Pass4Test의 IT인증시험 대비 덤프자료는 IT전문가들이 최신 인증시험 기출문제를 연구하여 제작해낸 최신버전 덤프입니다. Cloud & Smarter Infrastructure C2010-509덤프에는 Cloud & Smarter Infrastructure C2010-509최신시험의 기출문제와 예상문제가 포함되어 있어 높은 시험적중율을 보장해드립니다. Pass4Test의 IT인증시험덤프는 IT업계에서 높은 인지도로 유명한 덤프제공 사이트입니다. 구매전 Cloud & Smarter Infrastructure C2010-509 덤프샘플문제로 덤프품질을 검증해보세요.
NO.1 There is a requirement to provide hot backups for a physical machine
running Microsoft
running Microsoft
Exchange Server 2010. What is a prerequisite?
A. Update
the VSSPOLICY in the dsm.opt file to specify a management class.
B. Install
IBM Tivoli Storage Manager for Mail on the same system as the Exchange
server.
C. Update power shell cmdlets to include the IP address of the IBM
Tivoli Storage Manager server.
D. Stop the Exchange host controller service,
start the incremental backup, and start the Exchange
server.
Answer:
B
NO.2 What does the command query inclexcl show?
A. Details of which
files are backed up.
B. The specific order in which files are backed
up.
C. Which users have restore privileges for specific files.
D. The
include/exclude statements in the order they will be processed.
Answer:
D
NO.3 A storage pool contains backup data from several clients and has
collocation by node enabled.
If collocation is disabled by setting
collocation to No, what is the immediate effect on files already
stored in
the storage pool?
A. There is no immediate effect on files that are already
stored.
B. A reclamation process is immediately started to remove the
collocated files.
C. All collocated backup data is deleted, and clients are
required to perform a full backup.
D. A migration process is automatically
started to move the collocated files to the copy pool.
Answer: A
NO.4
Which two types of server tasks are shown in the Operations Center?
A.
active
B. db reorgs
C. encrypted
D. completed
E. missed
schedules
Answer: A,E
Explanation:
A:TSM Servers The status indicator
shows whether the Tivoli Storage Manager servers that are
managed by the
Operations Center are available to provide data protection services to clients.
E:TSM
Clients A client is considered to be at risk if a problem occurs during
its most recent scheduled
backup, or during a backup that starts within a
specified time interval. The term backup also includes
archive operations for
TivoliStorage Manager for Enterprise Resource Planning clients. Use
the
information that is shown in the TSM Clients section to check for failed
or missed backups and to
determine whether backup schedules are running as
expected.
NO.5 What additional level of security can be used during the
transfer of data from client and server?
A. encryption
B.
compression
C. deduplication
D. data shredding
Answer:
A
Explanation:
You can encrypt the data as well.
NO.6 What can be
done so that a data center can maintain highly available restore and
recovery
capabilities across data centers?
A. Use node replication.
B.
Use active-data pools.
C. Put the storage pools on shared SAN volumes.
D.
Use Disaster Recovery Manager to automate a server rebuild if needed.
Answer:
D
Explanation:
The Disaster Recovery Manager (DRM)
The TSM(Tivoli
StorageManager)Disaster Recovery Manager is a feature that is included
with
TSM Extended Edition andit is the part of the TSM application that can be used
to
assist with the management of off-sitedisaster recovery.
Reference:A
Brief Introduction to IBM Tivoli StorageManager Disaster Recovery
Manager
NO.7 Which level of IBM Tivoli Storage Manager administrator
authority includes the ability to
restore node data from a remote system to a
local system?
A. storage
B. system
C. operator
D. client
access
Answer: C
Explanation:
The Backup Operators group allows users
to back up and restore files regardless of whether they
have read or write
access to the files. Since this group has a limited set of user rights, some
functions
are not available to members of the Backup Operators
group.
NO.8 What is compatible with client-side deduplication?
A.
