HDS Implementation Specialist - Business Continuity Exam v5.0 (HH0-270)

Page:    1 / 8   
Total 114 questions

Which choice is correct when you integrate HiCommand Protection Manager (HPtM) software with Microsoft Cluster?

  • A. Install and setup Protection Manager in one cluster node.
  • B. Install and configure Protection Manager in each cluster node.
  • C. Install Protection Manager in each cluster node; setup Protection Manager in one cluster node.
  • D. Install Protection Manager in one of the cluster nodes, setup Protection Manager in each cluster node.


Answer : B

Which two configurations are good candidates for a Three Data Center (3DC) Multi-target type replication without purchasing additional hardware? (Choose two.)

  • A. Two local 9980v connected through a SAN to Windows 2003 servers with a TrueCopy Asynchronous link to a distant 9980v 300km apart connected through a SAN to disaster recovery Windows 2003 servers.
  • B. Two local USPs connected through a SAN to Windows 2003 servers both having a TrueCopy Asynchronous link to a distant USP 300km apart connected through a SAN to disaster recovery Windows 2003 servers.
  • C. One primary USP connected through a SAN to Windows 2003 servers having a TrueCopy Synchronous link to a disaster recovery local USP. A secondary site 300km apart with a USP connected through a SAN to Windows 2003 servers.
  • D. A primary USP connected through a SAN to Windows 2003 servers. A secondary USP connected through a SAN to Sun servers. Both USPs being cross copy connected by TrueCopy synchronous. A disaster recovery distant USP 300km apart off-line to any CPU connected to local USPs by a Universal Replicator.


Answer : B,C

A customer has a 20TB database on external storage attached to a USP600. The database is used occasionally for high value reference data. It is also prone to corruption. Which steps should the customer take to minimize the impact of the corruption?

  • A. The database should be copied permanently to a secondary site using TrueCopy.
  • B. Move the REDO logs to the USP internal storage and leave the data files on external storage.
  • C. A Copy-On-Write snapshot of the database should be taken once per day for restore in the event of corruption.
  • D. A ShadowImage copy of the database should be taken once per day onto internal storage and that should be used instead.


Answer : C

A customer must implement a second data center about 80km from the primary data center. The intent is to implement the extended cluster server feature. Which two statements should the customer be aware of? (Choose two.)

  • A. Each node has its own quorum disk.
  • B. Each node can operate independently.
  • C. Each node requires a quorum majority to run.
  • D. Each node must start on its own before joining the cluster.


Answer : A,C

A customer is using ShadowImage to replicate an online database on a UNIX server. The
ShadowImage pairs are suspended and the secondary volumes are presented to a recovery server. What are two steps that must be performed prior to starting the database on the recovery server? (Choose two.)

  • A. Import the volume/disk group.
  • B. Perform a fsck on each file system.
  • C. Roll the replicated database logs forward.
  • D. Change the IP address of the recovery server.


Answer : A,B

The Hitachi Storage Cluster (HSC) for Microsoft Environments script for the Microsoft
Cluster software has to support several specific functions. Which three functions need to be supported? (Choose three.)

  • A. IsAlive
  • B. Online
  • C. IsDead
  • D. TakeOver
  • E. LooksAlive


Answer : A,B,E

You are using HiCommand Protection Manager (HPtM) Volume Shadow Copy Service
(VSS) backup for Microsoft Exchange Server 2003. Which two statements are correct for a true online backup? (Choose two.)

  • A. Data consistency for the backed up image is guaranteed by VSS.
  • B. A separate VSS import server is required to verify the integrity of backed up data.
  • C. VSS import server has to be installed on the application server to talk to Microsoft Exchange.
  • D. VSS cannot guarantee data consistency and ESEUTIL has to be used from the command line.


Answer : A,B

A customer uses TrueCopy on a database and has a disaster at the primary site. Failover to the secondary site has occurred. What are two methods to help with the recovery?
(Choose two.)

  • A. Use the pairsplit -E command.
  • B. Use the pairsplit -S command.
  • C. Use the horctakeover -S command.
  • D. Use the horctakeover -G command.


Answer : B,C

Which components of HiCommand Protection Manager software are necessary to protect a
File System on a Windows server?

  • A. Console, Copy Controller
  • B. Console, Copy Controller and VSS agent for File System
  • C. Console, Copy Controller and Raid Manager Shadow Copy provider
  • D. Copy Controller, Raid Manager Shadow Copy provider and Protection Manager agent


Answer : C

HiCommand Device Manager (HDvM) is being used to manage TrueCopy and
ShadowImage pairs. A problem has occurred which appears to be caused by the
Command Control Interface (CCI) server. Which two utilities are used to collect the relevant
HDvM log files? (Choose two.)

  • A. the TIC utility on the CCI server
  • B. the TIC utility on the HDvM server
  • C. the hcmdsgetlogs utility on the CCI server
  • D. the hcmdsgetlogs utility on the HDvM server


Answer : A,D

A customer acquired an Hitachi Storage Cluster (HSC) for Microsoft Environments solution to use for long-distance clustering. There are concerns about how to handle issues when links are down. Which feature addresses this concern?

  • A. quorum disks
  • B. majority node sets
  • C. TrueCopy cluster agent
  • D. TrueCopy Asynchronous in-order delivery of data


Answer : B

Which two statements describe HiCommand Tiered Storage Manager? (Choose two.)

  • A. Tiered Storage Manager can migrate data within subsystems.
  • B. Tiered Storage Manager can migrate data between external subsystems.
  • C. Tiered Storage Manager can migrate data only between external subsystems.
  • D. Tiered Storage Manager can migrate data only between a subsystem and an external subsystem.


Answer : A,B

An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal
Storage Platform (USP). Where would you obtain the latest information regarding supported features and hardware?

  • A. Country Product Manager
  • B. USP User and Reference Guide
  • C. USP TrueCopy User and Reference Guide
  • D. Microcode ECN (Engineering Change Notice)


Answer : A

What are two purposes of a TrueCopy Asynchronous Consistency Group? (Choose two.)

  • A. It controls multiple volume pairs as a single entity.
  • B. It provides a real-time copy of the P-VOL on the S-VOL.
  • C. It allows priority to be assigned to a group of volume pairs.
  • D. It ensures data is written to the S-VOL in a consistent manner.


Answer : A,D

A customer is replicating data between sites using Universal Replicator. The Universal
Replicator Command Control Interface (CCI) device group name is UR_db01. A power outage occurred at the production site and the users have moved to the recovery site. The production disk array, CCI server, and network equipment are still running on generator power.
Which command should the customer issue from the recovery CCI server to suspend the
Universal Replicator pairs and reverse the replication direction?

  • A. horctakeover -g UR_db01 -S
  • B. pairsplit -g UR_db01 -swapp
  • C. pairsplit -g UR_db01 -swaps
  • D. horctakeover -g UR_db01 -swapp


Answer : A

Page:    1 / 8   
Total 114 questions