A customer has implemented a Disaster Recovery solution which involves replicating his data over 100km with TrueCopy Synchronous. Which two describe the customer's reasons for doing this? (Choose two.)
A. There must be an exact copy of the data at all times.
B. The customer needs a cost-effective Disaster Recovery solution.
C. The customer's auditors have dictated this for regulatory reasons.
D. The customer's auditors need exact copies of the data to check consistency.
An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP) with Consistency Groups. When using Storage Navigator, which option in the TrueCopy Configuration Options panel must be selected to define the Consistency Groups?
A. Pair Options
B. RCU Options
C. Usage Monitor
D. Async Options
After executing a paircreate command you find that the secondary volume is mounted to a system. Which action sequence should be used to correct this situation?
A. Unmount the secondary volume.
B. Unmount the secondary volume then execute the paircreate command again.
C. Execute pairsplit -S, unmount the secondary volume, then execute the paircreate command again.
D. Unmount the secondary volume, execute pairsplit -S, then execute the paircreate command again.
You have been asked to install HiCommand Protection Manager (HPtM) software in an environment where integration with backup software is required. Which three must be in place before you begin the installation? (Choose three.)
A. RAID Manager CCI
B. Netbackup MS SQL server agent
C. Netbackup or Backup Exec software
D. HiCommand Device Manager software
E. ShadowImage software or Copy-on-Write Snapshot software
An Hitachi Data Systems customer is using HiCommand Device Manager (HDvM) to manage TrueCopy pairs. An attempt to create a pair fails and the content of the resulting HDvM error message is not sufficient to diagnose the reason for the failure. After escalating to the support group for further analysis, a request is made by the support group to provide the relevant HDvM logs. Which two utilities must be run to collect the requested HDvM logs? (Choose two.)
A. the TIA utility
B. the TIC utility
C. the jpcras utility
D. the hcmdsgetlogs utility
A customer has a 20TB database at his primary site. The database is copied using TrueCopy to a second site about 20km away. There are problems with the link to the second site. The second copy of the database should always be the same as the primary copy. Which solution should be implemented?
A. Specify FENCELEVEL=DATA on the TrueCopy links.
B. Specify FENCELEVEL=NEVER on the TrueCopy links.
C. Create a third copy of the database using ShadowImage at the primary site.
D. Create a third copy of the database using Universal Replicator at a third site.
A customer has a 20TB database on external storage attached to a USP600. The database is used occasionally for high value reference data, It is also prone to corruption. Which steps should the customer take to minimize the impact of the corruption?
A. The database should be copied permanently to a secondary site using TrueCopy.
B. Move the REDO logs to the USP internal storage and leave the data files on external storage.
C. A Copy-On-Write snapshot of the database should be taken once per day for restore in the event of corruption.
D. A Shadow Image copy of the database should be taken once per day onto internal storage and that should be used instead.
A customer must implement a second data center about 80km from the primary data center. The intent is to implement the extended cluster server feature. Which two statements should the customer be aware of? (Choose two.)
A. Each node has its own quorum disk.
B. Each node can operate independently.
C. Each node requires a quorum majority to run.
D. Each node must start on its own before joining the cluster.
If a CCI instance fails to start, which two log files may contain messages related to the problem? (Choose two.)
A. horcm.log
B. horcm_PID.trc
C. horcm_HOST.log
D. horcc_HOST.log
A customer has a multi-target Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still working. The customer wants to bring up the application on a host at the local data center and still maintaintwo remote copies of the data, What must be performed first at the local data center?
A. Perform swap takeover for the HUR pairs.
B. Perform swap takeover for the TrueCopy pairs.
C. Perform Delta Resync between the local and remote arrays.
D. Perform Delta Resync between the local and production arrays.