Using the EMC Avamar sizing tool, you have determined that a customer requires four 2 TB data nodes. Since the customer is protecting only 5 TB of data, how is the additional storage used?
A. Backup catalog and file indices
B. Backup schedules and client configuration
C. RAID, RAIN, and checkpoints
D. Replication configuration information
A customer requires the ability to recover data while backups are being written to the same media. Which EMC NetWorker device type supports this operation?
A. Advanced File
B. File
C. Virtual Tape Library
D. Tape
A customer, using Avamar version 4, wants to use VMware Consolidated Backup (VCB) to back up their version 3.x ESX servers. Which operating system(s) can they run on their proxy server?
A. Microsoft Windows 2003 and Red Hat Enterprise Linux 4
B. Microsoft Windows 2003
C. Microsoft Windows 2003 and Windows 2008
D. Red Hat Enterprise Linux 4
By default, which database is automatically deployed on the Data Protection Advisor server?
A. MSDE
B. PostgreSQL
C. MySQL
D. Anywhere
In an EMC NetWorker environment, where is information about backup data such as owner, size, permissions, and access time stored?
A. Client File Index
B. GST Database
C. Resource Database
D. Media Database
In addition to Microsoft Windows, which operating systems are supported by the Data Protection Advisor server component?
A. Solaris and Linux
B. HP-UX and Linux
C. Solaris and AIX
D. Solaris and HP-UX
In an EMC NetWorker datazone, which option is unavailable for protecting the Microsoft SQL Server with the NetWorker Module for Microsoft Applications?
A. Log management
B. Proxy client backup
C. Deduplication backup
D. Instant backup snapshots
When writing to an EMC Data Domain device with DD Boost and Distributed Segment Processing, which functions are performed by an EMC NetWorker storage node?
A. Segmentation, fingerprinting, and compression
B. Fingerprinting, filtering, and segmentation
C. Filtering, compression, and writing
D. Writing, compression, and fingerprinting
An EMC Data Domain system is configured for encryption of data-at-rest. What happens when replication of this data starts, if encryption for data-in-flight is also configured?
A. Encrypted data is encrypted a second time
B. Data will be decrypted at the source, encrypted for replication, and then encrypted at the target
C. Data-in-flight encryption option is ignored
D. Replication job fails
A customer currently uses two different backup applications in their backup environment. They are looking for a new backup target device to replace their aging physical tape infrastructure without replacing the current backup applications. Which EMC product best fits these requirements with the least amount of configuration change?
A. Data Domain
B. Avamar
C. NetWorker
D. HomeBase