PrepAway - Latest Free Exam Questions & Answers

Author: admin

The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy

The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy attribute should be examined to determine the criteria that are used for a file backup? A. mode B. serialization C. absolute D. frequency MODE, SERialization, FREQuency are backup policy parameters settings, which do not apply […]

When should Node Replication be scheduled to run?

When should Node Replication be scheduled to run? A. when the database backup is running B. when no restore clients are running C. when no other Admin processes are running D. when backup-archive clients are running Ensure that you are running node replication after client backup. Complete data deduplication processing before replication processing. Schedule compression […]

An administrator has client owner authority and needs to delete previous backups performed by that node withou

An administrator has client owner authority and needs to delete previous backups performed by that node without accessing the IBM Spectrum Protect server. What must happen for this to occur? A. The administrator must delete the filespaces. B. The administrator must be granted system authority. C. Backup deletion must be enabled for the node. D. […]

Which statement is true regarding an administrative with node owner authority?

Which statement is true regarding an administrative with node owner authority? A. Only one administrator can have owner authority of a node. B. They cannot log on locally to the backup-archive client. C. REVOKEREMOTEACCESS prevents access through the web backup-archive client. D. They can access node data from another node. Owner: Specifies that you want […]

Which statement is true regarding scheduling a reclamation process without impacting client backup in IBM Spec

Which statement is true regarding scheduling a reclamation process without impacting client backup in IBM Spectrum Protect? A. Reclamation should be allowed to happen only by the automatic threshold. B. Reclamation should be scheduled to start after client backups finish utilizing a duration that ends before client backups start. C. Reclamation is only scheduled through […]

What are three required settings to configure server-to-server communication? (Choose three.)

What are three required settings to configure server-to-server communication? (Choose three.) A. SET SERVERHLADDRESS B. SET LLAADRESS C. SET SERVERNAME D. SET CONFIGMANAGER ON E. SET CROSSSERVER ON F. SET SERVERPASSWORD Example: Cross-define two servers Use cross definition to define SERVER_A and SERVER_B. On SERVER_B, specify the server name, password, and high- and low-level addresses […]

A customer has a virtualized system using Virtual I/O Server with multiple client partitions accessing the SAN

A customer has a virtualized system using Virtual I/O Server with multiple client partitions accessing the SAN using NPIV? Which command on the client partition should be run to retrieve the network address of the fiber adapter? A. lscfg-vp –l fcs0 B. lspci –vafcsi | grep “Network Address” C. lspath –npiv fcs0 | grep “Network […]

How does PowerSC simplify security compliance and strengthen security?

How does PowerSC simplify security compliance and strengthen security? A. By integrating with IBM X-Force to receive security updates B. By encrypting SRIOV adapter traffic C. By providing trusted system extensions D. By creating central repository of users Explanation: PowerSC simplifies security compliance and strengthens security by providing trusted system extensions. Reference: http://www-01.ibm.com/common/ssi/ShowDoc.wss?docURL=/common/ssi/rep_sm/s/897/ENUS5765-PTS/index.html&lang=en&request_locale=en


Page 22 of 69« First...10...2021222324...304050...Last »