What are three required settings to configure server-to-server communication? (Choose three.)
- A . SET SERVERHLADDRESS
- B . SET LLAADRESS
- C . SET SERVERNAME
- D . SET CONFIGMANAGER ON
- E . SET CROSSSERVER ON
- F . SET SERVERPASSWORD
ACF
Explanation:
Cross-define two servers
Use cross definition to define SERVER_A and SERVER_B.
On SERVER_B, specify the server name, password, and high- and low-level addresses of SERVER_B. Specify that cross defining is allowed.
set servername server_b
set serverpassword mylife
set serverhladdress 9.115.20.80
set serverlladdress 1860
set crossdefine on
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/srv.reference/ r_cmd_server_define.html
Which statement is true regarding scheduling a reclamation process without impacting client backup in IBM Spectrum Protect?
- A . Reclamation should be allowed to happen only by the automatic threshold.
- B . Reclamation should be scheduled to start after client backups finish utilizing a duration that ends before client backups start.
- C . Reclamation is only scheduled through an administrative script.
- D . Reclamation can only be scheduled through the Operations Center.
A
Explanation:
Volume reclamation occurs when the reclamation threshold for the container-copy storage pool is less than 100%.
However, onsite volumes are not a candidate for reclamation until they are 75% full.
References: http://www-01.ibm.com/support/docview.wss?uid=swg27048653
Which statement is true regarding an administrative with node owner authority?
- A . Only one administrator can have owner authority of a node.
- B . They cannot log on locally to the backup-archive client.
- C . REVOKEREMOTEACCESS prevents access through the web backup-archive client.
- D . They can access node data from another node.
A
Explanation:
Owner: Specifies that you want to grant client owner authority to a user with the node privilege class. A user with client owner authority can access a web backup-archive client through the web client interface and also access their data from another client using the -NODENAME parameter.
References: http://publib.boulder.ibm.com/tividd/td/SMAS4N/GC35-0316-01/en_US/HTML/a454r142.htm
An administrator has client owner authority and needs to delete previous backups performed by that node without accessing the IBM Spectrum Protect server.
What must happen for this to occur?
- A . The administrator must delete the filespaces.
- B . The administrator must be granted system authority.
- C . Backup deletion must be enabled for the node.
- D . The administrator must expire the backup data.
B
Explanation:
The delete backup command deletes files, images, and virtual machines that were backed up to IBM Spectrum Protect server storage. Your administrator must give you authority to delete objects.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/client/r_cmd_delbkup.html
When should Node Replication be scheduled to run?
- A . when the database backup is running
- B . when no restore clients are running
- C . when no other Admin processes are running
- D . when backup-archive clients are running
C
Explanation:
Ensure that you are running node replication after client backup.
Complete data deduplication processing before replication processing. Schedule compression after replication.
Figure. Daily schedule when data deduplication and node replication are used
References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.0/perf/t_srv_sched_deduprep.html
The dsmerror.log states that a file is in use by another process and cannot be backed up.
Which backup policy attribute should be examined to determine the criteria that are used for a file backup?
- A . mode
- B . serialization
- C . absolute
- D . frequency
A
Explanation:
MODE, SERialization, FREQuency are backup policy parameters settings, which do not apply to Data Protection for SQL Server.
References: https://www.ibm.com/support/knowledgecenter/en/SSERBW_8.1.0/mail.exc/
r_dpexc_recommend_policy_settings.html
Which command sets the randomization setting in order that clients are assigned start times that are randomly scattered across the first half of each startup window?
- A . SET SCHEDRANDOMIZE 50
- B . UPDATE RANDOMIZE 50
- C . SET SCHEDULE RANDOMIZE50
- D . SET RANDOMIZE 50
D
Explanation:
Use the SET RANDOMIZE command to set randomized start times within the startup window of each schedule for clients by using the client-polling scheduling mode.
Syntax
Read syntax diagramSkip visual syntax diagram
>>-Set RANDomize–percent-
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.6/srv.reference/r_cmd_randomize_set.html
What is the purpose of IBM Spectrum Protect for Databases?
