Assessment CheckingPlease enter your email: 1. Catalog configuration can be configured to email, which file to aid in catalog recovery? DR file BMR file Support log Master Server config file2. Some of the latest systems software encrypts that data when it is stored on the hard drive. Why is this done? Encrypted data cannot be read without the key It is easier for the computer to store encrypted data So that the data is stored more accurately So that more data can be stored on the hard drive3. Which one of the following threats is not an external threat? Software bug Virus Lightning strike Earthquake4. Backup operations means: Archive data from one disk to another Move data from one system to another Eliminate Duplicate data to optimize storage Copy data to media for retrieval purpose5. Backing up files using the Internet is useful because _______? The original data is erased The copies are kept on-site The copies are kept off-site The date can never be recovered6. The ability to run multiple backup jobs simultaneously to a single device is Device compression Media Multiplexer Multiplexing Data Multiplier7. In NetBackup, configuration files, image database & device information is stored in EMM Server Media Server Master Server All of the above8. The backup method used to create data copies without interrupting I/O operations is Mirror Backup Synthetic Backup Incremental forever Snapshot Backup9. Which one of the following statements about backup copies is false? Backup copies should be tested to check the original data can be re-created Backup copies are not needed if two sets of data are stored on the computer Backup copies should be taken regularly Backup copies should be stored off-site10. Configuration files in the NetBackup database includes Media & Volume information Policies & Schedules information Device & Volume information Information about what is backed up11. In NetBackup environment, where does the image database reside? Within the master server database On the media server Within the EMM Database On the master server12. The type of backup which only backs up those files that have changed since the last backup was taken is called? Full backup Partial backup Changed backup Incremental backup13. The utility to uncompress NetBackup software on Linux platform is Gunzip Winzip Winrar Lunzip14. Storage Unit in NetBackup Master server is Logical entity pointing to virtual device It’s a Storage Policy for restoring data Logical entity pointing to physical device None of the above15. Which of the below is the most commonly used backup device Hard Disk SAN Tape Drives / Optical Drives Tape Drives16. Which of the following techniques can be used for optimizing backed up data space? Authentication Compression Deduplication Encryption17. Which one of the following is not a type of backup? Full Partial Incremental Differential18. Which of these definitions best describes the meaning of backup copy? Copies taken to save space on the hard disk drive Copies taken to give to a friend Copies of data and programs that are never needed Copies of files which are taken so that the original data and programs can be re-created if lost completely19. EMM Server is an abbreviation of Enterprise Media Manager Essential Media Manager Enterprise Medium Manager Enterprise Master Manager20. What is the first role installed in NetBackup environment? Master & EMM Server together EMM Server Clients Media Server only21. A collection of all backup data from a client is assembled into a single stream and written to tape or disk. What is this called? Backup policy Backup image Catalog .f file File metadata22. Which one of the following places would be the best place to keep a backup copy? In the fireproof safe in the building containing the original data On the hard disk containing the original data Stored off-site In the top drawer of a desk23. To backup a server running Windows XP system, what policy type should be used Standard Windows XP MS-Windows DataStore24. What does Backup and Recovery mean? The software that protects data from unauthorized users The process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss The physical security to protect data in an organization None of the above25. Internal threats to an ICT system _________? Come from outside an organization Come from either inside or outside the organization Are not to be taken seriously Come from inside an organization 26. Taking a backup of all the files on a system is called _____, which one of these? Incremental backup Partial backup Differential backup Full backup27. NetBackup Catalog consists of All of the above Configuration Files Image Database Relational Database28. What tool could you use to test basic network connectivity? Setup Ping Route cmd29. A company is worried about their own staff accidentally introducing computer viruses into their ICT system. Which one of the following would you recommend? Allow users to attach flash/pen drives using the USB connection Have the latest anti-virus software installed on all their computers Do not have an acceptable use policy Let users download music files to put onto their MP3 players30. When data is lost or damaged, it will need to be recovered. Which one of the following would not need to be considered as part of the recovery procedure? There must be hardware and software capable of running the data Staff should be available at short notice to recover the data It is necessary for staff to be trained to type in all the missing data Staff must be trained on how to recover the data Loading …Question 1 of 30