SSL
B. NDMP
C. encryption
D. LAN-free backup
Answer:
B
Explanation:
When you configure client-side data deduplication, the
following requirements must be met:
*The client and server must be at version
6.2.0 or later.
*(not D)Client-side deduplication cannot be used in
combination with LAN-free backups.
*(not C)Files that are intended for
deduplication must not be encrypted. Encrypted files
and files from encrypted
file systems cannot be deduplicated.
Etc.
A. Update
the VSSPOLICY in the dsm.opt file to specify a management class.
B. Install
IBM Tivoli Storage Manager for Mail on the same system as the Exchange
server.
C. Update power shell cmdlets to include the IP address of the IBM
Tivoli Storage Manager server.
D. Stop the Exchange host controller service,
start the incremental backup, and start the Exchange
server.
Answer:
B
NO.2 What does the command query inclexcl show?
A. Details of which
files are backed up.
B. The specific order in which files are backed
up.
C. Which users have restore privileges for specific files.
D. The
include/exclude statements in the order they will be processed.
Answer:
D
NO.3 A storage pool contains backup data from several clients and has
collocation by node enabled.
If collocation is disabled by setting
collocation to No, what is the immediate effect on files already
stored in
the storage pool?
A. There is no immediate effect on files that are already
stored.
B. A reclamation process is immediately started to remove the
collocated files.
C. All collocated backup data is deleted, and clients are
required to perform a full backup.
D. A migration process is automatically
started to move the collocated files to the copy pool.
Answer: A
NO.4
Which two types of server tasks are shown in the Operations Center?
A.
active
B. db reorgs
C. encrypted
D. completed
E. missed
schedules
Answer: A,E
Explanation:
A:TSM Servers The status indicator
shows whether the Tivoli Storage Manager servers that are
managed by the
Operations Center are available to provide data protection services to clients.
E:TSM
Clients A client is considered to be at risk if a problem occurs during
its most recent scheduled
backup, or during a backup that starts within a
specified time interval. The term backup also includes
archive operations for
TivoliStorage Manager for Enterprise Resource Planning clients. Use
the
information that is shown in the TSM Clients section to check for failed
or missed backups and to
determine whether backup schedules are running as
expected.
NO.5 What additional level of security can be used during the
transfer of data from client and server?
A. encryption
B.
compression
C. deduplication
D. data shredding
Answer:
A
Explanation:
You can encrypt the data as well.
NO.6 What can be
done so that a data center can maintain highly available restore and
recovery
capabilities across data centers?
A. Use node replication.
B.
Use active-data pools.
C. Put the storage pools on shared SAN volumes.
D.
Use Disaster Recovery Manager to automate a server rebuild if needed.
Answer:
D
Explanation:
The Disaster Recovery Manager (DRM)
The TSM(Tivoli
StorageManager)Disaster Recovery Manager is a feature that is included
with
TSM Extended Edition andit is the part of the TSM application that can be used
to
assist with the management of off-sitedisaster recovery.
Reference:A
Brief Introduction to IBM Tivoli StorageManager Disaster Recovery
Manager
NO.7 Which level of IBM Tivoli Storage Manager administrator
authority includes the ability to
restore node data from a remote system to a
local system?
A. storage
B. system
C. operator
D. client
access
Answer: C
Explanation:
The Backup Operators group allows users
to back up and restore files regardless of whether they
have read or write
access to the files. Since this group has a limited set of user rights, some
functions
are not available to members of the Backup Operators
group.
NO.8 What is compatible with client-side deduplication?
A.
SSL
B. NDMP
C. encryption
D. LAN-free backup
Answer:
B
Explanation:
When you configure client-side data deduplication, the
following requirements must be met:
*The client and server must be at version
6.2.0 or later.
*(not D)Client-side deduplication cannot be used in
combination with LAN-free backups.
*(not C)Files that are intended for
deduplication must not be encrypted. Encrypted files
and files from encrypted
file systems cannot be deduplicated.
Etc.