E Number: E Passing Score: 800 Time Limit: 120 min
|
|
- Cordelia Moore
- 8 years ago
- Views:
Transcription
1 E Number: E Passing Score: 800 Time Limit: 120 min
2 Exam A QUESTION 1 Which statement defines retention period? A. Amount of time available for restoring a particular version of a backup dataset B. Amount of time available for overwriting a volume containing backups C. Period of time in which a backup must be restored D. Amount of time allocated for full system recovery /Reference: QUESTION 2 Which type of backup only copies the files that have changed since the last full backup? A. Cumulative B. Full C. Incremental D. Synthetic full /Reference: QUESTION 3 Which type of backup should be used to create a backup copy offline without disrupting I/O operations on a production volume? A. Cumulative backup B. Incremental backup C. Full backup D. Synthetic full backup Correct Answer: D /Reference: QUESTION 4 What is the interval of time between the creation and expiration of the backup called? A. Retention period B. Recovery point objective (RPO) C. Recovery time objective (RTO) D. Backup window
3 /Reference: QUESTION 5 What is the primary reason for having disaster recovery backups? A. To restore data from an alternate site due to data loss at a primary site B. To restore data when data loss or logical corruptions occur during routine processing C. To restore data that was archived for regulatory compliance D. To restore data when data loss occurs due to minor hardware component failures /Reference: QUESTION 6 What is recovery point objective? A. Maximum allowable time to fully recover an application 1 / 27 B. Actual time that it takes to recover all data C. Amount of data loss that is acceptable by the business D. Length of time that backups are kept for recovery purposes Correct Answer: C /Reference: QUESTION 7 A customer has a requirement to restore operations within two hours after a disaster. What is this time period called? A. Recovery time objective (RTO) B. Retention period C. Recovery point objective (RPO) D. Backup window
4 /Reference: QUESTION 8 A full backup of a file system is performed once a week on Saturday and cumulative backups are performed on all other days. Backups start at 20:00 with a two-hour window. Data on the file system changes every day. How many backups are required to perform a full system restore as of Friday morning? A. 2 B. 6 C. 1 D. 7 /Reference: QUESTION 9 A customer is moving data from a backup disk to tape, which will later will be stored offsite. What is this process called? A. Cloning B. Staging C. Aging D. Mirroring Correct Answer: B /Reference: QUESTION 10 You are planning the staging policy for disk-to-offsite tape backup media. In addition to available disk space, which factor is most significant when determining how long to keep the backup data on disk? A. Length of time when most restore requests are expected to occur B. Location of offsite storage C. Cost of shipping and storing tapes D. Tape capacity /Reference:
5 QUESTION / 27 A business has a recovery point objective (RPO) of nine hours. What does this RPO mean in the event of a disaster? A. No more than nine hours of production data can be lost B. Restore from backup must occur within nine hours C. Production must be resumed within nine hours D. A backup copy of the production data must be obtained within nine hours /Reference: QUESTION 12 What is the process of moving data from one storage medium to another? A. Cloning B. Replication C. Staging D. Twinning Correct Answer: C /Reference: QUESTION 13 Which software component of a backup application sends media metadata to the backup server? A. Storage node B. Client C. NetWorker Management Console D. Application server /Reference: QUESTION 14 What is the role of the storage node in a client/server backup architecture? A. Writes data to a backup device B. Gathers data to be backed up
6 C. Manages the backup operation D. Writes metadata to the backup catalog /Reference: QUESTION 15 What is a benefit of deploying a separate storage node in the backup environment? A. Reduced number of backups B. Increased media utilization C. Improved security and access control D. Consolidate backup servers Correct Answer: D /Reference: QUESTION 16 What terminology is used to describe grouping several physical drives into one logical drive? A. Concatenation B. Partitioning 3 / 27 C. Formatting D. Grouping /Reference: QUESTION 17 What are the components of a Logical Volume Manager (LVM)? A. Physical volumes, volume groups, logical volumes B. Physical groups, volume groups, logical volumes C. Physical groups, volume groups, logical groups D. Physical blocks, volume groups, logical groups /Reference:
7 QUESTION 18 What is an example of a PCI connection? A. Parallel interface between a disk and the controller card B. Interconnection between a CPU and network card C. Serial connection between a disk and the controller card D. Interconnection between a tape drive and a computer Correct Answer: B /Reference: QUESTION 19 Which disk connectivity option supports the highest data transfer rate? A. SATA B. SCSI C. IDE D. ATA /Reference: QUESTION 20 What is the fault tolerance of a RAID 5 array, where n is the number of disks in the array? A. 1 B. n-1 C. 2 D. n-2 /Reference: QUESTION 21 Which RAID level combines data redundancy, performance and shorter rebuild times? A. RAID 6 B. RAID 1 C. RAID 1+0 D. RAID 0+1
8 Correct Answer: C /Reference: 4 / 27 QUESTION 22 What is a characteristic of RAID 6? A. Block-level striping with double distributed parity B. Block-level striping with distributed parity C. Block-level striping with dedicated parity disk D. Byte-level striping with dedicated parity disk /Reference: QUESTION 23 Which RAID level best describes parallel access with dedicated parity? A. 3 B. 4 C. 5 D. 6 /Reference: QUESTION 24 What is the maximum fault tolerance of RAID 6, where n is the number of disks? A. n-2 B. 1 C. n-1 D. 2 Correct Answer: D /Reference: QUESTION 25 Which RAID type uses the full storage capacity of the hard disks in a RAID set?