- A . protects offline a range of application data by securing the underlying database management systems that contain that data
- B . protects a range of application data by securing the underlying database management systems that contain that data
- C . online backup support for IBM Informix database
- D . online backup support for IBM DB2 database
B
Explanation:
IBM Spectrum Protect for Databases (formerly IBM Tivoli Storage Manager for Databases) helps protect Oracle and Microsoft SQL data no matter where it is stored. You can continue running primary applications on your database servers while they back up; and restore data to and from offline storage using automated tasks, utilities and interfaces. This software performs online, consistent and centralized backups to help you avoid downtime, protect vital enterprise data and minimize operational costs.
Incorrect Answers: C, D: Online backup support for IBM DB2 and IBM Informix databases is included in IBM Spectrum Protect servers, without the need to install IBM Spectrum Protect for Databases.
References: http://www-03.ibm.com/software/products/en/spectrum-protect-for-databases
Which backup-archive client host operating system requires the use of a dsm.sys file?
- A . UNIX/Linux
- B . Microsoft Windows workstation system
- C . any server in a Microsoft Windows cluster
- D . Microsoft Windows server 2008
A
Explanation:
Configure the IBM Spectrum Protect client
After installing the backup-archive client, you must configure it before performing any operations.
The following applies to AIX, Linux, Solaris, and Mac OS X.
If you are upgrading the backup-archive client, it is unnecessary to reconfigure the scheduler, web client, or other configuration settings. If the dsm.opt and dsm.sys files used by the previous client installation are available in the default installation directory or the directory or file pointed to by the DSM_CONFIG and DSM_DIR environment variables, the client accesses these files for configuration information.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/client/c_cfg.html
How is the amount of client data backed up during the last 24 hours determined?
- A . run QUERY SUMMARY BEGIND= C1administrative command
- B . use the command line builder within the Operations Center and run Q BACKUP BEGIND=1
- C . look at the Activity pane the IBM Spectrum Protect Operations Center
- D . from the administrative command line run QUERY OCCUPANCY CALL
D
Explanation:
QUERY OCCUPANCY (Query client file spaces in storage pools)
Use this command to show where client file spaces are stored and how much space they occupy.
Incorrect Answers:
B: The query backup command displays a list of backup versions of your files that are stored on the IBM Spectrum Protect server, or that are inside a backup set from the server when the backupsetname option is specified.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.3/srv.reference/r_cmd_occupancy_query.html
Which file is used to add a system-wide client option on an IBM Spectrum Protect client in a Windows environment?
- A . dsmsys.opt
- B . dsm.sys
- C . dsmopt.sys
- D . dsm.opt
D
Explanation:
Use the SET SUBFILE (Set subfile backup for client nodes) command to set up the server to allow clients to back up subfiles. On the client’s workstation, the SUBFILECACHEPATH and SUBFILECACHESIZE options must be specified in the client’s options file (dsm.opt). If you are using a Windows client, you must also specify the SUBFILEBACKUP option.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 1279
Which XML file is generated when the IBM Spectrum Protect client management services is successfully installed?
- A . CMS-client-configuration.xml
- B . TSM-client-configuration.xml
- C . client-configuration.xml
- D . SpectrumProtect-client-configuration.xml
C
Explanation:
You can use the CmsConfig discover command to automatically discover options files and log files, and add them to the client configuration file, client-configuration.xml. In this way, you can help to ensure that the client management service can access the client log files and make them available for diagnosis in the Operations Center.
References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.0/srv.install/ r_oc_inst_cms_config_discover.html
What is the purpose of POSTSCHEDULECMD option is the IBM Spectrum Protect backup-archive client option file?
- A . specifies the number of times the schedule needs to be run after a first successful completion
- B . specifies a command that the client program processes after it runs any schedule
- C . specifies any delay in seconds of the scheduled action
- D . specifies the command to run for stopping the scheduler service if it receives an error
B
Explanation:
The postschedulecmd/postnschedulecmd option specifies a command that the client program processes after it runs a schedule.
