What is the Data Protector command to start a copy session from the command line?
A. omnicopy
B. omniobjcopy
C. ornnicreate
D. omnicopycons
You are performing a backup for unattended operations. You need to synchronize the status of the application with the backup activity in order to avoid inconsistent backups due to open files. What should you do to achieve this goal?
A. Use the SyncApp command.
B. Use the Asynchronous reading backup option.
C. Set up pre- and post-exec scripts
D. Set up a notification.
Which logging level has the most influence on backup performance, making the backup process slower?
A. Log Files
B. Log All
C. No Log
D. Log Directories
A user wants to change the default Data Protector parameters only for a particular client within a Data Protector cell Which file should the user change on a Windows Client?
A. omni.info
B. omni.format
C. global
D. omnirc
Which condition must be fulfilled before a Data Protector medium can be exported from the cell?
A. The medium must be unprotected.
B. The medium must be protected.
C. There must be no data stored on the medium.
D. There must be no references to the medium in the IDB.
Which information about backed up data is stored in the Data Protector Internal Database when the Log Files logging level used?
A. The file attributes
B. The disaster recovery information
C. The backup time of each backed up file
D. The file name and file version
Which statement is true about Restore by Query?
A. It allows the user to confirm every object before it is restored
B. It allows users to restore files not known to the IDB
C. It allows users to restore files modified during the last ten days
D. It allows users to restore files from foreign tapes
Which HP Data protector software disaster recovery methods can be managed by using the Disaster Recovery Module (DRM) (Select two)
A. ASR
B. OBDR
C. AMDR
D. EADR
E. Disk Delivery
Which method can be used to restore only doc files?
A. Restore by object
B. Restore by query
C. Restore by object copy.
D. Restore by session
You have five servers in a remote office that you want to back up over a low bandwidth connection to a central location. You also want to minimize any application performance impact on those servers. Which deduplication strategy is the best to use?
A. Target side deduplication
B. Server side deduplication
C. Disabling the deduplication
D. Source side deduplication
You are seeing unexpected mount requests during a backup. What are the likely causes of this? (Select two.)
A. library device not scanned
B. strict allocation policy
C. no previous full backup
D. missing permissions
E. backup object changed
You are about to perform a restore of a critical system. You want to verify the media before you start the restore. Which method should you choose?
A. Devices and Media context of the GUI
B. ornnidbutil command-line utility
C. ornnirncopy command-line utility
D. internal Database context of the GUI
A backup specification has 16 objects and 4 drives configured. All drives have a concurrency of
3. and the loadbalancing is min= 1 and max=2. What is the maximum number of concurrently backed up objects?
A. 9
B. 8
C. 12
D. 6
To support customers in the debug collection process, Data Protector offers the Debug Log Collector tool. Which Data Protector GUI contexts allow the collection of debug files? (Select two.)
A. Monitor
B. Client
C. Restore
D. Internal Database
E. Backup
Which command is executed by the HP Data Protector software Debug Log Collector?
A. omnirsh
B. ommdbutil
C. ornnidlc
D. ornnidownload