9 A. RAID 0 B. RAID 0+1 C. RAID 1+0 D. RAID 5 /Reference: QUESTION 26 Which component can be a member of a zone? A. Nodes B. ToE card C. ISL trunks D. NIC /Reference: QUESTION 27 Which switch port type is used for the interswitch link connectivity between two FC switches? A. G_port B. E_port 5 / 27 C. N_port D. F_port Correct Answer: B /Reference: QUESTION 28 Refer to the exhibit.
10 A company is implementing a virtual tape library (VTL) appliance in their environment. The appliance is physically connected to the SAN switch in a FC-AL topology. Storage nodes are also physically connected to the SAN switch as shown. What needs to be done so that each storage node can see the appliance? A. Zone each storage node to the appliance B. Reconfigure the topology from FC-AL to FC-SW C. Configure the operating system tape drivers on the storage nodes D. Connect the backup server to the SAN switch /Reference: QUESTION 29 Refer to the exhibit. 6 / 27
11 A company is implementing a VTL appliance in their environment as shown. What can be done so that Storage Node A can see the appliance? A. Configure SAN Switches 1 and 2 on the same fabric B. Zone Storage Node A to the VTL appliance C. Configure operating system tape drivers on Storage Node A D. Add the backup server to SAN Switch 2 and configure it as a bridge /Reference: QUESTION 30 You have been tasked with providing a file-sharing and storage solution for a remote office that has an IPbased network. No IT staff are available on the site; therefore minimal administrative overhead is a must. Which technology would you recommend? A. DAS B. FC SAN C. CAS D. NAS Correct Answer: D /Reference:
12 QUESTION 31 A customer has a hybrid infrastructure composed of several UNIX and Windows servers. They are looking for a storage system that all servers can share, but will keep hardware changes to a minimum. What is your recommendation? A. NAS B. SAN C. DAS 7 / 27 D. CAS /Reference: QUESTION 32 Which are components of a NAS environment? A. NFS and IP B. NFS and zones C. CIFS and zones D. IP and WWN /Reference: QUESTION 33 A customer has a SAN-based storage system with extra storage capacity available. The customer wants to make this storage available to other hosts over the LAN. What is your recommendation? A. Integrated NAS B. NAS gateway C. NDMP 2-way D. NDMP 3-way Correct Answer: B /Reference: QUESTION 34 Which process provides increased protection of data from both logical and physical errors and reduces the exposure to data loss?
13 A. Continuous data protection B. Asynchronous replication C. Synchronous replication D. Array-based replication /Reference: QUESTION 35 In host-based replication, during the creation of a snapshot, what is the purpose of the metadata bitmap? A. To track blocks that have changed on the production source B. To indicate the exact address from which data is to be read C. To map a specific array device to a snapshot D. To locate and map the empty data blocks on a target device /Reference: QUESTION 36 What defines a point-in-time replica? A. The data on the replica that is synchronized with the production data at all times. B. A partial copy of the production data that is synchronized at some specific timestamp. C. A full copy of the production data that is synchronized at all times. D. The data in the replica that is an identical image of production at some specific timestamp. 8 / 27 Correct Answer: D /Reference: QUESTION 37 What is the primary reason for ensuring consistency of a replica in a backup environment? A. Usability B. Speed of recovery C. I/O availability D. Network latency
14 /Reference: QUESTION 38 When using array-based local replication, what component performs the replication? A. Storage system B. SAN switch C. Host system D. Network switch /Reference: QUESTION 39 How are local replication technologies classified? A. Network and storage array B. Host and storage array C. Network and CIFS D. Host and CIFS Correct Answer: B /Reference: QUESTION 40 What is a characteristic of the dependent write I/O principle? A. An application will not issue a write I/O until a prior related write I/O has completed B. An application will issue another read I/O before the prior related write I/O has completed C. An application will issue another write I/O before the prior related write I/O has completed D. An application will not issue a read I/O until a prior related write I/O has completed /Reference: QUESTION 41 A backup administrator wants to leverage the replication feature available on the storage array as an alternate source for backups. What is an advantage of this approach? A. Removes the burden on the production LUNs during backup B. Improves RPO
15 C. Enables backups to be performed without a storage node D. Decreases storage utilization /Reference: QUESTION / 27 A backup administrator wants to leverage the replication feature available on the storage array as an alternate source for backups. What is an advantage of this approach? A. Improves RPO B. Enables backups to be performed without a storage node C. Allows off-host backups to be performed D. Decreases storage utilization Correct Answer: C /Reference: QUESTION 43 Which statement best describes a file system? A. Organizes data in a structured hierarchical manner using directories B. Defines block sizes depending on data type C. Collects related records and stores them as a unit D. Establishes a consistent file-naming convention /Reference: QUESTION 44 In a backup environment, a host performs backups at the raw device level. What process would you recommend to restore a single file? A. Restore the entire raw device B. Restore a single file directly from the backup C. Restore the directory containing the file D. Partially restore the raw backup that contains the file
16 /Reference: QUESTION 45 You need to copy Oracle data from a development server running Windows to a test server running Linux. How is this done? A. Oracle online backup B. Oracle offline backup C. Linux dd command D. Database export Correct Answer: D /Reference: QUESTION 46 A customer wants to run backups for unstructured client data where the level of granularity can be sacrificed for better performance. Which method for backing up the data best fits this situation? A. Raw device dump B. Cold backup C. File copy D. Hot backup /Reference: QUESTION / 27 What is an advantage of performing a hot database backup over a cold backup? A. The database is accessible to users. B. Backups are faster. C. There is no impact on the database. D. Network bandwidth use is reduced.
