|
Question 1. How does TimeFinder/Snap save disk space while providing full access to the original data on the snapshot copy? A. It only copies the data track that is read to the snapshot B. It creates pointers to the original data C. It compresses the original data before making the snapshot D. It compresses the original data after making the snapshot Answer: B Question 2. How is free space in the CLARiiON write cache maintained? A. Low watermark flushing is suspended during write operations B. The cache is automatically flushed every 90 minutes C. The cache is flushed to the drives during I/O bursts and only the least-recently used pages are flushed D. Low watermark flushing is suspended during read operations Answer: C Question 3. Which of the following recovery methods is used after a Data Mover failover? A. Automatic B. EMC support C. Manual D. Retry Answer: C Question 4. What does NDMP represent? A. Network Data Management Protocol B. Network Data Mirroring Protocol C. Network Duplex Migration Policy D. Network Duplication Mirror Policy Answer: A Question 5. Which of the following is optional when using Synchronous MirrorView? A. write intent log B. event error log C. fracture log D. connection log Answer: A Question 6. Which of the following protocols uses TCP/IP to tunnel Fibre Channel frames? A. FCP B. FCIP C. CIFS D. iSCSI Answer: B Question 7. Which of the following is the correct sequence for starting a Control Center component? A. Repository, Server, Store B. Server, Repository, Store C. Repository, Store, Server D. Store, Server, Repository Answer: A Question 8. Which of the following Symmetrix system uses a two bus architecture that is referred to as an "X" and a "Y" bus? A. Symmetrix 5.0 LVD B. Symmetrix 4.8 C. Symmetrix 5.0 D. Symmetrix DMX Answer: B Question 9. Which of the following statements is true? A. SRDF/Automated Replication provides a copy on the Target (R2) device, which will be at most one write behind for each Source (R1) device B. SRDF/Automated Replication provides a copy on the Target (R2) device, up to the last committed transaction C. SRDF/Automated Replication provides a copy of the data on the Target (R2) device, which will be several minutes to hours behind the Source D. SRDF/Automated Replication provides a copy on the Target (R2) device, that will be a few seconds to a few minutes behind the Source Answer: C Question 10. Which of the following series of switches can you use EMC Connectrix Manager to manage? A. M-Series B. MDS-Series C. Q-Series D. B-Series Answer: A
|
Question 1. Which file will users require read and write permissions for both UNIX and Windows? A. ACCOUNT DIRECTORY B. VOC C. BP D. CTLG Answer: B Question 2. You want to restrict the use of some UniData ECL commands to users that have administrator privileges. You have set UDT.OPTIONS 19 to "ON". Which action is needed to restrict the ECL commands to administrator users? A. Delete the catalog pointer for the command you want to restrict. B. Make the VOC read only. C. Delete the command you want to restrict. D. Add an entry in the privilege file. Answer: C Question 3. Which UniData configuration variable can administrators use to prohibit updates to the VOC file of any account? A. VOC_READONLY B. VOC_RESTRICT C. VOC_NOUPDATE D. VOC_NOWRITE Answer: A Question 4. You want to ensure that the user will not get to the ECL prompt if the application aborts. Which command will allow you to specify a program to execute when an abort occurs? A. AT.ABORT B. ON.ABORT C. ON.ERROR D. AT.ERROR Answer: B Question 5. Using the UniAdmin Generate Certificate Request wizard, what are the correct steps for generating an SSL certificate request? A. Request Properties > Key Pairs Selections > Key File > Password > Finish. B. Request File Name > Request Properties > Key File Indexes > Key File > Password > Finish. C. Request File Name > Request Properties > Key Pairs Selections > Key File > Password > Finish. D. Request Properties > Request File Name > Key Pairs Selections > Password > Finish. Answer: C Question 6. After preparing the UniData database account for access through UniData ODBC, JDBC, and UniOLEDB, which method should you use to confirm connectivity from a Windows client? A. Execute a telnet connection to the UniData server and successfully login to the server. B. From the Windows command prompt run a ping command to verify the server IP address. C. Use VSG to connect to the UniData server/database account. D. Run a CONNECT command from the Basic Call Interface (BCI). Answer: C Question 7. Which mechanism controls which U2 accounts are seen on the XML/DB Tool once connected to a server? A. filter in XML/DB Tool B. permissions on the client C. permissions on XML/DB Tool D. SQL catalog Answer: A Question 8. To test a Visual Schema Generator (VSG) connection, a database name can be used that is defined in which file? A. vsg_config B. udt_data C. vsg_connect D. ud_database Answer: D Question 9. Within VSG, how would you activate logging? A. Click Tools > Options > Settings, and then you choose the log files and number of views. B. Click Options > Settings, and then choose the number of entries you wish retain. C. Click Options > Settings, and then choose the log files and number of views. D. Click Tools > Options, and then choose the number of entries you wish to retain. Answer: C Question 10. When using the XML/DB Tool, if a DTD or XML Schema file does not already exist, you must create it. Which two can be used to create DTD or XML Schema files? (Choose two.) A. UniData SQL B. UDODBC C. UniAdmin D. UniQuery E. UniDK Answer: A, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.