Which XML file is generated when the IBM Spectrum Protect client management services is successfully installed
Which XML file is generated when the IBM Spectrum Protect client management services is successfully installed? A. CMS-client-configuration.xml B. TSM-client-configuration.xml C. client-configuration.xml D. SpectrumProtect-client-configuration.xml You can use the CmsConfig discover command to automatically discover options files and log files, and add them to the client configuration file, client-configuration.xml. In this way, you can help to […]
Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environme
Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environment? A. dsmsys.opt B. dsm.sys C. dsmopt.sys D. dsm.opt Use the SET SUBFILE (Set subfile backup for client nodes) command to set up the server to allow clients to back up subfiles. On the client’s workstation, […]
How is the amount of client data backed up during the last 24 hours determined?
How is the amount of client data backed up during the last 24 hours determined? A. run QUERY SUMMARY BEGIND= –1 administrative command B. use the command line builder within the Operations Center and run Q BACKUP BEGIND=1 C. look at the Activity pane the IBM Spectrum Protect Operations Center D. from the administrative command […]
Which backup-archive client host operating system requires the use of a dsm.sys file?
Which backup-archive client host operating system requires the use of a dsm.sys file? A. UNIX/Linux B. Microsoft Windows workstation system C. any server in a Microsoft Windows cluster D. Microsoft Windows server 2008 Configure the IBM Spectrum Protect client After installing the backup-archive client, you must configure it before performing any operations. The following applies […]
What is the purpose of IBM Spectrum Protect for Databases?
What is the purpose of IBM Spectrum Protect for Databases? A. protects offline a range of application data by securing the underlying database management systems that contain that data B. protects a range of application data by securing the underlying database management systems that contain that data C. online backup support for IBM Informix database […]
Which command sets the randomization setting in order that clients are assigned start times that are randomly
Which command sets the randomization setting in order that clients are assigned start times that are randomly scattered across the first half of each startup window? A. SET SCHEDRANDOMIZE 50 B. UPDATE RANDOMIZE 50 C. SET SCHEDULE RANDOMIZE 50 D. SET RANDOMIZE 50 Use the SET RANDOMIZE command to set randomized start times within the […]
The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy
The dsmerror.log states that a file is in use by another process and cannot be backed up. Which backup policy attribute should be examined to determine the criteria that are used for a file backup? A. mode B. serialization C. absolute D. frequency MODE, SERialization, FREQuency are backup policy parameters settings, which do not apply […]
When should Node Replication be scheduled to run?
When should Node Replication be scheduled to run? A. when the database backup is running B. when no restore clients are running C. when no other Admin processes are running D. when backup-archive clients are running Ensure that you are running node replication after client backup. Complete data deduplication processing before replication processing. Schedule compression […]
An administrator has client owner authority and needs to delete previous backups performed by that node withou
An administrator has client owner authority and needs to delete previous backups performed by that node without accessing the IBM Spectrum Protect server. What must happen for this to occur? A. The administrator must delete the filespaces. B. The administrator must be granted system authority. C. Backup deletion must be enabled for the node. D. […]
Which statement is true regarding an administrative with node owner authority?
Which statement is true regarding an administrative with node owner authority? A. Only one administrator can have owner authority of a node. B. They cannot log on locally to the backup-archive client. C. REVOKEREMOTEACCESS prevents access through the web backup-archive client. D. They can access node data from another node. Owner: Specifies that you want […]