17 /Reference: QUESTION 48 A customer has an existing NAS implementation that is backed up in a local two-way configuration. The customer is concerned that the attached tape drive is stopping and starting frequently during the backup. However, they see benefit in the local two-way configuration and want to keep it. Which solution would you recommend to address their concern? A. VBB B. DDS C. DAR D. NDMP2D Correct Answer: D /Reference: QUESTION 49 A customer wants to run backups where scheduling allows for shutting down the application during the backup window. Which backup method is used? A. Cold backup B. File copy C. Raw device dump D. Hot backup /Reference: QUESTION 50 What is the purpose of NDMP? A. Provides a standard protocol for backup and recovery operations of network-attached devices B. Enables components from different vendors to coexist in the same network C. Manages the flow of backup data from different host operating systems and hardware platforms D. Reduces traffic congestion on a network by controlling the data flow /Reference:
18 QUESTION 51 What describes Oracle NOARCHIVELOG mode? A. Online backup is supported B. Online backup is not supported C. Committed transactions are lost D. Online redo logs are saved for recovery Correct Answer: B /Reference: QUESTION / 27 Which Microsoft Exchange Server 2007 backup level deletes log files older than the checkpoint when the backup is complete? A. Full B. Copy C. Synthetic D. Differential /Reference: QUESTION 53 Which Microsoft Volume Shadow Copy Service component is responsible for the creation and maintenance of shadow copies? A. Provider B. Requestor C. Writer D. Backup application /Reference: QUESTION 54 In an Oracle RMAN environment, where can the Recovery Catalog be stored? A. Within the backup software catalog
19 B. Multiplexed with the backup data C. In a separate dedicated database D. In a dedicated flash recovery area Correct Answer: C /Reference: QUESTION 55 What data is transmitted on the private backup network for the NDMP 3-way backup method? A. Backup data B. Metadata C. NDMP control data D. Management data /Reference: QUESTION 56 How is recovery defined in Microsoft SQL? A. Copying data from a backup, applying logged transactions to roll it forward and bringing the database online B. Copying the transaction logs and index from backup C. Applying logged transactions to corrupted data and bringing the database online D. Copying the database from the backup /Reference: QUESTION 57 What is backed up to enable automatic recovery of Oracle transactions in the event of a database failure? 12 / 27 A. Tablespace B. Data files C. Logical database D. Online redo logs Correct Answer: D
20 /Reference: QUESTION 58 Which characteristic of a virtual infrastructure enables consolidation of multiple applications and operating systems on the same machine to provide increased server utilization? A. Partitioning B. Hardware independence C. Encapsulation D. Isolation /Reference: QUESTION 59 Which Microsoft Volume Shadow Copy Service component is responsible for freezing and thawing the application's data during the creation of snapshots? A. Writer B. Requestor C. Provider D. Backup application /Reference: QUESTION 60 What is known as a collection of Oracle background processes and shared memory used to manipulate the data? A. Database B. Instance C. RMAN D. Tablespace Correct Answer: B /Reference: QUESTION 61 In Volume Shadow Copy Service, what is the role of the I/O interceptor?
21 A. Copies data from source to virtual volume before the write to source volume is allowed B. Copies data from source to virtual volume after the write to source volume is allowed C. Leaves the source volume unchanged and writes to virtual volume D. Writes new data to both source volume and virtual volume /Reference: QUESTION 62 Which characteristic of a virtual infrastructure significantly accelerates recovery by simplifying system startup and configuration at a disaster recovery site? 13 / 27 A. Hardware independence B. Isolation C. Partitioning D. Encapsulation /Reference: QUESTION 63 Which Microsoft Exchange Server 2007 feature supports single mailbox recovery? A. Recovery Database B. Database Availability Group C. Recovery Storage Group D. Checkpoint file Correct Answer: C /Reference: QUESTION 64 Which database is used to store the location of other databases in Microsoft SQL Server? A. master B. model C. msdb D. tempdb
22 /Reference: QUESTION 65 An EMC customer environment has four ESX 4.1 servers and a vcenter Server. All servers are connected to a disk array with Fibre Channel. What is the difference between a guest-based and a VADP-based backup solution? A. VADP-based backup does not require the installation of a backup agent on a proxy host. B. Guest-based backup reduces backup traffic from the production network. C. Guest-based backup uses the Change Block Tracking feature. D. VADP-based backup reduces backup workload from ESX servers. Correct Answer: D /Reference: QUESTION 66 A customer has purchased a target-based deduplication solution from EMC to back up their production environment and replicate the data offsite. After implementing the solution and backing up data, the replication was started. However, the replication performance is not acceptable. What is the most likely cause? A. The bandwidth on the network is being exceeded. B. The file system data being replicated is highly fragmented. C. The file system data being replicated has a high compression ratio. D. The backup software is taking up the CPU resources. /Reference: QUESTION / 27 Which setting mismatch in a customer environment can result in performance degradation of the network? A. Duplex B. Flow control C. Buffer D. Frame size
23 /Reference: QUESTION 68 Laptop backups are performed during the day. The backup administrator notices that there are latency issues when host applications on the SAN are accessed. Outside of the backup window, performance is as expected. What is the most likely cause for the latency during backups? A. Buffer overflows B. Network congestion C. Duplex mismatches D. Physical link errors Correct Answer: B /Reference: QUESTION 69 Which data should be backed up on desktop and laptop clients to best manage storage capacity, backup scheduling and network bandwidth? A. User files and folders B. Operating system data C. Application program files D. VMware image files /Reference: QUESTION 70 A customer is deciding whether to implement backups to either a single centralized backup server or to individual backup servers at the remote offices. Which factor supports a decision to select a centralized backup solution? A. Deploying multiple servers increases cost and complexity. B. WAN connection bandwidth between locations is low. C. A short recovery time objective must be met. D. Remote officees are in different time zones. /Reference: QUESTION 71
24 In a backup and recovery environment, what is a benefit of sending multiple streams of backup data to physical tape? A. Improved recovery point objective B. Reduced recovery time objective C. Improved write performance 15 / 27 D. Improved read performance Correct Answer: C /Reference: QUESTION 72 A customer wants to know how much memory will be required for a storage node to provide the minimal swapping or paging during the backup process. What should be considered when deciding the amount of memory necessary for the storage node? A. Other active applications B. Available CPU resources C. Network interface frame size D. Operating systems of backup clients /Reference: QUESTION 73 Refer to the exhibit.
