|
Question 1. Which two design requirements would be met by implementing Net Backup Vault? (Choose two.) A. offsite tape management B. backup performance enhancement C. automated tape duplication D. automated performance data collection Answer: A, C Question 2. When configuring Net Backup 5.0 for MS SQL in a cluster environment, what must you do? A. Set alternate client permissions B. Change allowable data streams C. Reconfigure the MS SQL database to run in native mode D. Reconfigure the MS SQL database to run in native mode Answer: D Question 3. You are required to backup the OS and shared volumes of a clustered Windows client. VERITAS recommends the backup be done using A. the virtual server name only B. the virtual and local node names C. both local node names D. only one of the local node names Answer: B Question 4. You are having connectivity problems between a Net Backup client and a Net Backup Server. How do you verify that the two are connecting? A. bpping from the client to the server B. bpping from the server to the client and from the client to the server C. ping from the server to the client D. ping from the server to the client and from the client to the server Answer: D Question 5. You are designing a data protection solution for an environment containing several Web servers. These Web servers must be completely recoverable in the case of a disaster. Which factor must be considered when determining what to protect in the backup policies? A. the type of clients accessing the Web servers B. round robin DNS resolution for the Web servers C. off-host databases referenced by the Web servers D. the operating System patch level of the Web servers Answer: C Question 6. Which VERITAS product could you use to make your Net Backup 5.0 master server highly available? A. Cluster Server (VCS) B. Volume Replicator (VVR) C. Blat Cluster Service (VBCS) D. Fail Over Module (VFOM) Answer: A Question 7. You want to design a new backup infrastructure. Your main application is an Oracle database running on a Windows 2003 server. The database file systems are mounted from a Network Appliance filer. Which product will achieve a hot backup of the database without the need for any additional database disk space? A. Database Edition for Oracle B. Block Level Incremental Backup C. Net Backup for NDMP D. Net Backup for Oracle Answer: D Question 8. Which three tasks do you include when testing a new Net Backup 5.0 Enterprise Server environment? (Choose three.) A. perform network intrusion scan B. perform client restores C. perform client backups D. perform robotic inventory Answer: B, C, D Question 9. You are required to backup a Network Appliance filer running ONTAP version 6.5. There are no tape devices available to the filer. Which can be configured to allow you to backup data on the filer? A. the Net Backup for Windows client B. the Net Backup for UNIX client C. the Net Backup VSP provider D. the NDMP option Answer: D Question 10. You are tasked to monitor several Net Backup 5.0 domains that are spread across many sites. You want to have a centralized view of all of your Net Backup 5.0 domains in a single interface. What provides this functionality? A. Net Backup Domain Manager B. Global Data Manager C. Net Backup Site Manager D. Global Site Manager Answer: B Question 11. What is required for Shared Storage Option installation? A. Fibre Channel connections for all tape devices to be shared B. a robot SCSI connection to all participating Net Backup media servers C. 1-gigabit Ethernet communication between all participating Net Backup servers D. A SSO license key on the Net Backup master server and on all participating Net Backup media servers Answer: D Question 12. Which two methods determine the patch level of a client? (Choose two.) A. Run the support script in the goodies directory on the master server B. Select Help > About from the backup, Archive, and Restore interface on the client C. Select Help > About from the Net Backup Administration Console on the media server D. Select Help > About from the Net Backup Administration Console on the master server Answer: A, B Question 13. A moderately used database server must be configured as a Net Backup client. The database application is custom built and is not covered by a Net Backup database agent. Backups must be performed quickly and open files need to be backed up. In addition, the ability to restore individual files from backup is required. Which of the following backup methods would best fit this scenario? A. Copy-on-write snapshot B. Mirror snapshot C. Flash backup D. True Image Restore enabled backup Answer: C Question 14. The master server host properties option "Free Browse" in the "General" tab will allow ________. A. accounts without local Administrator privileges on the master server to view Net Backup configuration settings B. any Net Backup client to view Net Backup configuration settings C. designated Net Backup clients to view images from scheduled backups D. the Net Backup master server to browse remote file systems when creating a file list for a policy Answer: C Question 15. Which three conditions must be met for Synthetic backups? (Choose three.) A. The policy type must be configured as "Standard" or "Ms_windows-NT" B. The policy must have "Collect true image restore information" and "with move detection" selected C. The master server, media server and clients involved must be running Net Backup version 3.4 or higher D. The schedule created for the synthetic backup must have the "Synthetic Backup" option selected Answer: A, B, D
|
