Which incremental schedule type generates more files per backup?
Which incremental schedule type generates more files per backup? A. Differences incremental B. Differential incremental C. Accumulation incremental D. Cumulative incremental
Which incremental schedule type generates more files per backup? A. Differences incremental B. Differential incremental C. Accumulation incremental D. Cumulative incremental
A disk volume is a _____________. A. Collection of media in a volume B. Pool of volumes C. DataStore Pool D. Logical unit of disk storage
Backups can be initiated by many methods. Which method does not apply? A. As a user scheduled backup. B. Manually from the command line. C. Manually from the NetBackup Administration Console. D. Automatically, based on a policy schedule.
To support spanning backups in basic disk storage unit groups, what needs to be performed? A. Enable unrestricted media sharing, in the host properties. B. Configure the storage unit selection: Spanning. C. Allow backups to span disks, in the host…
When troubleshooting backup operation issues, which status code indicates that the start window was closed? A. 96 B. 71 C. 196 D. 1
Which restore method enables simplified search and retrieval across multiple NetBackup domains? A. The NetBackup Administration Console B. The OpsCenter Operational Restore feature C. The Backup, Archive and Restore interface D. The NetBackup Operations Manager Interface
What is a logical destination for NetBackup client’s backup data? A. Selection List B. Storage Unit C. Policy D. Catalog
Which of the following is not a selection type of storage unit groups? A. First-in First-out B. Failover C. Priority D. Round Robin
Which statement is true about OpsCenter? A. OpsCenter is a premium option from NetBackup that must be purchased separately. B. OpsCenter and OpsCenter Analytics are both 100% free. C. OpsCenter cannot be used to manage NetBackup versions prior to 7.5.…
What are considerations in data protection planning? A. Retention periods B. Backup window availability C. All of the above D. Maximizing the availability of data E. Protecting systems and applications