Data Protector 5.5 Basics for Windows
Exam Questions, Answers,
Many thanks to all
the dumpers, who submit their dumps on this site.
Please submit more dumps, in order to provide more
help to the others. Here's my contribution.
You are going to perform an "eject" Logical
Device Operation for a tape residing in a library.
When will this operation fail?
A. if all drives are busy
B. if the mailslot is full
C. if the media is in a free pool
D. if the media is protected
You are running Data Protector through a firewall.
The Cell Manager is installed in the intranet. Which
configuration is supported?
A. the Cell Console located within the DMZ
B. the Manager of Managers Console located within
C. the Disk Agent located within the DMZ
D. the Disk Agent located within the DMZ and the Media
Agent located within the intranet
By default, which user right is granted to the group
B. Start Backup
C. Start Restore
D. Media Configuration
Data Protector provides an event driven notification
system. Which notification methods are available?
E. store to database
Which backups are supported by Data Protector? Select
A. Virtual backup
B. NDMP backup
C. Direct SAN backup
D. Split media backup
E. Online application backup
If you experience problems with tape library devices,
which Data Protector command can be used to check
the library operations?
During initial installation, which tool helps predict
future Data Protector internal database (IDB) size?
A. capacity forecast report
B. media management report
C. capacity planning spreadsheet
D. database growth calculator
When performing media operations with Data Protector,
the process of faulting is used as a further means
of protection. What is the purpose of faulting locations?
A. to provide information about the media condition
B. to provide information about all media currently
mounted to tape drives
C. to provide additional information about the media
location within a tape library
D. to provide additional information about the off-site
location of media exported from a library
What may happen if Data Protector CANNOT find a protected
version of the object on which the incremental backup
is to be based?
A. The backup will fail.
B. A mount request will be issued.
C. Data Protector will start a full backup.
D. Data Protector will continue with incremental 1.
Which information about SAN devices can Data Protector
store internally to enable automatic discovery of
changed SCSI addresses and avoid Windows device persistency
C. SCSI ID
D. serial number