A customer would like to automate the mounting of suspended ShadowImage secondary volumes in a Windows CCI script. Which CCI command would be used to assign a volume to a Windows drive letter?
A. raidscan -x mount
B. raidscan -m mount
C. raidmount -x mount
D. raidmount -m mount
A customer has a 20TB database at his primary site. The database is copied using TrueCopy to a second site about 20km away. There are problems with the link to the second site. The second copy of the database should always be the same as the primary copy. Which solution should be implemented?
A. Specify FENCELEVEL=DATA on the TrueCopy links.
B. Specify FENCELEVEL=NEVER on the TrueCopy links.
C. Create a third copy of the database using ShadowImage at the primary site.
D. Create a third copy of the database using Universal Replicator at a third site.
A customer is setting up a recovery system that uses ShadowImage. Which of the following is the correct sequence to use the S-Vol?
A. Mount, startup database, filecheck, recover, start application
B. Mount, filecheck, startup database, recover, start application
C. Mount, recover, startup database, filecheck, start application
D. Mount, startup database, recover, filecheck ,start application
A customer has a cascaded Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still up. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data; What must be performed first at the local data center?
A. Suspend HUR pairs.
B. Suspend TrueCopy pairs.
C. Perform swap takeover for the HUR pairs.
D. Perform swap takeover for the TrueCopy pairs.
A customer uses TrueCopy on a database and has a disaster at the primary site. Failover to the secondary site has occurred. What are two methods to help with the recovery? (Choose two.)
A. Use the pairsplit -E command.
B. Use the pairsplit -S command.
C. Use the horctakeover -S command.
D. Use the horctakeover -G command.
A customer has a cascaded Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still up. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data, What must be performed first at the local data center?
A. Suspend HUR pairs.
B. Suspend TrueCopy pairs.
C. Perform swap takeover for the HUR pairs.
D. Perform swap takeover for the TrueCopy pairs.
An Hitachi Data Systems customer is implementing a TrueCopy Asynchronous solution. They want to know if the bandwidth of their remote links is sufficient for their configuration. Which two criteria are relevant to the bandwidth of TrueCopy Asynchronous remote links? (Choose two.)
A. the average LUN size
B. the average block size of replicated data
C. the peak number of write I/Os per second
D. the number of TrueCopy Asynchronous pairs
When integrating NetBackup with HiCommand Protection Manager (HPtM), which option should you specify on the setup GUI Command Control Interface (CCI) Linkage tab?
A. instance number
B. CCI installation path
C. track size for data copy
D. dynamic reconfiguration of secondary volume
What are three key points a customer must consider when establishing a Three Data Center (3DC) Business Continuity Solution)? (Choose three.)
A. The customer must decide which type of 3DC to install.
B. The customer must decide the size of the metadata area on each journal volume.
C. The customer must decide the ratio of metadata to real data on each journal volume.
D. The customer must decide the link type and performance between the local and distant USP.
E. The customer must decide the type and number of Parity Groups necessary to obtain the size and performance of the Journal Groups.
An Hitachi Data Systems customer is planning to use HiCommand Device Manager (HDvM) to manage their TrueCopy pairs on a Universal Storage Platform. Which two are required before TrueCopy pairs can be created with HiCommand Device Manager? (Choose two.)
A. The P-VOL must be defined as a Command Device.
B. The HDvM host agent must be installed on the CCI server(s).
C. The MCU-RCU path must be defined using the Storage Navigator.
D. The HORCM configuration files must be created on the CCI server.