PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What is an expected outcome of this configuration?

A new EMC Avamar customer is planning to have a multi-node Avamar server replicate to an
offsite multi-node Avamar server. Because their data is extremely sensitive, they are concerned
about the security of the backup environment.

The customer is planning to encrypt all network transmissions. They also want to use encryptionat-rest on the primary Avamar backup server to provide an additional level of data security for their
stored backup data. What is an expected outcome of this configuration?

What can be done to ensure the data is recovered from the replication target?

A customer is using deduplication nodes in their EMC NetWorker environment. They have
configured a deduplication node to replicate to an alternate deduplication node and are cloning the
metadata to a secondary device. After several successful backups, the customer wants to validate
that they can recover data from the replication target.
What can be done to ensure the data is recovered from the replication target?

Which initial p_cache and f_cache settings will maximize performance when using the Data Domain client?

A customer has a large database server they would like to back up using EMC Avamar integration
with Data Domain. The server is an Intel x86-based machine with 16 GB of RAM. In addition, the
server has 10 GbE connectivity to the Data Domain and 1 GbE to the Avamar server.
Which initial p_cache and f_cache settings will maximize performance when using the Data
Domain client?

What is the probable cause of the failure?

A customer is adding a new IBM DB2 client to their existing EMC Avamar server environment.
They have ensured that they have root privileges on the system and DB2 is up and running
properly on the AIX 5.3 server. In addition, they have installed the AIX Avamar client and can ping
the Avamar server by hostname from the DB2 server.
The installation of the DB2 Avamar client plug-in is failing but passes an MD5sum check. What is
the probable cause of the failure?