25 What are the labels assigned to the physical disk structure? A. A = Platter B = Sector C = Cylinder D = Track B. A = Cylinder B = Track C = Spindle D = Sector C. A = Cylinder B = Platter C = Spindle D = Track D. A = Spindle B = Sector C = Cylinder D = Track 16 / 27 Correct Answer: B /Reference: QUESTION 74 Which component identifies redundant subfile data at the source when a source-based deduplication method is used? A. Client software agent B. Deduplication node C. Backup server D. Storage node /Reference: QUESTION 75 What is a characteristic of Common Internet File System?
26 A. Uses file and record locking B. Allows multiple users to simultaneously edit files C. Loses changes to files that were open prior to interruption D. Uses a complex file-naming scheme /Reference: QUESTION 76 Which deduplication level is most effective for block-aligned data? A. Variable length B. File level C. Fixed length D. Block level Correct Answer: C /Reference: QUESTION 77 Which method will improve the factor of deduplication of the client data? A. Longer retention policy B. Less data redundancy C. Encryption at rest D. Compression method /Reference: QUESTION 78 What is a characteristic of the CIFS protocol? A. File and record locking B. Transaction logging C. NIS name resolution D. FTP data transfer
27 /Reference: QUESTION / 27 How does a backup application identify files when they reside on cloud virtual storage? A. Filename B. Inode number C. Object ID D. File metadata Correct Answer: C /Reference: QUESTION 80 How is client backup data viewed in cloud storage for backup and recovery? A. Object B. File C. Block D. Page /Reference: QUESTION 81 A backup environment has 20 GB of data with 10 percent initial commonality. The data is backed up to a targetbased deduplication system on a full, every day backup schedule. After the first backup, 5 GB of data is changed. The same data set is backed up every day. How much data is sent over the network on the first and second backups? A. 20 GB for the first backup; 20 GB for the second backup B. 20 GB for the first backup; 5 GB for the second backup C. 18 GB for the first backup; 4.5 GB for the second backup D. 18 GB for the first backup; 18 GB for the second backup /Reference: QUESTION 82
28 A customer is backing up data to a deduplication storage device. Deduplication levels are much lower than expected. What is a possible reason for this? A. Backup data has too much commonality. B. Multiplexing is being used. C. Backups are occurring too often. D. Data is being sent over IP. Correct Answer: B /Reference: QUESTION 83 Refer to the exhibit / 27 When determining disk drive performance, between which two components is the external transfer rate measured? A. HBA and interface B. Interface and buffer C. Buffer and head disk assemblly D. Interface and head disk assembly /Reference: QUESTION 84 A customer states that a majority of their restore requests are within the first few hours since a backup. They require high availability of the data for restores and a low-cost, offsite, long-term storage solution. What strategy would you suggest?
29 A. Backup to disk, then clone to tape B. Backup to tape with multiplexing C. Backup to tape without multiplexing D. Backup to tape, then clone to disk /Reference: QUESTION 85 Which component is present in a virtual tape library but not in a physical tape library? A. Drive B. Cartridge C. Emulation engine D. Slot Correct Answer: C /Reference: QUESTION 86 A backup administrator has initiated a restore from a physical tape library. Data did not begin transferring back to the storage node until a minute later. What is the most likely reason for the delay? A. The tape cartridge needs to be loaded and validated. B. The data is multiplexed on tape. C. The tape library is offline. D. The backup server must find the backup metadata. /Reference: 19 / 27 QUESTION 87 What is an advantage of source-based deduplication over target-based deduplication? A. Reduced network bandwidth requirement B. Faster replication C. Faster recovery D. Reduced client resource requirement
30 /Reference: QUESTION 88 Which data deduplication level provides the greatest granularity? A. Fixed block B. File C. Single instance D. Variable block Correct Answer: D /Reference: QUESTION 89 What is a disadvantage of using tape to store backup data? A. Longer restore time B. High cost C. Offsite storage not possible D. Parity overhead /Reference: QUESTION 90 Which factor impacts the data deduplication ratio? A. Retention policy B. Backup time C. Operating system D. Backup media /Reference: QUESTION 91 What is a characteristic of cloud technology? A. Uses location-dependent virtual resources
31 B. Acquires storage resources on demand C. Uses local, private cloud resources only D. Employs native deduplication Correct Answer: B /Reference: QUESTION 92 Which backup media characteristic allows backups and restores to run simultaneously? A. Random access B. Interleaving 20 / 27 C. Mirroring D. Multiplexing /Reference: QUESTION 93 Where does backup metadata reside when target-based deduplication technology is used? A. Backup server B. Storage node C. Backup client D. Deduplication node /Reference: QUESTION 94 Refer to the exhibit.
