Download IBM Spectrum Protect V8.1 Administration.C9060-528.CertKiller.2018-10-08.73q.vcex

Vendor: IBM
Exam Code: C9060-528
Exam Name: IBM Spectrum Protect V8.1 Administration
Date: Oct 08, 2018
File Size: 132 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
How is the amount of client data backed up during the last 24 hours determined? 
  1. run QUERY SUMMARY BEGIND= –1 administrative command
  2. use the command line builder within the Operations Center and run Q BACKUP BEGIND=1
  3. look at the Activity pane the IBM Spectrum Protect Operations Center
  4. from the administrative command line run QUERY OCCUPANCY –ALL
Correct answer: D
Explanation:
QUERY OCCUPANCY (Query client file spaces in storage pools) Use this command to show where client file spaces are stored and how much space they occupy. Incorrect Answers:B: The query backup command displays a list of backup versions of your files that are stored on the IBM Spectrum Protect server, or that are inside a backup set from the server when the backupsetname option is specified. References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.3/srv.reference/r_cmd_occupancy_query.html
QUERY OCCUPANCY (Query client file spaces in storage pools) 
Use this command to show where client file spaces are stored and how much space they occupy. 
Incorrect Answers:
B: The query backup command displays a list of backup versions of your files that are stored on the IBM Spectrum Protect server, or that are inside a backup set from the server when the backupsetname option is specified. 
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.3/srv.reference/r_cmd_occupancy_query.html
Question 2
Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environment?
  1. dsmsys.opt
  2. dsm.sys
  3. dsmopt.sys
  4. dsm.opt
Correct answer: D
Explanation:
Use the SET SUBFILE (Set subfile backup for client nodes) command to set up the server to allow clients to back up subfiles. On the client's workstation, the SUBFILECACHEPATH and SUBFILECACHESIZE options must be specified in the client's options file (dsm.opt). If you are using a Windows client, you must also specify the SUBFILEBACKUP option. References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 1279
Use the SET SUBFILE (Set subfile backup for client nodes) command to set up the server to allow clients to back up subfiles. On the client's workstation, the SUBFILECACHEPATH and SUBFILECACHESIZE options must be specified in the client's options file (dsm.opt). If you are using a Windows client, you must also specify the SUBFILEBACKUP option. 
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 1279
Question 3
What is the purpose of POSTSCHEDULECMD option is the IBM Spectrum Protect backup-archive client option file?
  1. specifies the number of times the schedule needs to be run after a first successful completion
  2. specifies a command that the client program processes after it runs any schedule
  3. specifies any delay in seconds of the scheduled action
  4. specifies the command to run for stopping the scheduler service if it receives an error
Correct answer: B
Explanation:
The postschedulecmd/postnschedulecmd option specifies a command that the client program processes after it runs a schedule. If you want the client program to wait for the command to complete before it continues with other processing, use the postschedulecmd option. If you do not want to wait for the command to complete before the client continues with other processing, specify the postnschedulecmd. References: IBM Spectrum Protect for Windows Backup-Archive Clients: Installation and User's Guide, Version 8.1.0, p 464
The postschedulecmd/postnschedulecmd option specifies a command that the client program processes after it runs a schedule. 
If you want the client program to wait for the command to complete before it continues with other processing, use the postschedulecmd option. If you do not want to wait for the command to complete before the client continues with other processing, specify the postnschedulecmd. 
References: IBM Spectrum Protect for Windows Backup-Archive Clients: Installation and User's Guide, Version 8.1.0, p 464
Question 4
What are the correct steps for moving the database to new directories?
  1. stop the server, create the new directories, restart the server from the newly created directories
  2. back up database, create new directories, remove the database, and restore the database with option ON
  3. back up database, create new directories, and restore the database with option REPLACE
  4. stop the server, create new directories, move files from old location to the new location, and restart the server
Correct answer: B
Explanation:
DSMSERV RESTORE DB (Restore a database to a point-in-time) command is used to restore a database to a point in time. A volume history file and a device configuration file must be available. The option On specifies a file that lists the directories to which the database is restored. References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/srv.reference/r_cmd_dsmserv_restore_db_pit.html
DSMSERV RESTORE DB (Restore a database to a point-in-time) command is used to restore a database to a point in time. A volume history file and a device configuration file must be available. 
The option On specifies a file that lists the directories to which the database is restored. 
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/srv.reference/r_cmd_dsmserv_restore_db_pit.html
Question 5
Which operation runs as part of the PROTECT STGPOOL process?
  1. identification of damaged extents
  2. cleanup of the storage pool
  3. audit of the storage pool
  4. repair of extents marked as damaged
Correct answer: D
Explanation:
As part of the PROTECT STGPOOL operation, processes might run to repair damaged extents in the target server's storage pool. The repair operation occurs under the following conditions:Both the source server and the target server must be at V7.1.5 or later. Extents that are already marked as damaged on the target server are repaired. The repair process does not run an audit process to identify damage. Only target extents that match source extents are repaired. Target extents that are damaged but have no match on the source server are not repaired. Note: PROTECT STGPOOL protects a directory-container storage pool.Use this command to protect data in a directory-container storage pool by storing a copy of the data in another storage pool on a replication target server or on the same server by protecting the data to tape. When you protect the directory-container storage pool, you can later try to repair damage in the storage pool by using the REPAIR STGPOOL command. References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 706
As part of the PROTECT STGPOOL operation, processes might run to repair damaged extents in the target server's storage pool. The repair operation occurs under the following conditions:
  • Both the source server and the target server must be at V7.1.5 or later. 
