You are redesigning an EMC NetWorker customer's backup solution. Currently some of the file system
clients are backing up to an Avamar deduplication node.
The customer wants to back up these clients to a new Avamar deduplication node.
What is an implication of this decision?
A. New instance of each client must be created on the NetWorker server
B. New full deduplication backup of each client is required
C. Clients must first be retired on the old deduplication node
D. All previously backed up data must first be replicated to the new deduplication node
A customer has data at several remote offices that need to be backed up over a secure Internet connection to their data center. However, bandwidth is constrained. A major portion of their backup data will be file system data. In addition, they have a 6 TB database in the primary data center with a 6% change rate that needs to be backed up.
Which EMC backup solution will work best for this customer?
A. Avamar with AVE
B. Avamar-Data Domain integration
C. NetWorker with Data Domain VTL
D. NetWorker with VTL
An EMC Data Domain customer has ordered three expansion shelves to increase the active tier storage capacity for backup. After successfully installing the new expansion shelves, the Data Domain GUI is partially showing the new extra capacity.
What is the reason for this issue?
A. One Active tier and one Archive tier licenses are needed
B. Data Domain needs to be reconfigured to recognize the new capacity
C. Only one Expansion Storage license was not installed
D. Only one Shelf Capacity license was installed
A large EMC NetWorker customer is gathering installation requirements for a new NetWorker installation. Based on best practices, where should the NetWorker indexes be located to provide the most flexibility?
A. Separate internal disk from the O/S
B. Protected NAS share
C. SAN volume
D. Large SCSI-attached disk
A new EMC Avamar customer is concerned with data security since all backup data is stored on disk. To minimize the customer's concerns, you have recommended the encryption-at-rest feature.
What is a consideration when using this feature?
A. Must be enabled at Avamar server installation time and has an impact on server resources
B. Specified at the time of each backup operation or in a group definition
C. Must be enabled when each client is installed and cannot be changed
D. Uses an Avamar proprietary encryption method which requires an encryption key
An EMC NetWorker customer's environment consists of four VMware ESXi hosts with 20 virtual machines on each ESXi host. One of the ESXi hosts will be used for backing up NMM clients and one of the ESXi hosts will be used for backing up NMDA clients. How many Virtual Edition Client Connection licenses are required?
A. 2
B. 4
C. 20
D. 80
In a customer's backup environment, EMC Avamar is integrated as a deduplication node with NetWorker. The customer wants to run multiple simultaneous backups from the same client.
What is the recommended maximum number of simultaneous streams?
A. 1
B. 2
C. 4
D. 6
A customer's backup environment consists of an EMC Avamar 6.1 integrated Data Domain solution. A large portion of the backup data comes from Microsoft Exchange servers. The Avamar backups use the Data Domain device as a backup target.
Where are the Microsoft Exchange logs file sent?
A. Avamar server
B. Data Domain
C. Avamar and Data Domain at the same time
D. Avamar and then moved to Data Domain
A customer has data at several remote offices that needs to be backed up over a secure WAN connection to their data center. However, bandwidth is constrained. A major portion of their backup data will be file system data. In addition, they have a 6 TB database in the primary data center with a 6% change rate that needs to be backed up.
Which EMC backup solution is recommended for this customer?
A. NetWorker with Avamar integration
B. NetWorker with Data Domain and CIFS
C. NetWorker with Data Domain and DD Boost
D. Avamar server with Avamar Virtual Edition
What is a reason for implementing EMC Data Protection Advisor (DPA) in a DPA clustered architecture?
A. Restrict customer access to specific DPA application nodes
B. Use virtual machines for all DPA application servers
C. Power up a standby DPA application server automatically
D. Enable replication between DPA application servers