32 When determining disk drive performance, between which two components is the internal transfer rate measured? A. Interface and buffer B. HBA and interface C. Buffer and head disk assembly D. Interface and head disk assembly Correct Answer: C /Reference: QUESTION 95 What is the main objective of testing a recovery plan? A. Validate RTO B. Validate RPO C. Monitor disk usage D. Report backup time /Reference: QUESTION 96 A large data warehouse environment consists of millions of files spread across many systems. What is a key backup issue? A. Synchronization B. Backup retention C. Replication D. Archiving data 21 / 27 /Reference: QUESTION 97 A customer's data growth has been increasing steadily over time. The network is saturated and LAN-based tape backups are the likely cause. The backup software is NetWorker. What is your recommendation for this customer? A. Integrate Data Domain with NetWorker B. Integrate VTL with NetWorker
33 C. Integrate Avamar with NetWorker D. Upgrade NetWorker and tape devices Correct Answer: C /Reference: QUESTION 98 A customer has experienced a disaster occurring over several days. During that time, several components of critical applications remained operational while other components failed. What will have the most impact to backup and recovery operations? A. Data consistency B. Backup retention C. RTO D. RPO /Reference: QUESTION 99 A customer backup policy must meet the RPO management assigns. What backup configuration items must be considered to achieve the appropriate RPO? A. Retention periods and granularity B. Client and server parallelism C. Multiplexing and multistreaming D. Target backup devices /Reference: QUESTION 100 What is a characteristic of files once they are compressed? A. They get smaller if they are compressed again. B. They remain the same size if they are compressed again. C. They get larger if they are compressed again. D. They cannot be compressed again by the same method. Correct Answer: C
34 /Reference: QUESTION 101 After purchasing a deduplication solution a customer has had an unexpected growth in data. With limited funds to expand their current storage, they decide to back up only files that would provide the best deduplication. What type of data files should be backed up? 22 / 27 A. Uncompressed files B. Compressed files C. Encrypted files D. Media files /Reference: QUESTION 102 A backup administrator is developing a backup plan for a new production system. What information is most critical for determining which backup storage media to use? A. RTO B. Backup frequency C. RPO D. Amount of backup data /Reference: QUESTION 103 How can you ensure that backup data stored in tapes offsite can be read only by authorized parties? A. Compress the data using the LZO algorithm B. Encrypt the data using a secure encryption key C. Set permissions on the save sets on the volumes D. Transfer data over a secure, internal WAN Correct Answer: B /Reference: QUESTION 104
35 A customer notices that the backup process on the client is using too much CPU. What can be done to decrease the CPU usage on the client? A. Disable encryption in transit B. Disable encryption at rest C. Increase the backup window D. Disable throttling /Reference: QUESTION 105 Which EMC product performs inline data deduplication? A. Data Domain B. Avamar C. NetWorker D. HomeBase /Reference: QUESTION 106 Which backup and recovery product requires plug-ins to be installed on the host to perform a backup? A. Replication Manager B. Data Domain 23 / 27 C. Data Protection Advisor D. Avamar Correct Answer: D /Reference: QUESTION 107 Which deduplication technology stores data to disk before performing deduplication? A. Post Process B. Client C. Inline D. Source
36 /Reference: QUESTION 108 Which product automatically creates and stores server configuration information in profiles? A. HomeBase B. Workbench C. Data Protection Advisor D. NetWorker /Reference: QUESTION 109 A NetWorker customer has an environment with servers from multiple vendors. The customer requires a solution that will allow recovery of a full server to different hardware in the event of failure. What can be added to the backup environment? A. Deduplication node B. Data Protection Advisor C. HomeBase D. PowerSnap Correct Answer: C /Reference: QUESTION 110 What is a characteristic of EMC NetWorker deduplication with Avamar? A. Identifies and stores only unique, variable-sized, subfile data objects B. Uses target-based deduplication C. Uses file-based deduplication D. Identifies and stores only unique, fixed-sized, metafile data objects /Reference:
37 QUESTION 111 A customer is not meeting their current SLA on backups because of a bottleneck on their LAN and cannot expand the bandwidth on their LAN to relieve this bottleneck. How does Avamar help the customer solve this problem? A. By transferring only unique subfile data objects B. By caching the file data at the client 24 / 27 C. By prefetching the file data at the client D. By transferring all subfile data objects /Reference: QUESTION 112 In a cross-product environment where Avamar is integrated with NetWorker, in which component are the backups and restores managed? A. NetWorker storage node B. NetWorker server C. Avamar deduplication node D. Avamar server Correct Answer: B /Reference: QUESTION 113 Which backup operation allows the user to duplicate save sets? A. Archiving B. Cloning C. Copying D. Staging Correct Answer: D
38 /Reference: QUESTION 114 What is the purpose of a disaster recovery backup? A. Complete system and file system recovery B. Individual file recovery C. Keep data for extended periods of time D. Provide copies of data to others Correct Answer: C /Reference: QUESTION 115 In a backup environment, what is the function of the client software component? A. Coordinates the backup B. Initiates recoveries C. Stores tracking information D. Writes data to a backup device Correct Answer: D /Reference: QUESTION 116 What is a benefit of using EMC NetWorker modules? A. Ensures consistent backups B. Improves tape utilization ratio C. Organizes data on the backup media for fast recovery D. Performs cold database backups Correct Answer: B /Reference: 25 / 27 QUESTION 117 Why is a backup required? A. Allow multiple, simultaneous access of data B. Prevent data corruption C. Prevent unauthorized access of data
39 D. Restore the original data in the event of data loss /Reference: QUESTION 118 Which function is performed by a SCSI initiator device? A. Issue commands to a target device B. Switch orientations depending on the role it plays in an I/O operation C. Execute commands D. Serve requests Correct Answer: C /Reference: QUESTION 119 DRAG DROP What is the sequence of events in a restore process? A. B. C. D.
