|
Question 1. Which restore option can you use if you restore only *.pdf files? A. restore from media B. restore by query C. restore only D. restore by type Answer: B Question 2. Which command can be used to check if the inet service is up and running on a member of the Data Protector cell? A. omnisv -status B. omni stat C. telnet5555 D. arp -a Answer: C Question 3. A tape library with two drives is connected to two hosts (host A and host B) using SCSI. Each host is accessing one drive through a dedicated SCSI connection. Host B also has access to the robotics interface. Which statement is true in this configuration? A. Both hosts A and B will require a "direct library" configuration to allow shared network control of the robotics. B. Host A will need the media agent to control the robotics and perform all library operations for the local drive. C. This configuration is not possible in a SCSI environment because all hosts need physical access to the robotics controller. D. Host B will need the media agent to control the robotics and perform all library operations. Answer: D Question 4. For any device, Data Protector issues a mount request when all the media are full upto? A. 50% B. 80% C. 95% D. 100% Answer: D Question 5. How do you enable execution tracing for the GUI on HP-UX and write the results into files with the extension trace.out? A. xtrace -trace 1-99 trace.out B. xtrace -debug 1-99 trace.out C. xomni -trace 1-99 trace.out D. xomni -debug 1-99 trace.out Answer: D Question 6. Which Data Protector disaster recovery options are supported for an HP-UX client? Select Two. A. Assisted Manual Disaster Recovery B. Disk Delivery Disaster Recovery C. Manual Disaster Recovery D. Automated System Recovery E. Enhanced Automated Disaster Recovery Answer: B, C Question 7. What is the default Data Protector behavior if you have multiple hard links to the same file? A. The links are converted to soft links and backed up. B. The file is backed up only once. C. Links are not backed up. D. Each hard link is backed up as a file. Answer: B Question 8. Which media vaulting support functions are implemented in Data Protector? Select Two. A. ejection locking of non-vaulting-ready media B. display of the physical media locations C. setup of data and catalog protection policies D. vault space monitoring and reporting E. in-order delivery of vaulting-ready media Answer: B, C Question 9. How is a disk image restore performed? A. block-by-block B. directory-by-directory C. object-by-object D. file-by-file Answer: A Question 10. Which file is checked by inetd on HP-UX to prevent illegal network access within the Data Protector cell? A. /var/tmp/inet.log B. /var/adm/inetd.sec C. /etc/inetd.conf D. /sbin/init.d/inetd Answer: B Question 11. Which operating systems support One Button Disaster Recovery? Select Two. A. Windows NT B. HP-UX 11.0 C. HP-UX 11.11 D. Windows 2000 E. Solaris 9 Answer: A, D Question 12. What is included in a Logical Device configuration? Select Two. A. automated media operations B. device options C. physical device properties D. overwrite protection levels E. media pool characteristics Answer: B, C Question 13. What is the full path to the Data Protector Web reporting Java applet on a UNIX Client? A. /opt/omni/java/sbin/WbReporting.html B. /opt/omni/java/bin/WebReporting.html C. /etc/opt/omni/java/sbin/WebReporting.html D. /opt/omni/bin/java/WebReporting.htm Answer: B Question 14. Data Protector provides an event driven notification system. Which notification methods are available? Select Two. A. filter B. paging C. store to database D. broadcast E. email Answer: D, E Question 15. What should you verify if the command "omnidbutil -merge mmdb CellServer3" fails? A. that you have run the "omnidbutil -merge mmdb" command on CellServer3 B. that you have configured centralized licensing before you merge C. that you have exclusive access to the database on CellServer3 D. that no other cell can communicate with the MoM cell server Answer: C Question 16. Which Data Protector GUI context allows the supervision and administration of currently running backup and restore sessions? A. Notify B. Reporting C. View D. Monitor Answer: D Question 17. What is the minimum number of obsolete filenames that must exist on a Data Protector client to initiate purging from the internal database? A. 500,000 B. 200,000 C. 1,000,000 D. 100,000 Answer: C Question 18. When using the Restore from Media option, which configuration guideline should you consider regarding the required memory? A. number_of_files multiplied by 200 bytes B. number_of_files multiplied by 100 bytes C. number_of_directories multiplied by 200 bytes D. number_of_directories multiplied by 100 bytes Answer: A Question 19. What can Data Protector use to generate the media label during media initialization? A. media type B. serial number of the drive used for initialization C. barcode label of the media D. unique number issued by the internal database Answer: C Question 20. What are the advantages of split-mirror backups when instant recovery is enabled compared to standard backups? Select Three. A. minimal impact on applications during backup B. tape less backup capability C. more efficient restore from a session D. server less backup E. higher space efficiency due to using block level maps Answer: A, B, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.