If you want the client program to wait for the command to complete before it continues with other processing, use the postschedulecmd option. If you do not want to wait for the command to complete before the client continues with other processing, specify the postnschedulecmd.
References: IBM Spectrum Protect for Windows Backup-Archive Clients: Installation and User’s Guide, Version 8.1.0, p 464
What are the correct steps for moving the database to new directories?
- A . stop the server, create the new directories, restart the server from the newly created directories
- B . back up database, create new directories, remove the database, and restore the database with option ON
- C . back up database, create new directories, and restore the database with option REPLACE
- D . stop the server, create new directories, move files from old location to the new location, and restart the server
B
Explanation:
DSMSERV RESTORE DB (Restore a database to a point-in-time) command is used to restore a database to a point in time. A volume history file and a device configuration file must be available.
The option On specifies a file that lists the directories to which the database is restored.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/srv.reference/ r_cmd_dsmserv_restore_db_pit.html
Which two capabilities are provided with the IBM Spectrum Protect incremental forever backup method? (Choose two.)
- A . increase the total number of bytes sent to the protect server
- B . reduce the time needed to perform a restore of a system
- C . reduce the total storage used to save backups of the system
- D . provide the ability to use LAN-Free backups
- E . perform a point-in-time restore
BC
Explanation:
C: The incremental forever backup solution provides these advantages:
– Reduces the amount of data that goes across the network.
– Reduces data growth because all incremental backups contain only the blocks that changed since the previous backup.
– No comparison with the backup target is needed since only changed blocks are identified.
– Minimizes impact to the client system.
– Reduces the length of the backup window.
– No need to schedule an initial full backup as a separate schedule: the first issue of an incremental forever backup automatically defaults to an incremental forever full backup.
B: In addition, the restore process is optimized, as only the latest versions of blocks that belong to a restored backup are restored. Since the same area on the production disk is recovered only one time, the same block is not written to multiple times. As a result of these advantages, incremental forever is the preferred backup strategy.
References: https://www.ibm.com/support/knowledgecenter/en/SSERB6_8.1.0/ve.hv/ c_ve_hv_bup_incrforever.html
What is the default method to back up an IBM Spectrum Protect V8.1 client’s file system data?
- A . Image
- B . Full
- C . Incremental
- D . Differential
C
Explanation:
IBM Spectrum Protect uses the progressive incremental backup method. For this backup method, a first full backup of all data objects is created and in subsequent backup operations only changed data is moved to storage.
References: IBM Spectrum Protect Version 8.1.0, Introduction to Data Protection, p 5
Which operation runs as part of the PROTECT STGPOOL process?
- A . identification of damaged extents
- B . cleanup of the storage pool
- C . audit of the storage pool
- D . repair of extents marked as damaged
D
Explanation:
As part of the PROTECT STGPOOL operation, processes might run to repair damaged extents in the target server’s storage pool.
The repair operation occurs under the following conditions:
– Both the source server and the target server must be at V7.1.5 or later.
Extents that are already marked as damaged on the target server are repaired. The repair process does not run an audit process to identify damage.
– Only target extents that match source extents are repaired. Target extents that are damaged but have no match on the source server are not repaired.
Note: PROTECT STGPOOL protects a directory-container storage pool. Use this command to protect data in a directory-container storage pool by storing a copy of the data in another storage pool on a replication target server or on the same server by protecting the data to tape. When you protect the directory-container storage pool, you can later try to repair damage in the storage pool by using the REPAIR STGPOOL command.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 706
The use of deduplication processing in deduplication type storage pools requires more of which IBM Spectrum Protect server resource?
- A . IBM Spectrum Protect server memory
- B . IBM Spectrum Protect client memory
- C . TCP/IP bandwidth between the client and the server
- D . IBM Spectrum Protect client sessions
To enable the sending of email notifications with SET ALERTMAIL ON, what must be configured first?