  • Extents that are already marked as damaged on the target server are repaired. 
The repair process does not run an audit process to identify damage. 
  • Only target extents that match source extents are repaired. Target extents that are damaged but have no match on the source server are not repaired. 
Note: PROTECT STGPOOL protects a directory-container storage pool.
Use this command to protect data in a directory-container storage pool by storing a copy of the data in another storage pool on a replication target server or on the same server by protecting the data to tape. When you protect the directory-container storage pool, you can later try to repair damage in the storage pool by using the REPAIR STGPOOL command. 
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 706
Question 6
The use of deduplication processing in deduplication type storage pools requires more of which IBM Spectrum Protect server resource?
  1. IBM Spectrum Protect server memory 
  2. IBM Spectrum Protect client memory
  3. TCP/IP bandwidth between the client and the server
  4. IBM Spectrum Protect client sessions
Correct answer: A
Question 7
To enable the sending of email notifications with SET ALERTMAIL ON, what must be configured first?
  1. DEFINE or UPDATE the hub server with ALERT=EMAIL
  2. Check the ENABLE EMAIL box in the Alert Configuration tab
  3. REGISTER or Update the administrator with ALERT=YES MAILADDRESS=email_address
  4. Add INCLUDE.ALERTMAIL to the include-exclude list
Correct answer: C
Explanation:
For each administrator ID that must receive email notification, issue one of the following commands to activate email notification and to specify the email address:REGISTER ADMIN admin_name ALERT=YES EMAILADDRESS=email_address  Or UPDATE ADMIN admin_name ALERT=YES EMAILADDRESS=email_address References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.0/srv.install/t_oc_inst_email_configure.html
For each administrator ID that must receive email notification, issue one of the following commands to activate email notification and to specify the email address:
REGISTER ADMIN admin_name ALERT=YES EMAILADDRESS=email_address  
Or 
UPDATE ADMIN admin_name ALERT=YES EMAILADDRESS=email_address 
References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.0/srv.install/t_oc_inst_email_configure.html
Question 8
Which command scans for inconsistencies between database information and a container in a directory-container storage pool? 
  1. QUERY DAMAGE
  2. AUDIT CONTAINER
  3. QUERY CONTAINER F=D
  4. AUDIT STGPOOL
Correct answer: B
Explanation:
AUDIT CONTAINER (Verify the consistency of database information for a directory container) Use this command to scan for inconsistencies between database information and a container in a directory-container storage pool. Incorrect Answers:A: QUERY DAMAGED (Query damaged data in a directory-container or cloud-container storage pool)Use this command to display information about damaged data extents in a directory-container or cloud-container storage pool. Use this command together with the AUDIT CONTAINER command to determine a recovery method for the damaged data. C: QUERY CONTAINER (Query a container)Use this command to display information about one or more containers. References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.3/srv.reference/r_cmd_container_audit.html
AUDIT CONTAINER (Verify the consistency of database information for a directory container) 
Use this command to scan for inconsistencies between database information and a container in a directory-container storage pool. 
Incorrect Answers:
A: QUERY DAMAGED (Query damaged data in a directory-container or cloud-container storage pool)
Use this command to display information about damaged data extents in a directory-container or cloud-container storage pool. Use this command together with the AUDIT CONTAINER command to determine a recovery method for the damaged data. 
C: QUERY CONTAINER (Query a container)
Use this command to display information about one or more containers. 
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.3/srv.reference/r_cmd_container_audit.html
Question 9
Which option in the dsmserv.opt specifies the location of the active log directory?
  1. ACTIVELOGDIRECTORY
  2. ARCHFAILOVERLOGDIRECTORY
  3. ACTLOGDIRECTORY
  4. ARCHIVELOGDIRECTORY
Correct answer: A
Explanation:
ACTIVELOGDIRECTORY  The new directory for the location where the active log is stored. Use this option to change the location of the active log. References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 1571
ACTIVELOGDIRECTORY  
The new directory for the location where the active log is stored. Use this option to change the location of the active log. 
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator's Reference, p 1571
Question 10
In addition to the activity log, which other log would be useful for diagnosing a device error on a Windows system? 
  1. event log
  2. dsmsched.log
  3. errpt
  4. webcl.log
Correct answer: A
Explanation:
Windows event log is a record of a computer's alerts and notifications. Microsoft defines an event as "any significant occurrence in the system or in a program that requires users to be notified or an entry added to a log."    Incorrect Answers:B: Output from scheduled commands is sent to the scheduler log file (dsmsched.log). After the scheduled work completes, check the log to ensure that the work completed successfully.
Windows event log is a record of a computer's alerts and notifications. Microsoft defines an event as "any significant occurrence in the system or in a program that requires users to be notified or an entry added to a log."    
Incorrect Answers:
B: Output from scheduled commands is sent to the scheduler log file (dsmsched.log). After the scheduled work completes, check the log to ensure that the work completed successfully.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!