The Hitachi Storage Cluster (HSC) for Microsoft Environments script for the Microsoft Cluster software has to support several specific functions. Which three functions need to be supported? (Choose three.)
When integrating NetBackup with HiCommand Protection Manager (HPtM), which option should you specify on the setup GUI Command Control Interface (CCI) Linkage tab?
A customer asks you to review a plan for installing HiCommand Protection Manager (HPtM) software to protect Microsoft Exchange 2003. You are aware that Exchange 2003 is a very critical business application for this customer. Their plan is to use one large LUN for the public store and check point files and second large LUN for the mail box store and the transaction log.
Which solution will provide the customer with maximum protection?
A customer has a number of applications on different operating systems. These applications require fail-over capability. The customer has chosen the appropriate cluster technology for each platform. With which two cluster types is Hitachi Data Systems allowed to integrate? (Choose two.)
An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP). Where would you obtain the latest information regarding supported features and hardware?
When performing a migration using Volume Migrator, which three LDEVs cannot be migrated? (Choose three.)
HiCommand Device Manager (HDvM) is being used to manage TrueCopy and ShadowImage pairs. A problem has occurred which appears to be caused by the Command Control Interface (CCI) server. Which two utilities are used to collect the relevant HDvM log files? (Choose two.)
Which components of HiCommand Protection Manager software are necessary to protect a File System on a Windows server?
A customer is using ShadowImage on a Universal Storage Platform 1100 to create point-in-time copies of a database every two hours. The production data is contained on 72GB RAID-1 parity groups and the secondary volumes are contained on 300GB RAID-6 parity groups. The customer is running the latest Command Control Interface (CCI) version on a Solaris server using the korn shell. The CCI device group name for the ShadowImage volume is SI_db01. The customer discovers data corruption on the production volumes and wants to restore from the last ShadowImage copy while maintaining RAID-1 for the production volumes.
Which two CCI commands will accomplish this objective? (Choose two.)
You are using HiCommand Protection Manager (HPtM) Volume Shadow Copy Service (VSS) backup for Microsoft Exchange Server 2003. Which two statements are correct for a true online backup? (Choose two.)
A customer would like to automate the mounting of suspended ShadowImage secondary volumes in a Windows CCI script. Which CCI command would be used to assign a volume to a Windows drive letter?
A customer has a cascaded Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still up. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data. What must be performed first at the local data center?
A customer wants a Copy-on-Write SnapShot (CoW) pool configured to be 1TB on a Universal Storage Platform USP1100. However, the created snapshots should initially use no more than 750GB of the pool. What should be configured to achieve this requirement?
An Hitachi Data Systems customer plans to Use HiCommand Device Manager (HDvM) to manage ShadowImage pairs on an Adaptable Modular Storage (AMS) system, using central management. Which two are required before ShadowImage can be managed from HiCommand Device Manager? (Choose two.)
Which statement is true about HiCommand Tiered Storage Manager?
The Command Control Interface (CCI) for the Universal Replicator pair operation displays a PFUS split type. Which three statements are true? (Choose three.)
A customer is buying an Hitachi Storage Cluster (HSC) for Microsoft Environments for the purpose of having a long distance cluster. Which two factors should be considered for the configuration? (Choose two.)