Certbus > Hitachi > Hitachi Certifications > HCE-5710 > HCE-5710 Online Practice Questions and Answers

HCE-5710 Online Practice Questions and Answers

Questions 4

An Hitachi Data Systems customer is implementing a TrueCopy Extended Distance solution on an Adaptable Modular Storage (AMS) system. Which configuration is supported?

A. TrueCopy Extended Distance with 20 Consistency Groups.

B. TrueCopy Extended Distance Consistency Group pairs in parallel to TrueCopy Synchronous pairs.

C. TrueCopy Extended Distance Consistency Group with a ShadowImage copy taken from the SVOL.

D. Two or more TrueCopy Extended Distance Consistency Groups defined with opposite copy direction.

Browse 114 Q&As
Questions 5

Your customer must establish a Three Data Center (3DC) Business Continuity Solution using Universal Storage Platform (USP) systems. Which three tasks are required to setup the solution? (Choose three.)

A. Enable bi-directional paths between local and distant USPs.

B. Upgrade the shared memory size of the local and distant USPs.

C. Upgrade the shared memory size on all three USPs by 25 percent.

D. Enable bi-directional Fibre Channel links between the primary and local USPs.

E. Implement Journal Groups of equal size and performance on local and distant USPs.

Browse 114 Q&As
Questions 6

A customer wants to permanently delete a ShadowImage environment while the primary volumes are online and the pairs are in "PAIR" state; the secondary volumes must still be usable. The customer is using Command Control Interface (CCI) and the ShadowImage device group name is SI1_db01. Which CCI command sequence should be used to permanently delete the ShadowImage pairs given the stated objectives?

A. pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01

B. pairsplit -g SI1_db01; pairsplit -g SI1_db01 -S

C. pairsplit -g SI1_db01 ; pairsplit -g SI1_db01 -rw

D. pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01 -rw

Browse 114 Q&As
Questions 7

When integrating NetBackup with HiCommand Protection Manager (HPtM), which two options must you specify on the backup Linkage tab? (Choose two.)

A. the backup product name

B. the number of backup policies in use

C. the backup version and backup vendor

D. the number of days to restore the backup catalog

Browse 114 Q&As
Questions 8

A customer has a number of applications on different operating systems. These applications require fail-over capability. The customer has chosen the appropriate cluster technology for each platform. With which two cluster types is Hitachi Data Systems allowed to integrate? (Choose two.)

A. Sun Cluster

B. MetroCluster

C. Veritas Cluster

D. Continental Cluster

Browse 114 Q&As
Questions 9

Which two configurations are good candidates for a Three Data Center (3DC) Multi-target type replication without purchasing additional hardware? (Choose two.)

A. Two local 9980v connected through a SAN to Windows 2003 servers with a TrueCopy Asynchronous link to a distant 9980v 300km apart connected through a SAN to disaster recovery Windows 2003 servers.

B. Two local USPs connected through a SAN to Windows 2003 servers both having a TrueCopy Asynchronous link to a distant USP 300km apart connected through a SAN to disaster recovery Windows 2003 servers.

C. One primary USP connected through a SAN to Windows 2003 servers having a TrueCopy Synchronous link to a disaster recovery local USP. A secondary site 300km apart with a USP connected through a SAN to Windows 2003 servers.

D. A primary USP connected through a SAN to Windows 2003 servers. A secondary USP connected through a SAN to Sun servers. Both USP sbeing cross copy connected by TrueCopy synchronous. A disaster recovery distant USP 300km apart off-line to any CPU connected to local USPs by a Universal Replicator.

Browse 114 Q&As
Questions 10

A customer has a 20TB database on external storage attached to a USP600. The database is used occasionally for high value reference data, It is also prone to corruption. Which steps should the customer take to minimize the impact of the corruption?

A. The database should be copied permanently to a secondary site using TrueCopy.

B. Move the REDO logs to the USP internal storage and leave the data files on external storage.

C. A Copy-On-Write snapshot of the database should be taken once per day for restore in the event of corruption.

D. A Shadow Image copy of the database should be taken once per day onto internal storage and that should be used instead.