- A . DEFINE or UPDATE the hub server with ALERT=EMAIL
- B . Check the ENABLE EMAIL box in the Alert Configuration tab
- C . REGISTER or Update the administrator with ALERT=YES MAILADDRESS=email_address
- D . Add INCLUDE.ALERTMAIL to the include-exclude list
C
Explanation:
For each administrator ID that must receive email notification, issue one of the following commands to activate email notification and to specify the email address:
REGISTER ADMIN admin_name ALERT=YES EMAILADDRESS=email_address
Or
UPDATE ADMIN admin_name ALERT=YES EMAILADDRESS=email_address
References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.0/srv.install/ t_oc_inst_email_configure.html
Which command scans for inconsistencies between database information and a container in a directory-container storage pool?
- A . QUERY DAMAGE
- B . AUDIT CONTAINER
- C . QUERY CONTAINER F=D
- D . AUDIT STGPOOL
B
Explanation:
AUDIT CONTAINER (Verify the consistency of database information for a directory container) Use this command to scan for inconsistencies between database information and a container in a directory-container storage pool.
Incorrect Answers:
A: QUERY DAMAGED (Query damaged data in a directory-container or cloud-container storage pool) Use this command to display information about damaged data extents in a directory-container or cloud-container storage pool. Use this command together with the AUDIT CONTAINER command to determine a recovery method for the damaged data.
C: QUERY CONTAINER (Query a container) Use this command to display information about one or more containers.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.3/srv.reference/ r_cmd_container_audit.html
Which option in the dsmserv.opt specifies the location of the active log directory?
- A . ACTIVELOGDIRECTORY
- B . ARCHFAILOVERLOGDIRECTORY
- C . ACTLOGDIRECTORY
- D . ARCHIVELOGDIRECTORY
A
Explanation:
ACTIVELOGDIRECTORY The new directory for the location where the active log is stored. Use this option to change the location of the active log.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 1571
What is the benefit of the RESOURCEUTILIZATION option on the client during a restore?
- A . to increase the number of concurrent restore sessions
- B . to increase the memory usage on the client
- C . to increase the communication buffer from the client to the server
- D . to decrease the memory usage on the client
A
Explanation:
Use the resourceutilization option in your option file to regulate the level of resources the IBM Spectrum Protec server and client can use during processing. When you request a restore, the default is to use a maximum of one session. Additional restore sessions are based on: resourceutilization value Etc.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/client/ c_opt_resourceutilization_sessres.html
How is the node name that is specified in the dsm.opt file used by the IBM Spectrum Protect server?
- A . to identify the client operation system
- B . to encrypt the client data files
- C . to identify the client and grant access
- D . to select the target storage pool
C
Explanation:
Register your workstation with a server Before you can use IBM Spectrum Protect, you must set up a node name and password and your node must be registered with the server.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/client/c_cfg.html
In addition to the activity log, which other log would be useful for diagnosing a device error on a Windows system?
- A . event log
- B . dsmsched.log
- C . errpt
- D . webcl.log
A
Explanation:
Windows event log is a record of a computer’s alerts and notifications. Microsoft defines an event as "any significant occurrence in the system or in a program that requires users to be notified or an entry added to a log."
Incorrect Answers:
B: Output from scheduled commands is sent to the scheduler log file (dsmsched.log). After the scheduled work completes, check the log to ensure that the work completed successfully.
On an IBM Spectrum Protect Windows server, which utility can be used to identify disk bottlenecks?
- A . monitor
- B . perfstat
- C . perform
- D . nmon
What are the steps to configure the Mail Server for Operations Center?
- A . on the Operations Center menu bar, click Configure Mail Server and complete the fields
- B . on the Operations Center menu bar, click Reports; then click Configure Mail Server and complete the fields
- C . on the Operations Center menu bar, click Reports; then click Define Mail Server and populate the fields with a valid email address
- D . on the Operations Center menu bar, click Reports; then select a report, click Details, and update the form to specify an email address
B
Explanation:
To set up and manage email reports, complete the following steps:
– On the Operations Center menu bar, click Reports.
