|
Question 1. The system volumes are being backed up twice a week Data volumes are backed up four times a day CDP is used for critical data only Data change rate is 1-3% daily Data is kept for three months Compressible data will only be compressed at the disaster recovery site What is an appropriate amount of disk space to start with in the repository? A. half the disk space available B. the same size as the protected data space C. three to five times the protected data space D. one and a half times the protected data space Answer: C Question 2. A customer wants to back up three Microsoft Exchange servers with IBM Tivoli Storage Manager FastBack (TSM FastBack), but does not have a requirement to use individual item restore of items in any of their Microsoft Exchange servers. Each Microsoft Exchange server has four cores and they will all back up to the same TSM FastBack server. The TSM FastBack server also has four cores. In this configuration, what are the minimum TSM FastBack products required by the customer? A. The customer will need a TSMFastBack server, and three TSM FastBack clients. B. The customer will only need TSMFastBack for Exchange, and TSM FastBack server. C. The customer will need TSMFastBack for Exchange for use on the TSM FastBack server. D. The customer will need TSMFastBack for Exchange, and TSM FastBack Disaster Recovery. Answer: A Question 3. What is the last step to be taken for a dissimilar hardware bare machine recovery (BMR)? A. erase theFastBack.conf file location in boot drive root directory B. reboot the target server after restoring with the BMR Recovery CD C. restart the IBM Tivoli Storage Manager FastBack Manager task with the active flag D. change the host name from IBM Tivoli Storage ManagerFastBack BMR to the source system host name Answer: B Question 4. When performing an e-mail restore using Simple Mail Transfer Protocol (SMTP), why is there a prompt to provide a sender e-mail address? A. The restore will fail if the address is not included. B. A reference point for the source is always required in order to send the e-mail. C. The e-mail address for the sender is identified as the source address for any restored e-mail messages. D. Some SMTP servers require a valid sender e-mail address to authenticate the user and accept the e-mail. Answer: D Question 5. How can the configuration of the FTP Server be tested? A. Use the IBM Tivoli Storage ManagerFastBack Client Configurator to force an immediate data replication operation. B. Use IBM Tivoli Storage ManagerFastBack Mount to schedule a near-term replication operation, then attempt to mount the replicated volume. C. Launch the IBM Tivoli Storage ManagerFastBack Manager interface, access the DR Configuration tab, and click the Test Configuration button. D. Open a command prompt on the Disaster Recovery (DR) Hub Server and attempt to use FTP to connect to the IBM Tivoli Storage ManagerFastBack Server. Answer: C Question 6. An IBM Tivoli Storage Manager FastBack (TSM FastBack) protected server (\\Server_27.mycompany.com, 192.168.0.20) has suffered a hardware failure of the primary operating system drive. A similar replacement drive is found and installed. A Bare Machine Recovery (BMR) CD has been created and tested on this server prior to the failure. The TSM FastBack server is named Austin_FB and has an IP address of 192.168.0.55. Now it is time to start the restore of the system OS drive. The administrator enters the name of the repository share as \\Austin_FB\FB_REP_E and OK. An error message is returned that \\Austin_FB\FB_REP_E is not a valid repository. The administrator re-enters the repository share as \\192.168.0.55\FB_REP_E and connects. What is the problem? A. The Repository share was wrong. B. The CD was bad and should be re-built. C. The BMR client requires all repository locations to be entered with their IP address. D. The DNS name was not resolved. Check the DNS IP address as entering the BMR client. Answer: D Question 7. Which information is displayed when right-clicking the snapshot in the Snapshots Monitor display and choosing events for a specific job? A. only failed jobs and their status B. start times and estimated duration C. every event that occurs while the job is in progress D. whether any unusual events have occurred while the job is in progress Answer: D Question 8. Which two options describe Microsoft Exchange data restore levels? (Choose two.) A. File B. Block C. Subfile D. Mailbox E. Message Answer: D, E Question 9. How is a disk removed from the IBM Tivoli Storage Manager FastBack (TSM FastBack) repository? A. A disk cannot be removed from the repository once it has been used. B. Stop TSMFastBack server, move the repository files to another disk, update the TSM FastBack configuration file, and restart the TSM FastBack server. C. Select Remove from repository (with snapshot relocation) using the TSMFastBack Server Manager tool, and the server will move the files in the repository automatically. D. Select Remove from repository (with snapshot relocation) using the TSMFastBack Server Manager tool, stop TSM FastBack Server, move the repository files to another disk, and restart TSM FastBack server. Answer: C Question 10. Each snapshot has an icon showing its present status. Which information can be obtained by simply viewing the icon next to the snapshot? A. Snapshot is cancelled. B. Repository out of space condition exists. C. Continuous Data Protection process is pending. D. Continuous Data Protection Snapshot has completed successfully. Answer: D