40 Correct Answer: /Reference: QUESTION / 27 DRAG DROP What is the data flow from the host to the production volume during the CDP remote protection process?
41 A. B. C. D. Correct Answer: /Reference:
42 27 / 27
Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationModule: Business Continuity
Upon completion of this module, you should be able to: Describe business continuity and cloud service availability Describe fault tolerance mechanisms for cloud infrastructure Discuss data protection solutions
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationIntroduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use
More informationWHITE PAPER: customize. Best Practice for NDMP Backup Veritas NetBackup. Paul Cummings. January 2009. Confidence in a connected world.
WHITE PAPER: customize DATA PROTECTION Confidence in a connected world. Best Practice for NDMP Backup Veritas NetBackup Paul Cummings January 2009 Best Practice for NDMP Backup Veritas NetBackup Contents
More informationEfficient Backup with Data Deduplication Which Strategy is Right for You?
Efficient Backup with Data Deduplication Which Strategy is Right for You? Rob Emsley Senior Director, Product Marketing CPU Utilization CPU Utilization Exabytes Why So Much Interest in Data Deduplication?
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationTestking.E20-891.118Q
Testking.E20-891.118Q Number: E20-891 Passing Score: 800 Time Limit: 120 min File Version: 4.6 http://www.gratisexam.com/ E20-891 Backup Recovery Solutions Expert Exam for Technology Architects It would
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationBackup to Tape, Disk and Beyond. Jason Iehl, NetApp
Introduction PRESENTATION to TITLE Data GOES Protection: HERE Backup to Tape, Disk and Beyond Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationCost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.
Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker
More informationIntroduction to Data Protection: Backup to Tape, Disk and Beyond
Introduction to Data Protection: Backup to Tape, Disk and Beyond Frank Holliman, NetApp Author: Jason Iehl, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationRedefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
More informationTurbo Charge Your Data Protection Strategy
Turbo Charge Your Data Protection Strategy Data protection for the hybrid cloud 1 WAVES OF CHANGE! Data GROWTH User EXPECTATIONS Do It YOURSELF Can t Keep Up Reliability and Visibility New Choices and
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationDPAD Introduction. EMC Data Protection and Availability Division. Copyright 2011 EMC Corporation. All rights reserved.
DPAD Introduction EMC Data Protection and Availability Division 1 EMC 的 備 份 與 回 復 的 解 決 方 案 Data Domain Avamar NetWorker Data Protection Advisor 2 EMC 雙 活 資 料 中 心 的 解 決 方 案 移 動 性 ( Mobility ) 可 用 性 ( Availability
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationJune 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
More informationBackup and Recovery Redesign with Deduplication
Backup and Recovery Redesign with Deduplication Why the move is on September 9, 2010 1 Major trends driving the transformation of backup environments UNABATED DATA GROWTH Backup = 4 to 30 times production
More informationEMC DATA PROTECTION. Backup ed Archivio su cui fare affidamento
EMC DATA PROTECTION Backup ed Archivio su cui fare affidamento 1 Challenges with Traditional Tape Tightening backup windows Lengthy restores Reliability, security and management issues Inability to meet
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationBackup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationefficient protection, and impact-less!!
Converged, Hyper- or Flash Sample photo. Replace if desired. efficient protection, and impact-less!! Bogdan Stefanescu (..aka Bogs) EMC Data Protection Solutions bogdan.stefanescu@emc.com 1 ALL DATA HAS
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationIntroduction. Silverton Consulting, Inc. StorInt Briefing
Introduction Silverton Consulting, Inc. StorInt Briefing All too often in today s SMB data centers the overall backup and recovery process, including both its software and hardware components, is given
More informationRedefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
More informationCHAPTER 9. The Enhanced Backup and Recovery Solution
CHAPTER 9 The Enhanced Backup and Recovery Solution Based on the analysis performed on the existing backup and recovery environment in Chapter 8, this chapter covers the new backup and recovery solution.
