What is the Data Protector command to start a copy session from the command line?
A. omnicopy
B. omniobjcopy
C. ornnicreate
D. omnicopycons
Which objects can be copied by a scheduled object copy session?
A. Only objects from the last performed session of any type (backup copy consolidation)
B. Only objects from the last performed backup session
C. All objects from performed backup, copy, and consolidation sessions within the specified time interval
D. All objects from performed backup sessions within the specified time interval
When performing a backup, where does the disk agent send the data that is being backed up?
A. to the Media Management Database server
B. to the system that runs the Data Protector GUI
C. directly to the Cell Manager
D. directly to the assigned Media Agent
Which Data Protector command-line utility should you use to produce a license report?
A. omnib
B. ornniinetpasswd
C. omnirpt
D. ornnicc
Which process accurately describes the IDB Catalog Migration process?
A. It is an automatic process that migrates the SQL portion of the IDR
B. It is a manual process that migrates the SQL portion of the IDB.
C. It is a manual process that migrates the DCBF files to the new DCBF 2.0 format
D. It is an automatic process that migrates the DCBF files to the new DCBF 2.0 format
Which logical properties are added to a physical device during the configuration of a logical device? (Select two.)
A. device location
B. device name
C. firmware release
D. device type
E. manufacturer
You are about to restore a critical system, and you want to verify the objects. Which methods should you choose? (Select two)
A. omniotojverify command-line utility
B. ornnimcopy command-line utility
C. omniobjcopy command-line utility
D. Object Operations context of the Data Protector GUI
E. Devices and Media context of the Data Protector GUI
The assigned location priority of media locations is used to prioritize media. Which Data Protector operation is this usedfor?
A. backup
B. restore
C. object copy
D. media copy
Which command is executed by the HP Data Protector software Debug Log Collector?
A. omnirsh
B. ommdbutil
C. ornnidlc
D. ornnidownload
What is the maximum number of stores that can be managed by one Data Protector B2D device?
A. 2
B. 10
C. 1
D. 50