Browse 114 Q&As
Questions 11

A customer must implement a second data center about 80km from the primary data center. The intent is to implement the extended cluster server feature. Which two statements should the customer be aware of? (Choose two.)

A. Each node has its own quorum disk.

B. Each node can operate independently.

C. Each node requires a quorum majority to run.

D. Each node must start on its own before joining the cluster.

Browse 114 Q&As
Questions 12

A customer uses TrueCopy on a database and has a disaster at the primary site. Failover to the secondary site has occurred. What are two methods to help with the recovery? (Choose two.)

A. Use the pairsplit -E command.

B. Use the pairsplit -S command.

C. Use the horctakeover -S command.

D. Use the horctakeover -G command.

Browse 114 Q&As
Questions 13

An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP). Where would you obtain the latest information regarding supported features and hardware?

A. Country Product Manager

B. USP User and Reference Guide

C. USP TrueCopy User and Reference Guide

D. Microcode ECN (Engineering Change Notice)

Browse 114 Q&As
Questions 14

A customer is replicating data between sites using Universal Replicator. They are using CCI at each site running on Solaris servers with korn shell; both CCI servers are also used to control ShadowImage pairs on each array. The CCI device group is named UR_db01 and each server is using the horcm2 daemon for the Universal Replicator pairs. Which two sets of commands will set the correct parameters and display the status of the Universal Replicator pairs in the CCI device group? (Choose two.)

A. pairdisplay -g UR_db01 -IM2

B. pairdisplay -g UR_db01 -IH2

C. unset HORCMINST; export HORCC_MRCF=2; pairdisplay -g UR_db01

D. export HORCMINST=2; unset HORCC_MRCF; pairdisplay -g UR_db01

Browse 114 Q&As
Questions 15

While testing a TrueCopy Asynchronous implementation, the pairs in a Copy Group suspend unexpectedly. It is determined that the suspend is due to a sidefile puncture. Which three criteria must be considered when determining the cause of the sidefile puncture? (Choose three.)

A. insufficient journal space

B. insufficient cache memory

C. remote link distance too long

D. insufficient remote link bandwidth

E. excessive contention on secondary Array Groups

Browse 114 Q&As
Questions 16

The Hitachi HiCommand Protection Manager (HPtM) software uses Volume Shadow Copy Service (VSS) to protect mission critical databases, file systems and application data, Which three components does VSS coordinate to achieve this? (Choose three.)

A. The application that requests VSS services.

B. The programs that manage shadow copies.

C. Copy-on-Write SnapShot designed for VSS.

D. Hitachi Software that allows you to present storage.

E. Applications that store persistent information on disk.

Browse 114 Q&As
Questions 17

Which three questions should be answered when a HORCM instance fails to start on a Solaris CCI host? (Choose three.)

A. Is the Command Device labeled?

B. Is the Command Device formatted?

C. Is a SIM logged at the Storage Controller?

D. Is the configuration file in the correct OS path?

E. Is the Command Device path correct in the configuration file?

Browse 114 Q&As
Questions 18

A customer asks you to review a plan for installing HiCommand Protection Manager (HPtM) software to protect Microsoft Exchange 2003. You are aware that Exchange 2003 is a very critical business application for this customer. Their plan is to use one large LUN for the public store and check point files and second large LUN for the mail box store and the transaction log. Which solution will provide the customer with maximum protection?

A. The customer should use four different mounted LUNs: one for public stores, one for mailbox stores, one for checkpoint files, and one transaction log files.

B. The customer should use three different mounted LUNs: one for public stores, one for mailbox stores and checkpoint files, and one for transaction log files.

C. The customer should use three different mounted LUNs: one for public stores and mailbox stores, one for checkpoint files, and one for transaction log files.

D. The customer should use four different mounted LUNs: two LUSE LUNs for public and mailbox stores, one for checkpoint files, and one for transaction log files

Browse 114 Q&As
Exam Code: HCE-5710
Exam Name: Hitachi Vantara Certified Expert - Replication Solutions Implementation
Last Update: Mar 18, 2025
Questions: 114 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99