Question 1. The following code shows the remote interface for a Travel Agent Bean: 1. package travlagent; 2. import Java.rmi.*; 3. 4. public interface TravelAgent exterds ETRObject. P 5. 6. public String getCustomer Destination () throws Remote Exception; 7. public String get Customer Flight () throws Remote Exception; 8. public String getCarRental () throws Remote Except_on: 9. public String get Customer Hotel () throws Remote Exception; 10. } Which statement is true of the remote interface? A. The remote interface will compile as expected and is a valid remote interface that may be used as an intermediate object for the TravelAGentBean. B. The remote interface will compile as expected but will not be a valid remote interface for the TravelAgentBean when compiled at deployment. C. The remote interface will not compile due to an error at line 5. D. The remote interface will not compile due to an error at line 4. Answer: Question 2. Which code performs a look-up of an enterprise bean's String environment property named app Env? A. Context ctx = new InitialContext (); Context beanEnv = (Context ctx. Lookup ("Java:prop/env"); String the Property = (String) ctx. Lookup ("beanEv.appEnv"); B. Context ctx = new InitialContext(); Context beanEnv= (context ctx.lookup("java:comp/env"); String the Property = (String) beanEnv.lookup ("appEnv"); C. Context ctx - new InitialContext(); Context beanEnv = (Context) ctx.lookup ("java:comp/env"); String theProperty = beanEnv. lockup ("appEnv"); Answer: Question 3. Which statement correctly describes the mechanism by which enterprise beans are instantiated? A. Enterprise beans are instantiated by calling a create () method on the bean's remote interface using a reference to the bean's home interface. Each create () method has a corresponding ejbCreate () method in the bean's home interface. B. Enterprise beans are instantiated by calling a create () method on the bean's remote interface using a reference to the bean's home interface. Each create () method has a corresponding ejbCreat () method in the bean's remote interface. C. Enterprise beans are instantiated by calling a create () method on the bean's home interface using a reference to the bean's remote interface. Each create () method has a corresponding ejbCreate () method in the bean's remote interface. D. Enterprise beans are instantiated by calling a create () method on the bean's home nterface using a reference to the bean's remote interface. Each create () method has a corresponding ejbCreate () method in the bean's home interface. Answer: Question 4. Consider the following four activities occur during a typical interaction between a client and an enterprise bean: 1. A reference to an EJB home object is returned to the client. 2. A reference to the EJB object is retuned to the client. 3. JNDI is used to acquire a reference to an enterprise bean's home object. 4. The client requests the bean's home object to create or find an enterprise bean. Which choice lists the correct order in which these activites occur during a typical interaction between a client and an EJB? A. 3, 2, 4, 1 B. 4, 3, 1, 2 C. 3, 1, 4, 2 D. 4, 3, 2, 1 Answer: Question 5. What is the superclass for system exceptions in an enterprise bean? A. java.lang.RuntimeException B. javax.ejb.EJBException C. java.rmi.RemoteException D. javax.ejb.CreateException Answer: Question 6. Which code demonstrates the proper method for using a resource factory reference named j dbc/MyDB in an enterprise bean? A. Context ctx = new InitialContext (); DataSource dtasrc = (Data Source) ctx.lookup ("java:prop/cnv/jdbc/MyDB"); B. Context ctx = new InitialContext (); Data Source dtasrc = Ctx.lookup ("java:comp/env/jdbc/MyDB:); C. Context ctx = new initialContext(); Data Source dtasrc = (Data Source) ctx. Lookup ("java:comp/env/jdbc/MyDB"); D. Context ctx = new initialContext(); Data Source dtasrc = Ctx.lookup("java:prop/env/jdbc/MyDB")' Answer: Question 7. An EJB client invokes a create () method. An EJB container instantiates an enterprise bean as the result of this method call. The bean is then held in a pool awaiting a method invocation. To which type of enterprise bean does this process refer? A. BMP entity bean B. CMP entity bean C. Stateless session bean D. Stateful session bean Answer: Question 8. You need to perform the look-up of the home object for an enterprise bean named TravelAgentBean and then create a reference to that object. You then need to call the proper method to instantiate the TravelAgentBean. The appropriate arguments for the InitialContext constructor are held in a Hashtable named srvrProps. Which code demonstrates this look-up and bean instantiation? A. Try | Context ini_Ctx = new IritialContext (srvPrcps); Object homeRef = initCtx. Lookup ("TravelAgentBeanJNDIName"); TravelAGentHome tah - tah.create (); } Catch (Exception e) { // code for exception B. try { Context initCtx = new Iritial Context (srvrPrcps); Object noneRef = initCtx.lookup! ("TravelAgentDeanJND=Name"); TravelAgentHome tan = (TravelAGentHome) PortableRemoteObject.narrow (homeRef, TravelAgentRemote.class); TravelAgent to = (TravelAgent, tah.create (); } Catch (Exception e) { //code for exception ) C. try: Context initCtx = new InitialContext (srvrProps); Object homeRef = initCtx.lookup ("TravelAgentBeanJNDIName"); TravelAGentHome tah = (TravelAgentHome) PortableRemoteObject.narrow (homeRef, TravelAgentHome.class); TravelAgent ta = tah.bCreate (); ) Catch (Exception e ) { / / code tor exception } D. Try: Context initctx - new InitialContext (srvrProps); Object homeRef = initCtx.lcckup ("TravelAgentBean JNDIName"); TravelAgentHome tah = (TravelAgentHome) ProtableRemoteObject.narrow (homeRef, TravelAgentHome.class); TravelAGent ta - tah.create (); } catch (Exception e) { / / code for exception } Answer: Question 9. Which statement lists the benefits of using container-managed persistence for entity beans? A. The bean developer must write less code; database operation optimization methods can be implemented; and bean code is more portable. B. Gugs are easier to find in container-generated code; bean developers can focus on business logic; and the container will require fewer resources when using CMP. C. Database connection calls are managed by the bean developer, CMP may reduce the number of bugs in bean code; and container-generated custom finder methods can be used. D The container provided mapping tools to map entity bean fields to a relation 's columns; EJB servers that provide high-end CMP services are less expensive; and CMP can support complex SQL JOIN operations. Answer: Question 10. Consider the following IDL definition: 1. module Account 2. { 3. Interface account 4. { 5. long accountNumber; 6. float balance; 7. }; 8. 9. interface accountFacucry 10. { 11. Account getAccount (in Long accountNumber) throws (AccountNotFound); 12. string message; 13. }; 14. 15. Account getAccoun (in Long accountNumber) throws (AccountNotFound); 16. }; 17. }; Which statement correctly describes this IDL definition? A. The IDL definition properly defines a factory object that may be used to obtain a reference to an Account object. B. The IDL definition cannot be compiled due to an error at line 15. C. The IDL definition cannot be compiled due to an error at line 11. D. The IDL definition cannot be compiled due to an error at line 5. Answer:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.