What additional level of security can be used during the transfer of data from client and server?
Answer : A
Explanation: You can encrypt the data as well.
What is the purpose of the VirtualNodename option?
Answer : B
Explanation: The virtualnodename option specifies the node name of your workstation when you want to restore or retrieve files to a different workstation.
Which two statements are true regarding a client schedule being manually launched in the
Operations Center?
Answer : C,E
If a file is deleted from the customer's server, what determines how long the IBM Tivoli
Storage Manager server retains the backup?
Answer : A
Explanation: You specify the number of days to keep backup versions with two parameters:
*Retain Extra Versions (how many days to keep inactive backup versions; the days are counted from the day that the version became inactive)
*Retain Only Versions (how many days to keep the last backup version of a file that has been deleted)
What is the result of the Tivoli Storage Manager (TSM) server command query filespace?
Answer : D
Explanation: The query filespace command displays a list of file spaces for a node that are stored on the Tivoli Storage Manager server, or that are inside a backup set from the
Tivoli Storage Manager server, when the backupsetname option is specified. You can also specify a single file space name to query.
Example:Task -
Display your file spaces.
Command: query filespace -
Which two types of server tasks are shown in the Operations Center?
Answer : AE
Explanation: A:TSM Servers -
The status indicator shows whether the Tivoli Storage Manager servers that are managed by the Operations Center are available to provide data protection services to clients.
E:TSM Clients -
A client is considered to be at risk if a problem occurs during its most recent scheduled backup, or during a backup that starts within a specified time interval. The term backup also includes archive operations for TivoliStorage Manager for Enterprise Resource
Planning clients.
Use the information that is shown in the TSM Clients section to check for failed or missed backups and to determine whether backup schedules are running as expected.
Which log records the sessions of the web client?
Answer : D
Explanation: All Web client messages are written to the Web client log file, dsmwebcl.log.
Which task or process might be included in a server administrative schedule?
Answer : D
In the IBM Tivoli Storage Manager (TSM) Operations Center V7.1, what does the interval parameter of the set statusatriskinterval specify?
Answer : D
Explanation: What does At Risk mean in the Operations Center?
The Operations Center considers recent activity for a client and determines whether the client is at risk of being unprotected. The "at risk" designation primarily indicates that an administrator should investigate a client issue to determine whether or not it creates a significant risk (based on the business goals, data protection strategy, and such).
The at risk processing considers clients that are automated using TSM scheduling.
Which statement is true regarding the recovery plan file?
Answer : A
Explanation: Example:
Task:Display a list of recovery plan files that were created for this server using the specified device class.
Command -
query rpfile devclass=* format=detailed
Output -
Recovery Plan File Name: ALASKA.20000406.170423
Node Name: BRANCH1 -
Device Class Name: REMOTE -
Recovery Plan File Type: RPFILE -
Mgmt Class Name: STANDARD -
Recovery Plan File Size: 16,255 Bytes
Marked for Deletion: Yes -
Deletion Date: 06/12/2000 13:05:31
Recovery Plan File Name: ALASKA.20000407.170845
Node Name: BRANCH1 -
Device Class Name: REMOTE -
Recovery Plan File Type: RPFSNAPSHOT
Mgmt Class Name: STANDARD -
Recovery Plan File Size: 16,425 Bytes
Marked for Deletion: No -
Deletion Date:
Disk drives are used for which two types of storage pools?
Answer : A,D
Explanation: A:
Device Class: Disk -
Storage volumes that reside on the internal disk drive
Tivoli Storage Manager devices can be physical, such as disk drives and tape drives, or logical, such as files on disk or storage on another server.
D: A NAS is a file server.
Not E:Files on Disk as Sequential Volumes (FILE)
This device type allows you to create sequential volumes by creating files on disk storage.
To the server, these files have the characteristics of a tape volume.
What is the purpose of the command query system?
Answer : C
Explanation: QUERY SYSTEM (Query the System Configuration and Capacity)
Use this command to obtain consolidated information regarding Tivoli Storage Manager configuration and capacity.
This command consolidates output from the following commands:
QUERY ASSOCIATION -
QUERY COPYGROUP -
QUERY DB -
QUERY DBVOLUME -
QUERY DEVCLASS -
QUERY DOMAIN -
QUERY LOG -
QUERY LOGVOLUME -
QUERY MGMTCLASS -
QUERY OPTIONS -
QUERY PROCESS -
QUERY SCHEDULE -
QUERY SESSION -
QUERY STATUS -
QUERY STGPOOL -
QUERY VOLUME -
What is the purpose of the command, validate lanfree?
Answer : D
Explanation: VALIDATE LANFREE (Validate LAN-Free paths)
Use this command to determine which destinations for a given node using a specific storage agent are capable of LAN-Free data movement.
Example:
Command -
validate lanfree tiger aix_sta1
Output -
Node Storage Operation Mgmt Class Destination LAN-Free Explanation
Name Agent Name Name capable?
----- -------- --------- ---------- ----------- -------- -----------
TIGER AIX_STA1 BACKUP STANDARD OUTPOOL NO No available
online paths.
TIGER AIX_STA1 BACKUP STANDARD PRIMARY NO Destination
storage pool
is configured
for simultan-
eous write.
TIGER AIX_STA1 BACKUP STANDARD SHRPOOL YES
Which scheduling mode is initiated by the server contacting a registered client?
Answer : D
Explanation: Tivoli Storage Manager provides two scheduling modes: client- polling and server-prompted.
What is the result when the migrate process moves data from a deduplicated pool to a non- deduplicated pool?
Answer : B
Explanation: *Data deduplication in Tivoli Storage Manager is a two-phase process. In the first phase, the server identifies the duplicate data in the storage pool. As volumes in the storage pool are filled, data becomes eligible for duplicate identification. A volume does not have to be full before duplicate identification starts. In the second phase, duplicate data is removed by any of the following processes:
Reclaiming volumes in the primary-storage pool, copy-storage pool, or active-data pool
Backing up a primary-storage pool to a copy-storage pool that is also set up for deduplication
Copying active data in the primary-storage pool to an active-data pool that is also set up for deduplication
Migrating data from the primary-storage pool to another primary-storage pool that is also set up for deduplication
Moving data from the primary-storage pool to a different primary-storage pool that is also set up for deduplication, moving data within the same copy-storage pool, or moving data within the same active-data pool
Have any questions or issues ? Please dont hesitate to contact us