Assessment Checking

Please enter your email:

1. Catalog configuration can be configured to email, which file to aid in catalog recovery?


2. Some of the latest systems software encrypts that data when it is stored on the hard drive. Why is this done?


3. Which one of the following threats is not an external threat?


4. Backup operations means:


5. Backing up files using the Internet is useful because _______?


6. The ability to run multiple backup jobs simultaneously to a single device is


7. In NetBackup, configuration files, image database & device information is stored in


8. The backup method used to create data copies without interrupting I/O operations is


9. Which one of the following statements about backup copies is false?


10. Configuration files in the NetBackup database includes


11. In NetBackup environment, where does the image database reside?


12. The type of backup which only backs up those files that have changed since the last backup was taken is called?


13. The utility to uncompress NetBackup software on Linux platform is


14. Storage Unit in NetBackup Master server is


15. Which of the below is the most commonly used backup device


16. Which of the following techniques can be used for optimizing backed up data space?


17. Which one of the following is not a type of backup?


18. Which of these definitions best describes the meaning of backup copy?


19. EMM Server is an abbreviation of


20. What is the first role installed in NetBackup environment?


21. A collection of all backup data from a client is assembled into a single stream and written to tape or disk. What is this called?


22. Which one of the following places would be the best place to keep a backup copy?


23. To backup a server running Windows XP system, what policy type should be used


24. What does Backup and Recovery mean?


25. Internal threats to an ICT system _________?


26. Taking a backup of all the files on a system is called _____, which one of these?


27. NetBackup Catalog consists of


28. What tool could you use to test basic network connectivity?


29. A company is worried about their own staff accidentally introducing computer viruses into their ICT system. Which one of the following would you recommend?


30. When data is lost or damaged, it will need to be recovered. Which one of the following would not need to be considered as part of the recovery procedure?


Question 1 of 30