– If an email server connection is not yet configured, click Configure Mail Server and complete the fields. After you configure the mail server, the general operations report and license compliance report are enabled.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/srv.admin/ t_adm_mon_oc_email_report_setup.html
An administrator issues the command: MOVE DRMEDIA * WHERESTATE=VAULTRETRIEVE. None of the tapes that were in VAULTRETRIEVE state have been returned to scratch. To which state should the tapes be moved to be recalled?
- A . ONSITERETRIEVE
- B . VAULT
- C . COURIER
- D . NOTMOUNTABLE
D
Explanation:
NOTMOuntable
These volumes are onsite, contain valid data, and are not available for onsite processing. The values change to COURIER if the TOSTATE parameter is not specified.
Note: VAULTRetrieve
These volumes are at the offsite vault and do not contain valid data. The values change to COURIERRETRIEVE if the TOSTATE parameter is not specified.
Incorrect Answers:
C: COUrier
These volumes are with the courier and being moved offsite. The values change only to VAULT.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference. page 661
Which storage pool parameter keeps offsite tapes in the vault 5 days after the data on the tapes has expired?
- A . REUSEDELAY=5
- B . OFFSITEDELAY=5
- C . DRMDBBACKUPEXPIREDAYS=5
- D . OFFSITERECLAIM=5
A
Explanation:
To prevent volumes from being rewritten immediately after all extents are deleted, use the REUSEDELAY parameter to specify a value that is greater than 0.
References: http://www-01.ibm.com/support/docview.wss?uid=swg27048653
What is true regarding an administrator who has been granted restricted storage authority?
- A . This administrator can delete storage specific storage pools.
- B . This administrator can control specific storage resources.
- C . This administrator can control all storage resources.
- D . This administrator can only add storage resources to all storage.
A
Explanation:
Restricted Storage: Manage server storage, but limited to specific storage pools.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_6.3.4/com.ibm.itsm.srv.doc/ r_mgclinod_adminauthclass.html
Which alert type is displayed in the Operations Center when a scheduled node backup fails?
- A . a missed icon
- B . a failed icon
- C . an unprotected icon
- D . an at-risk icon
D
Explanation:
The Overview page of the Operations Center includes the section:
TSM Clients
A client is considered to be at risk if a problem occurs during its most recent scheduled backup, or during a backup that starts within a specified time interval. The term backup also includes archive operations for Tivoli Storage Manager for Enterprise Resource Planning clients. Use the information that is shown in the TSM Clients section to check for failed or missed backups and to determine whether backup schedules are running as expected.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.0/com.ibm.itsm.srv.doc/ c_oc_srv_opcenter_overview.html
Which two statements are true regarding the client acceptor-managed services? (Choose two.)
- A . It starts and stops the scheduler process as needed.
- B . It requires higher use of system resources when idle.
- C . It is started with DSMC SCHED command.
- D . It requires fewer system resources when idle.
- E . It remains active, even after scheduled backup is complete.
AD
Explanation:
The client acceptor service starts and stops the scheduler process as needed for each scheduled action. It requires fewer system resources when idle.
Incorrect Answers:
C: The client acceptor daemon is started with the dsmcad command.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.1/com.ibm.itsm.client.doc/ c_cfg_sch_compare.html
Which two components are selectable on the IBM Spectrum Protect server installation? (Choose two.)
- A . IBM Spectrum Protect for SAN
- B . IBM Spectrum Protect client agent
- C . IBM Global Security Kit (GSKit)
- D . IBM DB2
- E . Licenses
AE
Explanation:
By using the IBM Spectrum Protect installation software, you can install the following components:
– Server
– server languages
– license
– devices
– IBM Spectrum Protect for SAN
– Operations Center
Incorrect Answers:
C, D: The database (DB2), the Global Security Kit (GSKit) and IBM Java Runtime Environment (JRE) are automatically installed when you select the server component.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/srv.install/ t_srv_upgrd63_71_inst.html
On an IBM Spectrum Protect Windows server, a data migration has failed with a tape device error.
Which output should be reviewed to get detailed error information?
- A . event log
- B . dsmerr
- C . errpt
- D . actlog
B
Explanation:
dsmerror.log (dsmerr) is the IBM Spectrum Protect client error log.