More informationEMC Data Domain Boost for Oracle Recovery Manager (RMAN)
White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with
More informationDeduplication has been around for several
Demystifying Deduplication By Joe Colucci Kay Benaroch Deduplication holds the promise of efficient storage and bandwidth utilization, accelerated backup and recovery, reduced costs, and more. Understanding
More informationUsing HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
More informationMaximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing
1 Maximize Your Virtual Environment Investment with EMC Avamar Rob Emsley Senior Director, Product Marketing 2 Private Cloud is the Vision Virtualized Data Center Internal Cloud Trusted Flexible Control
More informationVERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
More informatione22-290 http://www.gratisexam.com/ Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0
e22-290 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ EMC E22-290 EMC Data Domain Deduplication, Backup and Recovery Exam Version: 5.1 Exam A QUESTION
More informationEMC DATA DOMAIN PRODUCT OvERvIEW
EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term
More informationStorage Networking Foundations Certification Workshop
Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies
More informationProtect Data... in the Cloud
QUASICOM Private Cloud Backups with ExaGrid Deduplication Disk Arrays Martin Lui Senior Solution Consultant Quasicom Systems Limited Protect Data...... in the Cloud 1 Mobile Computing Users work with their
More informationBlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything
BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest
More informationSymantec Backup Exec 2014 Icon List
Symantec Backup Exec 2014 Icon List Alerts Image Description Alert needs attention Alerts Alert needs attention Alert needs attention Alert needs attention Error Error Error Error Informational alert Informational
More information: HP HP0-X02. : Designing & Implementing HP Enterprise Backup Solutions. Version : R6.1
Exam : HP HP0-X02 Title : Designing & Implementing HP Enterprise Backup Solutions Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products
More informationUsing HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
More informationStorage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
More informationEMC Business Continuity for Microsoft SQL Server 2008
EMC Business Continuity for Microsoft SQL Server 2008 Enabled by EMC Celerra Fibre Channel, EMC MirrorView, VMware Site Recovery Manager, and VMware vsphere 4 Reference Architecture Copyright 2009, 2010
More informationBest Practices Guide. Symantec NetBackup with ExaGrid Disk Backup with Deduplication. 2012 ExaGrid Systems, Inc. All rights reserved.
Best Practices Guide Symantec NetBackup with ExaGrid Disk Backup with Deduplication 2012 ExaGrid Systems, Inc. All rights reserved. Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION... 2 AUDIENCE...
More informationVMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014
VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationBrian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University
Brian LaGoe, Systems Administrator Benjamin Jellema, Systems Administrator Eastern Michigan University 1 Backup & Recovery Goals and Challenges Traditional/EMU s Old Environment Avamar Key Features EMU
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationProtect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
More informationEMC AVAMAR. Deduplication backup software and system. Copyright 2012 EMC Corporation. All rights reserved.
EMC AVAMAR Deduplication backup software and system 1 IT Pressures 2009 2020 0.8 zettabytes 35.2 zettabytes DATA DELUGE BUDGET DILEMMA Transformation INFRASTRUCTURE SHIFT COMPLIANCE and DISCOVERY 2 EMC
More informationSQL Server Storage Best Practice Discussion Dell EqualLogic
SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server
More informationWHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
More informationAgenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
More informationEMC NETWORKER AND DATADOMAIN
EMC NETWORKER AND DATADOMAIN Capabilities, options and news Madis Pärn Senior Technology Consultant EMC madis.parn@emc.com 1 IT Pressures 2009 0.8 Zettabytes 2020 35.2 Zettabytes DATA DELUGE BUDGET DILEMMA
More informationBackup of NAS devices with Avamar
Backup of NAS devices with Avamar Extremely fast / no load Video describing NAS backup using Avamar based on this ppt: https://youtu.be/swg1ejldgmw The most fresh version of this document, you will find
More informationLong term retention and archiving the challenges and the solution
Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process
More informationEMC BACKUP-AS-A-SERVICE
Reference Architecture EMC BACKUP-AS-A-SERVICE EMC AVAMAR, EMC DATA PROTECTION ADVISOR, AND EMC HOMEBASE Deliver backup services for cloud and traditional hosted environments Reduce storage space and increase
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationEMC BACKUP MEETS BIG DATA
EMC BACKUP MEETS BIG DATA Strategies To Protect Greenplum, Isilon And Teradata Systems 1 Agenda Big Data: Overview, Backup and Recovery EMC Big Data Backup Strategy EMC Backup and Recovery Solutions for
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationRestoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationEMC BACKUP AND RECOVERY SOLUTIONS
EMC BACKUP AND RECOVERY SOLUTIONS Backup to the future BRS PARTNER UPDATE Sofia, March 14 th, 2011 horia.constantinescu@emc.com dumitru.taraianu@emc.com 1 Agenda EMC backup and recovery solutions Backup
More informationEMC NetWorker Rounds Out Deduplication Support with EMC Data Domain Boost. Analyst: Michael Fisch
EMC NetWorker Rounds Out Deduplication Support with EMC Data Domain Boost THE CLIPPER GROUP NavigatorTM Published Since 1993 Report #TCG2010046 October 4, 2010 EMC NetWorker Rounds Out Deduplication Support
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More informationBackup and Recovery Best Practices With CommVault Simpana Software
TECHNICAL WHITE PAPER Backup and Recovery Best Practices With CommVault Simpana Software www.tintri.com Contents Intended Audience....1 Introduction....1 Consolidated list of practices...............................
