Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Hitachi HH0-270 Exam - Cheat-Test.com

Free HH0-270 Sample Questions:

Q: 1 Volume Shadow Copy Service (VSS) coordinates activities of three components to protect mission critical databases, file systems, and application data when used with HiCommand Protection Manager (HPtM) software. What are the three components? (Choose three.)
A. MS Exchange VSS writer.
B. MS Exchange VSS reader.
C. MS Exchange VSS provider.
D. Protection Manager VSS requestor.
E. Raid Manager Shadow Copy provider.
Answer: A, D, E

Q: 2 Which statement is true about HiCommand Tiered Storage Manager?
A. It works as a migration controller.
B. It moves the LDEV number before copying data.
C. Migration using Tiered Storage Manager is disruptive to the continuance of a business.
D. Tiered Storage Manager focuses on short term improvements of a storage system's performance.
Answer: A

Q: 3 A customer wants to use TrueCopy Asynchronous to copy databases to a data center 200km away from the primary site. The applications for these databases have very severe SLAs. Which two factors must be considered? (Choose two.)
A. All data volumes must be controlled by a file system.
B. All data volumes in the target storage unit must be offline.
C. All data volumes in the database must be in the same Consistency Group.
D. All data volumes in the database must be on the same type of RAID to ensure good performance.
Answer: B, C

Q: 4 A customer has implemented a Disaster Recovery solution which involves replicating his data over 100km with TrueCopy Synchronous. Which two describe the customer's reasons for doing this? (Choose two.)
A. There must be an exact copy of the data at all times.
B. The customer needs a cost-effective Disaster Recovery solution.
C. The customer's auditors have dictated this for regulatory reasons.
D. The customer's auditors need exact copies of the data to check consistency.
Answer: A, C

Q: 5 The Hitachi Storage Cluster (HSC) with Windows 2003 uses which method to prevent "Split Brain Syndrome"?
A. majority node sets
B. shared quorum disk
C. extended SAN with multiple quorum disks
D. -quorum parameter for horctakeover
Answer: A

Q: 6 You are working on a Business Continuity plan for one of your customers. The customer states, "This business process is very important for us so we cannot afford any data loss. However we can tolerate three hours to recover." Which two statements correctly reflect the business process requirements? (Choose two.)
A. The business recovery time objective is zero.
B. The business recovery time objective is three hours.
C. The business process recovery point objective is zero.
D. The business process recovery point objective is three hours.
Answer: B, C

Q: 7 Your customer's business critical applications are backed up every night. The backup starts at 7:00 PM and finishes at 7:00 AM the next morning. The RPO and RTO take about two hours. The customer's focus and threat sources have changed making immediate application availability a requirement. When an update to the Business Continuity plan was recently completed, the backup was ruled out as a proper solution. Which solution will satisfy the customer's new requirements?
A. electronic tape vaulting
B. synchronous remote disk copy
C. asynchronous remote disk copy
D. synchronous remote disk copy with extended server clustering
Answer: D

Q: 8 A customer uses ShadowImage to create a copy of an online UNIX database so that it can be mounted and started on another server for testing purposes. Which two should be scripted on the recovery server prior to resynchronizing the ShadowImage pairs to ensure any volume manager changes are reflected on the recovery server after the next ShadowImage suspend? (Choose
two.)
A. unmount filesystem(s)
B. deport/export disk group(s)
C. SCSI inquiry to discover device(s)
D. perform fsck on the filesystem(s)
Answer: A, B

Q: 9 A customer has set up an Hitachi Storage Cluster (HSC) for Microsoft Environments called "SQLclus". The name of the Generic Script resource is "hscscript". The name of the resource that is dependent on hscscript is called "MSSQLlun" In which two files do you find the name of the CCI device group? (Choose two.)
A. horcm.conf
B. SQLclus.conf
C. MSSQLlun.conf
D. hscscript.conf
Answer: A, D

Q: 10 An Hitachi Data Systems customer is implementing a TrueCopy Extended Distance solution on an Adaptable Modular Storage (AMS) system. Which configuration is supported?
A. TrueCopy Extended Distance with 20 Consistency Groups.
B. TrueCopy Extended Distance Consistency Group pairs in parallel to TrueCopy Synchronous pairs.
C. TrueCopy Extended Distance Consistency Group with a ShadowImage copy taken from the S-VOL.
D. Two or more TrueCopy Extended Distance Consistency Groups defined with opposite copy direction.
Answer: D