|
Question 1. What are three functions of the BlackBerry Policy Service? (Choose three.) A. Sends a set of rules that configures BlackBerry device security features B. Polls for applications that are installed on the BlackBerry device C. Compresses and encrypts data to and from the BlackBerry device D. Sends service books that configure BlackBerry device functionality E. Synchronizes any custom security settings on the BlackBerry device Answer: A, B, D Question 2. A system administrator wants to wirelessly deploy a third-party application to multiple BlackBerry devices while providing the BlackBerry device users with the ability to remove the software at a later time. What must the disposition of the assigned application control policy be set to, in order to accomplish this? (Choose one.) A. Required B. Optional C. Disallowed D. Prompt E. Available Answer: B Question 3. When setting up a software configuration, the Configuration Status field shows Unknown Configuration for a specific BlackBerry device user account. Which statement is true? (Choose one.) A. The BlackBerry Enterprise Server has not polled the BlackBerry Configuration Database for which applications need to be installed/removed on the BlackBerry device. B. The user has not yet been assigned to a software configuration. C. The delivery method within the software configuration for this application has not yet been set. D. The Disallow Third-Party Downloads IT policy has been set to True. E. The Applications directory needs to be indexed so the software configuration status can be updated to reflect the current applications that need to be installed or removed. Answer: A Question 4. A company utilizing a segmented network, installs the BlackBerry Attachment Server on its own server in a separate segment from the BlackBerry Enterprise Server. With which component would the BlackBerry Attachment Server be unable to communicate if it was installed in a different segment of the network? (Choose one.) A. Microsoft Exchange Server B. Microsoft SQL Server C. BlackBerry Messaging Agent D. BlackBerry Dispatcher E. BlackBerry Controller Answer: C Question 5. A new BlackBerry device user is unable to perform a wireless enterprise activation because there is insufficient network coverage. The user has the BlackBerry Desktop Manager installed. When attempting to perform a wired enterprise activation, the enterprise activation is unable to initialize. Which three actions ensure the enterprise activation initializes? (Choose three.) A. Switch to a new USB port on the computer. B. Create a new MAPI profile on computer. C. Enable port 4101 on the BlackBerry Enterprise Server. D. Delete and undelete the Desktop [SYNC] service book on the BlackBerry device. E. Uninstall and reinstall the BlackBerry Desktop Manager software on the computer. Answer: A, B, C Question 6. A company utilizing a segmented network structure recently installed the BlackBerry Collaboration Service, configured it to use the TLS protocol for Microsoft Windows Messenger on its own server, and placed it in a network segment from the Microsoft Live Communications Server. Which port must be open on the internal firewall to allow TLS traffic? (Choose one.) A. 5061 B. 5060 C. 443 D. 8443 E. 1533 Answer: A Question 7. A PIN message is sent from the BlackBerry device and a letter D is displayed above the checkmark beside the message in the message list. What does this indicate about the status of the message? (Choose one.) A. It is delayed. B. It is denied. C. It is delivered. D. It is deleted. E. It is dropped. Answer: C Question 8. A company needs to reduce the load on the Microsoft SQL Server hosting the BlackBerryConfiguration Database. Which component can be configured to reduce the number of queries made by the BlackBerry Enterprise Server to the database? (Choose one.) A. Microsoft SQL Query Analyzer B. BlackBerry Manager C. Database Notification System D. Database Replication System E. Microsoft SQL Server Agent Answer: C Question 9. What option can be disabled to restrict Microsoft Excel attachments only for the BlackBerry Attachment Service? (Choose one.) A. The attachment type using the BlackBerry Server Configuration utility B. The attachment type using an IT policy setting in the BlackBerry Manager C. Attachment viewing through the BlackBerry device user properties on the BlackBerry Manager D. The attachment type using the BlackBerry Resource Kit E. The BlackBerry Attachment Service through Microsoft Windows services Answer: A Question 10. Which type of database replication is supported in the BlackBerry Enterprise Solution? (Choose one.) A. Transactional B. Analytical processing C. Merge D. Snapshot E. Architectural Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.