Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! HH0-270 has been withdrawn.

HH0-270 Practice Exam Questions with Answers HDS Implementation Specialist - Business Continuity Exam Certification

Question # 6

Your customer must decide if TrueCopy Asynchronous or TrueCopy Synchronous is the best solution. Which three statements describe TrueCopy Synchronous characteristics? (Choose three.)

A.

TrueCopy Synchronous guarantees an RPO of zero.

B.

TrueCopy Synchronous turn around times become unacceptable at longer distances.

C.

TrueCopy Synchronous maintains consistency of data with time stamping and sequence numbering.

D.

TrueCopy Synchronous can register a maximum of sixteen remote control units (CUs) for one local CU.

E.

TrueCopy Synchronous reports the ending status to the host only after the S-VOL update copy operation is complete.

Full Access
Question # 7

A customer wants a Copy-on-Write SnapShot (CoW) pool configured to be 1TB on a Universal Storage Platform USP1100. However, the created snapshots should initially use no more than 750GB of the pool. What should be configured to achieve this requirement?

A.

Create 750GB of V-VOLs.

B.

Set the pool threshold value to 75%.

C.

Set the Pending Update Data Rate to 75%.

D.

Create a CCI script to send an email if more than 750GB is used.

Full Access
Question # 8

A customer is replicating data between sites using TrueCopy. The TrueCopy Command Control Interface (CCI) device group name is TC_db01. During a production downtime period, the customer suspended the TrueCopy pairs and modified the contents of the secondary volumes. The customer now wants to replicate the changed data back to the production array.

Which command should be issued from the recovery CCI server to replicate just the changes from the TrueCopy secondary volumes back to the original primary volumes?

A.

horctakeover -g TC_db01 -S

B.

pairresync -g TC_db01 -swapp

C.

pairresync -g TC_db01 -swaps

D.

horctakeover -g TC_db01 -swapp

Full Access
Question # 9

Command Control Interface (CCI) is being used to manage TrueCopy and ShadowImage pairs. An error has occurred, but there is no indication of the error in any of the CCI HORCM logs or traces. Which two locations could be checked for CCI error messages? (Choose two.)

A.

the UNIX syslog

B.

the Windows event log

C.

the UNIX CCI installation directory

D.

the Windows CCI installation directory

Full Access
Question # 10

A customer is using ShadowImage to replicate an online database on a UNIX server. The ShadowImage pairs are suspended and the secondary volumes are presented to a recovery server. What are two steps that must be performed prior to starting the database on the recovery server? (Choose two.)

A.

Import the volume/disk group.

B.

Perform a fsck on each file system.

C.

Roll the replicated database logs forward.

D.

Change the IP address of the recovery server.

Full Access
Question # 11

What are three key points a customer must consider when establishing a Three Data Center (3DC) Business Continuity Solution)? (Choose three.)

A.

The customer must decide which type of 3DC to install.

B.

The customer must decide the size of the metadata area on each journal volume.

C.

The customer must decide the ratio of metadata to real data on each journal volume.

D.

The customer must decide the link type and performance between the local and distant USP.

E.

The customer must decide the type and number of Parity Groups necessary to obtain the size and performance of the Journal Groups.

Full Access
Question # 12

Which three questions should be answered when a HORCM instance fails to start on a Solaris CCI host? (Choose three.)

A.

Is the Command Device labeled?

B.

Is the Command Device formatted?

C.

Is a SIM logged at the Storage Controller?

D.

Is the configuration file in the correct OS path?

E.

Is the Command Device path correct in the configuration file?

Full Access
Question # 13

A customer has a server cluster, what are two features of a quorum disk? (Choose two.)

A.

It must reside on a RAID disk.

B.

It must be accessible by all nodes.

C.

It contains the status of all nodes in a cluster.

D.

A copy must always be available to all nodes.

Full Access
Question # 14

You have been asked to install HiCommand Protection Manager (HPtM) software in an environment where integration with backup software is required. Which three must be in place before you begin the installation? (Choose three.)

A.

RAID Manager CCI

B.

Netbackup MS SQL server agent

C.

Netbackup or Backup Exec software

D.

HiCommand Device Manager software

E.

ShadowImage software or Copy-on-Write Snapshot software

Full Access
Question # 15

A customer is using ShadowImage on a Universal Storage Platform 1100 to create point-in-time copies of a database every two hours. The production data is contained on 72GB RAID-1 parity groups and the secondary volumes are contained on 300GB RAID-6 parity groups. The customer is running the latest Command Control Interface (CCI) version on a Solaris server using the korn shell. The CCI device group name for the ShadowImage volume is SI_db01. The customer discovers data corruption on the production volumes and wants to restore from the last ShadowImage copy while maintaining RAID-1 for the production volumes.

Which two CCI commands will accomplish this objective? (Choose two.)

A.

pairresync -g SI_db01 -fq quick -restore

B.

pairresync -g SI_db01 -fq normal -restore

C.

export HORCC_REST=QUICK; pairresync -g SI_db01 -restore

D.

export HORCC_REST=NORMAL; pairresync -g SI_db01 -restore

Full Access
Question # 16

During a Copy-on-Write SnapShot (CoW) implementation, a customer asks you to demonstrate the Quick Restore functionality of the software. CCI for this environment is installed on a UNIX host using korn shell and the CoW CCI device group is COW_db01. Which statement is correct?

A.

This is not possible using Copy-on-Write SnapShot.

B.

Use the pairresync -g COW_db01 -fq normal -restore commands.

C.

Use the export HORCC_REST=NORMAL; pairresync -g COW_db01 -restore commands.

D.

Use the export HORCC_REST=COW_QUICK; pairresync -g COW_db01 -restore commands.

Full Access
Question # 17

A customer asks you to review a plan for installing HiCommand Protection Manager (HPtM) software to protect Microsoft Exchange 2003. You are aware that Exchange 2003 is a very critical business application for this customer. Their plan is to use one large LUN for the public store and check point files and second large LUN for the mail box store and the transaction log.

Which solution will provide the customer with maximum protection?

A.

The customer should use four different mounted LUNs: one for public stores, one for mailbox stores, one for checkpoint files, and one transaction log files.

B.

The customer should use three different mounted LUNs: one for public stores, one for mailbox stores and checkpoint files, and one for transaction log files.

C.

The customer should use three different mounted LUNs: one for public stores and mailbox stores, one for checkpoint files, and one for transaction log files.

D.

The customer should use four different mounted LUNs: two LUSE LUNs for public and mailbox stores, one for checkpoint files, and one for transaction log files

Full Access