Assessment Checking

Please enter your email:

1. What is the first role installed in NetBackup environment?


2. Which of the below is the most commonly used backup device


3. A collection of all backup data from a client is assembled into a single stream and written to tape or disk. What is this called?


4. The backup method used to create data copies without interrupting I/O operations is


5. Catalog configuration can be configured to email, which file to aid in catalog recovery?


6. The utility to uncompress NetBackup software on Linux platform is


7. In NetBackup, configuration files, image database & device information is stored in


8. Internal threats to an ICT system _________?


9. NetBackup Catalog consists of


10. When data is lost or damaged, it will need to be recovered. Which one of the following would not need to be considered as part of the recovery procedure?


11. In NetBackup environment, where does the image database reside?


12. EMM Server is an abbreviation of


13. Which one of the following is not a type of backup?


14. Backup operations means:


15. Which one of the following statements about backup copies is false?


16. Configuration files in the NetBackup database includes


17. Which one of the following places would be the best place to keep a backup copy?


18. What does Backup and Recovery mean?


19. To backup a server running Windows XP system, what policy type should be used


20. The type of backup which only backs up those files that have changed since the last backup was taken is called?


21. What tool could you use to test basic network connectivity?


22. Which of the following techniques can be used for optimizing backed up data space?


23. Which one of the following threats is not an external threat?


24. The ability to run multiple backup jobs simultaneously to a single device is


25. Backing up files using the Internet is useful because _______?


26. Storage Unit in NetBackup Master server is


27. A company is worried about their own staff accidentally introducing computer viruses into their ICT system. Which one of the following would you recommend?


28. Which of these definitions best describes the meaning of backup copy?


29. Some of the latest systems software encrypts that data when it is stored on the hard drive. Why is this done?


30. Taking a backup of all the files on a system is called _____, which one of these?


Question 1 of 30