowerSnap
B. MicroSnap and SnapImage
C. OraSnap and MicroSnap
D. PowerSnap and SnapImage

Answer: D

Question 9.
You wish to create a consistent backup of a changing file system on an EMC CLARiiON.
Which NetWorker Module is used?

A. SnapImage
B. PowerSnap
C. SnapView
D. SnapCL

Answer: B

Question 10.
Which NetWorker resource is used to determine the backup level for a client?

A. Schedule
B. Client
C. Pool
D. Group

Answer: A

Question 11.
Which type of backup is performed for regulatory compliance?

A. Disaster Recovery
B. Archive
C. Cumulative
D. Differential

Answer: B

Question 12.
A file system contains seven 1 gigabyte files. Each day of the week, a different file changes. 

Which backup strategy will minimize the overall time that it takes to do a recovery of the file system on Friday?

A. Full backup on Saturday and incremental backups on all other days
B. Full backup on Saturday, cumulative backup on Wednesday and incremental backups on all 
    other days
C. Full backup on Saturday and Tuesday, incremental backups on all other days
D. Full backup on Saturday, cumulative backups on all other days

Answer: D

Question 13.
How many NetWorker ClientPak licenses are required in the data zone displayed in the exhibit? Click on the exhibit button below.
Exhibit:
 

A. 4
B. 5
C. 1
D. 2

Answer: D

Question 14.
A user asks to have a corrupted file restored. Which type of backup satisfies this request?

A. Operational
B. Archival
C. Disaster Recovery
D. Regulatory

Answer: A

Question 15.
You wish to backup all data regardless of when it was last backed up. 

What type of backup is used?

A. Full
B. Cumulative
C. Incremental
D. Differential

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-019 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-019" Exam

ES Policy Enabled Networking

 Question 1.
Authentication is used in Secure Application Provisioning to:

A. Quarantine malicious traffic
B. Persistently apply policy
C. Allow configuration of a switch's host data port
D. provide additional network access

Answer:  D

Question 2.
Saving a NetSight Atlas Policy Manager configuration to a .pmd file:

A. Writes the configuration to NVRAM on the switches
B. Allows for multiple configurations to be stored on the NMS
C. Notifies the RADIUS server that new policies have been created
D. Temporarily disables communication between all RADIUS clients until the save is complete

Answer:  B

Question 3.
Certificate services must be installed when using:

A. EAP-TLS
B. EAP-MD5
C. PWA
D. MAC authentication

Answer:  A

Question 4.
Persistent policy assignment:

A. Can be effective in an incremental deployment of acceptable use policy
B. Is dependent upon a RADIUS back-end configuration
C. Is deployed based on user authentication
D. Cannot be used on uplink ports

Answer:  A

Question 5.
A distinguishing characteristic of PEAP is:

A. It adds security by running over a VPN tunnel
B. It uses salt encryption
C. It requires that only the supplicant present a certificate
D. It creates keying material using the Pseudo-Random Function

Answer:  D

Question 6.
In the Enterasys policy-enabled network model, on-demand policy assignment:

A. Is the result of a manual configuration
B. Makes use of the Filter-ID parameter
C. Is overridden by a ports default role
D. Requires the use of 802.1X authentication mechanisms

Answer:  B

Question 7.
All of the following are services which make up the pre-configured Acceptable Use Policy service group EXCEPT:

A. Deny Spoofing
B. Permit Legacy Protocols
C. Limit Exposure to DoS attacks
D. Protocol Priority Access Control

Answer:  B

Question 8.
After configuration changes have been made in NetSight Atlas Policy Manager, what must be done before the changes take effect on the devices?

A. The NMS must be rebooted
B. The changes must be enforced
C. The changes must be verified
D. Nothing the changes take effect immediately

Answer:  B

Question 9.
In the three-level policy model, Enterasys maps:

A. The business/network level to classification rules
B. The service-provisioning level to roles
C. The device level to classification rules
D. All of the above

Answer:  C

Question 10.
The Active Edge consists of:

A. Policy-enabled switches
B. Core routers
C. SAP servers
D. User resources

Answer:  A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.