Incorrect Answers:
A: Note that less detailed error and informational messages are written to the Windows application event log as well.
C: Review error logs for the operating system to find errors that can affect the server. For example, for AIX systems use the errpt command to view errors.
D: The activity log, actlog, contains all messages that are sent to the server console under normal operation
An IBM Spectrum Protect Storage Agent and Client are installed on the same physical machine.
Which COMMMETHOD option should improve performance?
- A . SHAREDMEM
- B . COMPSERIAL
- C . TCPIP
- D . NAMEDPIPE
A
Explanation:
SHAREDMEM specifies the shared memory communication method option. This method uses the same area of memory to send data between several applications at the same time. Both the server and the backup-archive client must be configured to support the shared memory communication method, and they must be installed on the same computer.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 1691
What is the command to verify the correct installation of client management services?
- A . RestConfig.sh list/RestConfig.bat list
- B . dsmConfig.sh list/dsmConfig.bat list
- C . APIConfig.sh list/APIConfig.bat list
- D . CmsConfig.sh list/CmsConfig.bat list
Which server option automatically updates the physical device file on the IBM Spectrum Protect library and drive paths?
- A . SANDISCOVERY ON
- B . SANDISCOVERY AUTO
- C . SANDISCOVERY ACTIVE
- D . SANDISCOVERY OFF
A
Explanation:
ON Specifies that the server completes SAN discovery when the device path is changed, or when the QUERY SAN command is issued.
Incorrect Answers:
D: OFF
Specifies that the server does not complete SAN discovery when the device path is changed, or when the QUERY SAN command is issued. If the IBM Spectrum Protect server is not able to open a device, a message is issued but the path that is associated with the device is not taken offline. This value is the default.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 1671
To which policy type definition does the following sample policy retention information apply?
- A . archive copygroup
- B . backup copygroup
- C . backup and archive copygroups
- D . space management copygroup
B
Explanation:
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/srv.reference/ r_cmd_copygroup_query.html
Which component of IBM Spectrum Protect defines the data migration rules for Space Management for UNIX files?
- A . copy group
- B . management class
- C . node
- D . policy sets
B
Explanation:
A management class indicates a storage policy for a file. The storage policy determines whether a file can be migrated and how the migrated copy is stored.
References: https://www.ibm.com/support/knowledgecenter/SSERBH_8.1.0/hsmul/b_hsm_guide_unx_lnx.pdf, p 24
There are two servers, server1 and server2.
What is enabled when the command, SET DISSIMILARPOLICIES SERVER2 ONis issued on server1?
- A . It enables the use of more than one server1 policy for management of replicated data on server2.
- B . It enables server1 to manage replicated data on server2.
- C . It enables the policies on server2 to be used for management of replicated data from server1.
- D . It enables exporting policies from server1 to server2 so they can be used for management of replicated data.
C
Explanation:
Use the SET DISSIMILARPOLICIES command to enable the policies that are defined on the target replication server to manage replicated client-node data. If you do not use the policies on the target replication server, replicated client-node data is managed by policies on the source replication server.
ON specifies that replicated client-node data is managed by the policies that are defined on the target replication server.
Syntax:
Read syntax diagramSkip visual syntax diagram
.-OFf-.
>>-Set DISSIMILARPolicies–target_server_name–+—–+———><
+-OFf-+
‘-ON–‘References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.6/srv.reference/
r_cmd_dissimilarpolicies_set.html
Which three values can be adjusted with the Alerts Retention settings in the Operations Center? (Choose three.)
- A . Alert log pruning
- B . Closed alerts are retained
- C . Alerts stay active
- D . Alert log location
- E . Alerts stay inactive
- F . Active alerts changed to inactive
BCF
Explanation:
B: Choose one of the following options to define when an alert in the closed state is deleted from the Tivoli Storage Manager server: Delete the alert as soon as its state is changed to closed. Delete the alert after it is in the closed state for a defined time interval.
F: From the Operations Center, you can change the alert state from active to inactive.