More informationEfficient Data Protection with EMC Avamar Global De-duplication Software
Efficient Data Protection with EMC Avamar Global De-duplication Software Technology Concepts and Business Considerations Abstract This white paper provides a technical overview of EMC Avamar backup and
More informationProtecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
More informationACCELERATING YOUR IT TRANSFORMATION WITH EMC NEXT-GENERATION UNIFIED STORAGE AND BACKUP
ACCELERATING YOUR IT TRANSFORMATION WITH EMC NEXT-GENERATION UNIFIED STORAGE AND BACKUP Virtualization, in particular VMware, has changed the way companies look at how they deploy not only their servers,
More informationDESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTION NS FOR VSPEXX PRIVATE CLOUD EMC VSPEX December 2014
DESIGN AND IMPLEMENTATION GUIDE EMC DATA PROTECTION OPTIONS FOR VSPEX PRIVATE CLOUD EMC VSPEX December 2014 Copyright 2013-2014 EMC Corporation. All rights reserved. Published in USA. Published December,
More informationEMC Backup Solutions for Virtualized Environments
EMC Solutions for Virtualized Environments Dumitru Taraianu Presales, EMC 1 VMWare Present & Future Present Agent installed in each host ESX Console-level backup VCB Future vstorage API for Data Protection
More informationEMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.
EMC DATA DOMAIN OVERVIEW 1 2 With Data Domain Deduplication Storage Systems, You Can WAN Retain longer Keep backups onsite longer with less disk for fast, reliable restores, and eliminate the use of tape
More information<Insert Picture Here> RMAN Configuration and Performance Tuning Best Practices
1 RMAN Configuration and Performance Tuning Best Practices Timothy Chien Principal Product Manager Oracle Database High Availability Timothy.Chien@oracle.com Agenda Recovery Manager
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationWHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION. SYMANTEC Backup Exec 10d Continuous Protection Server
WHITE PAPER THE BENEFITS OF CONTINUOUS DATA PROTECTION SYMANTEC Backup Exec 10d Continuous Protection Server 1 TABLE OF CONTENTS EXECUTIVE SUMMARY...3 Current Situation...3 The New Opportunity...3 The
More informationEMC Disk Library with EMC Data Domain Deployment Scenario
EMC Disk Library with EMC Data Domain Deployment Scenario Best Practices Planning Abstract This white paper is an overview of the EMC Disk Library with EMC Data Domain deduplication storage system deployment
More informationUsing HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
More informationan introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
More informationUltimate Guide to Oracle Storage
Ultimate Guide to Oracle Storage Presented by George Trujillo George.Trujillo@trubix.com George Trujillo Twenty two years IT experience with 19 years Oracle experience. Advanced database solutions such
More informationBest Practices for Architecting Storage in Virtualized Environments
Best Practices for Architecting Storage in Virtualized Environments Leverage Advances in Storage Technology to Accelerate Performance, Simplify Management, and Save Money in Your Virtual Server Environment
More informationVERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
More informationEMC Backup and Recovery for Microsoft Exchange 2007 SP2
EMC Backup and Recovery for Microsoft Exchange 2007 SP2 Enabled by EMC Celerra and Microsoft Windows 2008 Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the
More informationData Protection as Part of Your Cloud Journey
Data Protection as Part of Your Cloud Journey Jim Vanek DPAD Area Manager IL / WI EMC Data Protection & Availability Division October 23, 2014 Copyright 2014 EMC Corporation. All rights reserved. 1 Setting
More informationEMC Data de-duplication not ONLY for IBM i
EMC Data de-duplication not ONLY for IBM i Maciej Mianowski EMC BRS Advisory TC May 2011 1 EMC is a TECHNOLOGY company EMC s focus is IT Infrastructure 2 EMC Portfolio Information Security Authentica Network
More informationWhite. Paper. Addressing NAS Backup and Recovery Challenges. February 2012
White Paper Addressing NAS Backup and Recovery Challenges By Terri McClure and Jason Buffington February 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG. 2012,
More informationWHITE PAPER BRENT WELCH NOVEMBER
BACKUP WHITE PAPER BRENT WELCH NOVEMBER 2006 WHITE PAPER: BACKUP TABLE OF CONTENTS Backup Overview 3 Background on Backup Applications 3 Backup Illustration 4 Media Agents & Keeping Tape Drives Busy 5
More informationORACLE RMAN DESIGN BEST PRACTICES WITH EMC DATA DOMAIN
White Paper ORACLE RMAN DESIGN BEST PRACTICES WITH EMC DATA DOMAIN Abstract Many organizations rely on Oracle databases as the foundation for their mission-critical applications and the ability to protect
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationName Description Included in
1 s and s Table s and s Table Agents s Backup Exec agents and options enhance and extend platform and feature support for Backup Exec environments. Whether you need to protect critical Microsoft applications
More informationCIGRE 2014: Udaljena zaštita podataka
CIGRE 2014: Udaljena zaštita podataka Žarko Stupar Product Manager zstupar@mds.rs "" 1 Agenda Udaljena zaštita podataka - pristup Replikacija podataka između data centara Napredna backup rešenja Replikacija
More informationVodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
More information