|
Question 1. Which NetWorker software must be installed on a host backed up using a NetWorker module? A. Storage Node B. Server C. Management Console D. Client Answer: D Question 2. Which statement is true about Celerra Replicator? A. Is a pointer based view of a Production File System B. Is a point-in-time copy of a Production File System C. Is implemented over campus distances only D. Is bi-directional Answer: B Question 3. What is a function of NetWorker? A. Create replicas of mission-critical information on disk arrays B. Manage capacity of front-end storage devices C. Centralize and automate backup and recovery D. Enable failover to remote servers Answer: C Question 4. What is the purpose of a backup? A. Prevent unauthorized access of data B. Prevent data corruption C. Restore the original data in the event of data loss D. Allow multiple, simultaneous access of data Answer: C Question 5. Replication Manager provides which additional capability over Replication Manager/SE? A. Mount multiple replicas on the same mount host B. Mount replicas to alternate hosts C. Support Symmetrix arrays with TimeFinder D. Store replicas on remote arrays using SAN Copy Answer: C Question 6. What is the first step in a snapshot operation performed by a NetWorker Module? A. Freeze application B. Shut down application C. Take snapshot D. Flush buffers Answer: A Question 7. Which operating systems are supported in Replication Manager? A. Windows 2000, Windows 2003, Solaris, RedHat Linux, AS400 B. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX, AS400 C. Windows 2000, Windows 2003, Windows XP D. Windows 2000, Windows 2003, Solaris, RedHat/SUSE Linux, HP-UX, AIX Answer: D Question 8. Which NetWorker Modules use snapshot technology? A. OraSnap and PowerSnap B. MicroSnap and SnapImage C. OraSnap and MicroSnap D. PowerSnap and SnapImage Answer: D Question 9. You wish to create a consistent backup of a changing file system on an EMC CLARiiON. Which NetWorker Module is used? A. SnapImage B. PowerSnap C. SnapView D. SnapCL Answer: B Question 10. Which NetWorker resource is used to determine the backup level for a client? A. Schedule B. Client C. Pool D. Group Answer: A Question 11. Which type of backup is performed for regulatory compliance? A. Disaster Recovery B. Archive C. Cumulative D. Differential Answer: B Question 12. A file system contains seven 1 gigabyte files. Each day of the week, a different file changes. Which backup strategy will minimize the overall time that it takes to do a recovery of the file system on Friday? A. Full backup on Saturday and incremental backups on all other days B. Full backup on Saturday, cumulative backup on Wednesday and incremental backups on all other days C. Full backup on Saturday and Tuesday, incremental backups on all other days D. Full backup on Saturday, cumulative backups on all other days Answer: D Question 13. How many NetWorker ClientPak licenses are required in the data zone displayed in the exhibit? Click on the exhibit button below. Exhibit: A. 4 B. 5 C. 1 D. 2 Answer: D Question 14. A user asks to have a corrupted file restored. Which type of backup satisfies this request? A. Operational B. Archival C. Disaster Recovery D. Regulatory Answer: A Question 15. You wish to backup all data regardless of when it was last backed up. What type of backup is used? A. Full B. Cumulative C. Incremental D. Differential Answer: A
|
Question 1. Authentication is used in Secure Application Provisioning to: A. Quarantine malicious traffic B. Persistently apply policy C. Allow configuration of a switch's host data port D. provide additional network access Answer: D Question 2. Saving a NetSight Atlas Policy Manager configuration to a .pmd file: A. Writes the configuration to NVRAM on the switches B. Allows for multiple configurations to be stored on the NMS C. Notifies the RADIUS server that new policies have been created D. Temporarily disables communication between all RADIUS clients until the save is complete Answer: B Question 3. Certificate services must be installed when using: A. EAP-TLS B. EAP-MD5 C. PWA D. MAC authentication Answer: A Question 4. Persistent policy assignment: A. Can be effective in an incremental deployment of acceptable use policy B. Is dependent upon a RADIUS back-end configuration C. Is deployed based on user authentication D. Cannot be used on uplink ports Answer: A Question 5. A distinguishing characteristic of PEAP is: A. It adds security by running over a VPN tunnel B. It uses salt encryption C. It requires that only the supplicant present a certificate D. It creates keying material using the Pseudo-Random Function Answer: D Question 6. In the Enterasys policy-enabled network model, on-demand policy assignment: A. Is the result of a manual configuration B. Makes use of the Filter-ID parameter C. Is overridden by a ports default role D. Requires the use of 802.1X authentication mechanisms Answer: B Question 7. All of the following are services which make up the pre-configured Acceptable Use Policy service group EXCEPT: A. Deny Spoofing B. Permit Legacy Protocols C. Limit Exposure to DoS attacks D. Protocol Priority Access Control Answer: B Question 8. After configuration changes have been made in NetSight Atlas Policy Manager, what must be done before the changes take effect on the devices? A. The NMS must be rebooted B. The changes must be enforced C. The changes must be verified D. Nothing the changes take effect immediately Answer: B Question 9. In the three-level policy model, Enterasys maps: A. The business/network level to classification rules B. The service-provisioning level to roles C. The device level to classification rules D. All of the above Answer: C Question 10. The Active Edge consists of: A. Policy-enabled switches B. Core routers C. SAP servers D. User resources Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.