The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy
The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy attribute should be examined to determine the criteria that are used for a file backup? A. mode B. serialization C. absolute D. frequency MODE, SERialization, FREQuency are backup policy parameters settings, which do not apply […]
When should Node Replication be scheduled to run?
When should Node Replication be scheduled to run? A. when the database backup is running B. when no restore clients are running C. when no other Admin processes are running D. when backup-archive clients are running Ensure that you are running node replication after client backup. Complete data deduplication processing before replication processing. Schedule compression […]
An administrator has client owner authority and needs to delete previous backups performed by that node withou
An administrator has client owner authority and needs to delete previous backups performed by that node without accessing the IBM Spectrum Protect server. What must happen for this to occur? A. The administrator must delete the filespaces. B. The administrator must be granted system authority. C. Backup deletion must be enabled for the node. D. […]
Which statement is true regarding an administrative with node owner authority?
Which statement is true regarding an administrative with node owner authority? A. Only one administrator can have owner authority of a node. B. They cannot log on locally to the backup-archive client. C. REVOKEREMOTEACCESS prevents access through the web backup-archive client. D. They can access node data from another node. Owner: Specifies that you want […]
Which statement is true regarding scheduling a reclamation process without impacting client backup in IBM Spec
Which statement is true regarding scheduling a reclamation process without impacting client backup in IBM Spectrum Protect? A. Reclamation should be allowed to happen only by the automatic threshold. B. Reclamation should be scheduled to start after client backups finish utilizing a duration that ends before client backups start. C. Reclamation is only scheduled through […]
What are three required settings to configure server-to-server communication? (Choose three.)
What are three required settings to configure server-to-server communication? (Choose three.) A. SET SERVERHLADDRESS B. SET LLAADRESS C. SET SERVERNAME D. SET CONFIGMANAGER ON E. SET CROSSSERVER ON F. SET SERVERPASSWORD Example: Cross-define two servers Use cross definition to define SERVER_A and SERVER_B. On SERVER_B, specify the server name, password, and high- and low-level addresses […]
How can a system administrator verify the progress of an AIX client installation from the NIM master?
How can a system administrator verify the progress of an AIX client installation from the NIM master? A. nim-o check B. lsnim –l C. nim –status D. tail –f /var/adm/ras/nimclient_
Where is a Cluster Aware AIX cluster configuration data stored?
Where is a Cluster Aware AIX cluster configuration data stored? A. A NFS filesystem that is accessible by all nodes B. A shared disk that is accessible from all nodes. C. A master copy on one node and the data is replicated to the local disk of the other nodes D. A shared system pool […]
A customer has a virtualized system using Virtual I/O Server with multiple client partitions accessing the SAN
A customer has a virtualized system using Virtual I/O Server with multiple client partitions accessing the SAN using NPIV? Which command on the client partition should be run to retrieve the network address of the fiber adapter? A. lscfg-vp –l fcs0 B. lspci –vafcsi | grep “Network Address” C. lspath –npiv fcs0 | grep “Network […]
How does PowerSC simplify security compliance and strengthen security?
How does PowerSC simplify security compliance and strengthen security? A. By integrating with IBM X-Force to receive security updates B. By encrypting SRIOV adapter traffic C. By providing trusted system extensions D. By creating central repository of users Explanation: PowerSC simplifies security compliance and strengthens security by providing trusted system extensions. Reference: http://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_sm/s/897/ENUS5765-PTS/index.html&lang=en&request_locale=en