Incorrect Answers:
E: If the message that triggered the alert does not recur within the defined time interval for the inactive state, the alert is changed from inactive to closed state.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.1/com.ibm.itsm.srv.doc/ c_oc_srv_alerts_ovw.html
Which command is used to display the last complete backup Date/Time of the IBM Spectrum Protect Database?
- A . QUERY DBSPACE
- B . QUERY DB F=D
- C . LIST DATABASE ALL
- D . SHOW DBINFO
B
Explanation:
To display detailed statistical information about the database. Issue the command:
query db format=detailed
or QUERY DB F=D
Out sample:
Database Name: TSM_DB2
Total Space of File System (MB):
1,748,800
Space Used on File System
(MB): 2,304,355
Space
Used by Database (MB): 448
Free Space Available (MB): 235,609
Total Pages: 32,776
Usable Pages: 32,504
Used Pages: 24,220
Free Pages: 8,284
Buffer Pool Hit Ratio: 99.3
Total Buffer Requests: 204,121
Sort Overflows: 0
Package Cache Hit Ratio: 89.8
Last Database
Reorganization: 05/25/2009 16:44:06
Full Device Class Name: FILE
Number of Database Backup Streams: 4
Incrementals
Since Last Full: 0
Last Complete Backup
Date/Time: 05/18/2009 22:55:19
Compress Database Backups: Yes
Protect Master
Encryption Key: No
Incorrect Answers:
A: QUERY DBSPACE (Display database storage space)
Use this command to display information about the directories used by the database to store data.
Example: Display database storage space information
Display information about database storage space. Issue the command:
query dbspace
Location Total Space of Used Space on Free Space
File System (MB) File System (MB) Available (MB)
—————— —————- ————— —————
d:tsmdb001 1,748,800 1,513,191.125 117,804.422
e:tsmdb002 1,748,800 1,513,191.125 117,804.422
References: https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.2/srv.reference/ r_cmd_db_query.html
Which statement is true regarding scheduling the IBM Spectrum PROTECT STGPOOLprocess?
- A . It can be scheduled to happen periodically during client backups.
- B . It runs automatically and should not be scheduled.
- C . It should be scheduled to only happen during expiration.
- D . It cannot be scheduled.
A
Explanation:
You cannot schedule multiple PROTECT STGPOOL operations to run concurrently. Wait for one PROTECT STGPOOL operation to finish before you start another.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 706
An IBM Spectrum Protect administrator checks the daily client’s schedules and sees that one client’s scheduled backup was missed.
What can cause this issue?
- A . The client scheduler service is not running.
- B . The server dsmserv.opt file is invalid.
- C . The client DSM.opt file is incorrect.
- D . The COMMMETHODparameter is incorrect.
C
Explanation:
The client options file is an editable text file that contains configuration information for the backup-archive client. The first time that you start the Windows Backup-Archive Client GUI, the installation program searches for an existing client options file, called dsm.opt. If this file is not detected, a client options file configuration wizard starts and prompts you to specify initial client configuration settings.
References: https://www.ibm.com/support/knowledgecenter/en/SSGSG7_7.1.0/com.ibm.itsm.client.doc/ t_cfg_crtmodoptwin.html
What is the purpose of using the VALIDATE REPLPOLICY command?
- A . to display the differences between policies with the same name of the source and target replication servers
- B . to update the replpolicy on the target server to match a policy of the same name on the source server
- C . must be run before running ACTIVATE REPLPOLICY when making changes to a replication policy D. to synchronize the policies between a source and a target replication server
A
Explanation:
Before you use the policies that are defined on a target replication server, you must issue the VALIDATE REPLPOLICY command for that target replication server. This command displays the differences between the policies for the client nodes on the source replication server and policies on the target replication server.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 1208
An IBM Spectrum Protect administrator suspects that at least one their tape drives has failed.
Which command can be used to check that tape drives are available and working?
