Which command detects a possible security attack when client-side data deduplication is enabled?
Which command detects a possible security attack when client-side data deduplication is enabled?
What must be used to enable encryption on the client?
What must be used to enable encryption on the client?
What additional information is provided?
With the new extension querysummary of the command query backup, it is possible to get additional information for the restore procedure. What additional information is provided?
Which operating system(s) can be automatically upgraded to the next higher client level so that this new clien
Which operating system(s) can be automatically upgraded to the next higher client level so that this new client level can be deployed?
Which option reflects the correct assignment of the TOC to the storage pool?
The Table of Content (TOC) for network data management protocol backups is needed. The TOC must be placed in a separate storagepool tocpool. Which option reflects the correct assignment of the TOC to the storage pool?
What can be used to backup open files in an Oracle database?
What can be used to backup open files in an Oracle database?
Which IBM Tivoli Storage Manager V6.2 task tab in the Administration Center is used to perform inventory expir
Which IBM Tivoli Storage Manager V6.2 task tab in the Administration Center is used to perform inventory expiration?
Which default client files should be checked to investigate this problem?
IBM Tivoli Storage Manager V6.2 Backup-Archive client backups have failed for a Linux client. Which default client files should be checked to investigate this problem?
Which statement is true about a journal-based backup?
Which statement is true about a journal-based backup?
Which application is used to view the Client Activity History report?
Which application is used to view the Client Activity History report?