Volume Shadow Copy Service (VSS) coordinates activities of three components to protect
mission critical databases, file systems, and application data when used with HiCommand
Protection Manager (HPtM) software. What are the three components? (Choose three.)
Which statement is true about HiCommand Tiered Storage Manager?
A customer wants to use TrueCopy Asynchronous to copy databases to a data center
200km away from the primary site. The applications for these databases have very severe
SLAs. Which two factors must be considered? (Choose two.)
A customer has implemented a Disaster Recovery solution which involves replicating his
data over 100km with TrueCopy Synchronous. Which two describe the customer’s reasons
for doing this? (Choose two.)
The Hitachi Storage Cluster (HSC) with Windows 2003 uses which method to prevent “Split
You are working on a Business Continuity plan for one of your customers. The customer
states, “This business process is very important for us so we cannot afford any data loss.
However we can tolerate three hours to recover.” Which two statements correctly reflect the
business process requirements? (Choose two.)
Your customer’s business critical applications are backed up every night. The backup starts
at 7:00 PM and finishes at 7:00 AM the next morning. The RPO and RTO take about two
hours. The customer’s focus and threat sources have changed making immediate
application availability a requirement. When an update to the Business Continuity plan was
recently completed, the backup was ruled out as a proper solution. Which solution will satisfy
the customer’s new requirements?
A customer has set up an Hitachi Storage Cluster (HSC) for Microsoft Environments called
“SQLclus”. The name of the Generic Script resource is “hscscript”. The name of the
resource that is dependent on hscscript is called “MSSQLlun” In which two files do you find
the name of the CCI device group? (Choose two.)
A customer uses ShadowImage to create a copy of an online UNIX database so that it can
be mounted and started on another server for testing purposes. Which two should be
scripted on the recovery server prior to resynchronizing the ShadowImage pairs to ensure
any volume manager changes are reflected on the recovery server after the next
ShadowImage suspend? (Choose two.)
An Hitachi Data Systems customer is implementing a TrueCopy Extended Distance solution
on an Adaptable Modular Storage (AMS) system. Which configuration is supported?