- A . Q DRIVESTATUS FORMAT=DETAILED
- B . Q DRIVE LIBNAME DRIVENAME FORMAT=DETAILED
- C . Q DRIVES ALL FORMAT=DETAILED
- D . Q LIBNAME DRIVE=DETAILED
B
Explanation:
On the IBM Spectrum Protect server, issue the QUERY DRIVE FORMAT=DETAILED command to obtain the worldwide name (WWN) and serial number for the drive that will be connected to the NAS file server.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/srv.admin/ t_ndmp_drive_path_defining_nastsm.html
Which two LAN-free client options should be considered when attempting to tune restore performance? (Choose two.)
- A . txngroupmax
- B . diskbuffsize
- C . resourceutilization
- D . tcpbytelimit
- E . tcptxntime
AD
Explanation:
The following options are designed to control the transaction size for a Tivoli Storage Manager client/server session for the backup-archive client: txngroupmax
The txngroupmax option specifies the maximum number of objects (files and directories) that are included in a client session transaction. For Tivoli Storage Manager 5.2 and later, this option is set globally for the Tivoli Storage Manager server and can be set individually for each node by issuing the UPDATE NODE command. txnbytelimit
The txnbytelimit option specifies the maximum object size in KB that is included in a client session transaction. A single file exceeding this size is always processed as a single transaction.
References: http://www.tsmtutorials.com/2013/04/performance-tuning-tips-in-tivoli.html
Which information is provided to the IBM Spectrum Protect administrator by the QUERY DRMEDIA *WHERESTATE=MOUNTABLE?
- A . volumes to be checked out for vaulting
- B . volumes returning from the vault
- C . database backup volumes which are unexpired
- D . volumes which are available for use disaster recovery data
A
Explanation:
QUERY DRMEDIA (Query disaster recovery media)
Use this command to display information about database backup volumes, and volumes in copy storage pools, container-copy storage pools, and active-data storage pools. You can also use the command to create a file of executable commands to process the volumes.
WHERESTate specifies the state of volumes to be processed. Mountable: These volumes contain valid data and are available for onsite processing.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 661
Under which two conditions would client-side deduplication and compression be configured?
- A . to minimize network traffic to the IBM Spectrum Protect client
- B . to minimize compute resources on the IBM Spectrum Protect server
- C . to minimize network traffic to the IBM Spectrum Protect server
- D . to improve restore times
- E . to minimize compute resources on the IBM Spectrum Protect client
CD
Explanation:
Data deduplication is a method of reducing storage needs by eliminating redundant data. Client-side data deduplication is the process of removing the redundant data during a backup operation on the client system. Client-side data deduplication is especially effective when you want to conserve bandwidth between the IBM Spectrum Protect client and server.
References: https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.0/perf/t_client_tuning_dedup.html
Configure IBM Spectrum protect backup-archive client to use journal based backup. The configuration is written to which file?
- A . protect-journalbbd.ini
- B . spectrumprotect-journalbbd.ini
- C . journalbbd.ini
- D . tsmjbbd.ini
D
Explanation:
On Windows, the journal service configuration file is called tsmjbbd.ini.
References: http://www.tsmtutorials.com/2013/04/how-to-configure-journal-based-backup.html
How does an administrator check on the status of completed node-replication processes?
- A . use QUERY REPLICATION command on the source server
- B . from the Replication tab in Operations Center
- C . use QUERY REPLICATION command on the target server
- D . use QUERY REPLSERVER command on either target or source server
A
Explanation:
QUERY REPLICATION displays information about node replication processes. Issue this command on the server that acts as a source for replicated data.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 937
What is the purpose of running the command PROTECT STGPOOL?
- A . add enhanced security on a directory-container storage pool
- B . encrypt the data in a copy storage pool
- C . store a copy of the directory-container data in another storage pool
- D . write protect tape volumes
C
Explanation:
PROTECT STGPOOL protects a directory-container storage pool.
Use this command to protect data in a directory-container storage pool by storing a copy of the data in another storage pool on a replication target server or on the same server by protecting the data to tape.
References: IBM Spectrum Protect for Windows Version 8.1.0, Administrator’s Reference, p 706