What is the recommended syntax to change the number of retained, validated checkpoints to avoid roll-off of any existing good checkpoints, and how many checkpoints and hash file system checks are recommended?
A company with an existing Avamar ADS 1x8 node configuration requests a capacity upgrade. The node addition procedure requires increasing the number of checkpoints and Hash File System checks. What is the recommended syntax to change the number of retained, validated checkpoints to avoid roll-off of any existing good checkpoints,...
Which Dell EMC Avamar Administrator console navigation screen should be used to review and manage checkpoint?
A Dell EMC backup administrator performs the backup of a few files and checkpoints were created in order to secure the files that were backed up. Now the administrator wants to ensure that the last checkpoint and the last validated checkpoints that were created are the most recent. Which Dell...
Which Avamar utility or process stores data on tape in a non-deduplicated format and requires tape server software?
A company requires that all EMC Avamar backups be stored for extremely long periods of time. You recommend that they take advantage of their NetWorker tape backup environment and export the Avamar data to tape. Which Avamar utility or process stores data on tape in a non-deduplicated format and requires...
What is the default size of gsan.log file on a Dell EMC Avamar server?
What is the default size of gsan.log file on a Dell EMC Avamar server?A . 20 MBB . 25 MBC . 30 MBD . 35 MBView AnswerAnswer: B
What would you use to verify that the contents of the EMC Avamar software tar file are not corrupt?
You have completed a file transfer of the EMC Avamar software tar file to the Avamar server. What would you use to verify that the contents of the EMC Avamar software tar file are not corrupt?A . md5sumB . sftpC . winscpD . tarView AnswerAnswer: A
Which backup filter option should be set?
A backup administrator is configuring a new Cloud Tier policy that moves backup to the Cloud after 90 days. Which backup filter option should be set?A . Age ThresholdB . Retention PolicyC . ExpirationD . Retention TagView AnswerAnswer: A
Which maintenance window can they use?
A company wants to modify the Dell EMC Avamar maintenance window as their backup windows have changed. Which maintenance window can they use?A . 8am to 8 pm onlyB . 8pm to 8am onlyC . 6am to 8pm onlyD . Any window according to their environmentView AnswerAnswer: D
What is true about the Token-based Authentication feature with Data Domain?
What is true about the Token-based Authentication feature with Data Domain?A . Token is unique and exists during backup duration. Single administrative step backups do not require a password.B . Token is unique and exists during backup duration. Important for multi-tenant BaaS environments.C . Token is unique and expires at...
Which network port is used to set up the IP address on an EMC Avamar Gen4S storage node?
Which network port is used to set up the IP address on an EMC Avamar Gen4S storage node?A . eth1B . eth2C . eth7D . eth8View AnswerAnswer: C
How many hours does the benchmark test run in an AVE install?
How many hours does the benchmark test run in an AVE install?A . 6B . 12C . 24D . 36View AnswerAnswer: C