Q: 11 You are setting up an Hitachi Storage Cluster (HSC) for Microsoft Environments for a customer who wishes to have a fileshare resource called engDep highly available. This fileshare will be configured on a Physical Disk called diskE . The Generic Script resource is called SCScript.
What is the correct dependency order for setting up these resources?
A. EngDep is dependent on diskE and diskE is dependent on SCScript
B. EngDep is dependent on diskE and engDep is dependent on SCScript
C. DiskE is dependent on engDep and diskE is dependent on SCScript
D. EngDep is dependent on SCScript and diskE is dependent on SCScript
Answer: A

Q: 12 A customer has a multi-target Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still working. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data. What must be performed first at the local data center?
A. Perform swap takeover for the HUR pairs.
B. Perform swap takeover for the TrueCopy pairs.
C. Perform Delta Resync between the local and remote arrays.
D. Perform Delta Resync between the local and production arrays.
Answer: B

Q: 13 You are planning to install HiCommand Protection Manager (HPtM) software to protect Microsoft SQL and Microsoft Exchange servers. Which option contains the necessary components?
A. SQL and Exchange Modules and Copy Controller agent
B. Console, Copy Controller, VSS agent for MS Exchange and SQL
C. SQL and Exchange Modules, ShadowImage and Copy-on-Write SnapShot
D. Console, Copy Controller, MS Exchange server and SQL server options, Raid Manager Shadow Copy provider
Answer: D

Q: 14 On the Storage Navigator frame for a TrueCopy pair operation, the"Status" column indicates PDUB. What is the status of the pairs indicating PDUB?
A. This is a TrueCopy LUSE status of a pair suspended error.
B. This status indicates that the TrueCopy pair is in the initial copy.
C. One or more LDEV pairs are SMPL on a TrueCopy LUSE volume.
D. The status of the TrueCopy software LUSE volume is in the initial copy.
Answer: C

Q: 15 An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP). Where would you obtain the latest information regarding supported features and hardware?
A. Country Product Manager
B. USP User and Reference Guide
C. USP TrueCopy User and Reference Guide
D. Microcode ECN (Engineering Change Notice)
Answer: A

Q: 16 A customer is planning to use Universal Replicator for Disaster Recovery for several mission critical applications between two sites connected by an OC-3. Which two are required before replication can take place? (Choose two.)
A. Channel extenders must be in place and functional.
B. Journal disk space must be installed on both arrays.
C. Sufficient buffer credits must be available on the switches at both sites.
D. Two CCI servers must be configured with network connectivity between them.
Answer: A, B

Q: 17 A customer is concerned about a large number of changes being made daily to production systems over a period of three weeks. The customer decides to make Copy-on-Write SnapShot copies of the database at the start of every day to easily restore the most recent version should it be necessary. Each copy must be kept for one week. The average change to the database is 10 percent daily. The database is 10TB in size. Which two considerations are relevant? (Choose two.)
A. The pool should be defined as being 7TB in size.
B. The pool should be defined as being 10TB in size.
C. The pool should be on separate parity groups than the production volumes.
D. The pool should be defined on the same type of RAID groups as the production database.
Answer: B, C

Q: 18 Your customer must decide which Three Data Center (3DC) Business Continuity Solution configuration meets expectations. Which 3DC configuration is accurate?
A. 3DC Multi-target with a Journal Group on all three USPs.
B. 3DC Multi-target with a Journal Group on each of two USPs.
C. 3DC Pass-Through Cascade with a Journal Group on two USPs.
D. 3DC Pass-Through Cascade with a Journal Group on three USPs.
Answer: A

Q: 19 A customer is using Universal Replicator to replicate an application's database. The customer wants to perform a Disaster Recovery test. The Universal Replicator pairs are suspended and the database and application are successfully started on the recovery server. The end-users at the production site are not able to access the application at the recovery site. However, they can ping the recovery server. What are two reasons for the issue described? (Choose two.)
A. The correct users have not been created on the recovery server.
B. The correct SAN zoning has not been configured at the recovery site.
C. The needed network ports have not been opened to the recovery site.
D. The recovery server IP address does not match the IP address of the production server.
Answer: A, C

Q: 20 A customer wishes to create copies of a database using ShadowImage on an Adaptable Modular Storage (AMS) system. Which three products would be used to accomplish this? (Choose three.)
A. Storage Navigator Modular
B. Command Control Interface (CCI)
C. HiCommand Device Manager (HDvM)
D. HiCommand Replication Monitor (HRpM)
E. HiCommand Storage Services Manager (HSSM)
Answer: A, B, C

Q: 21 A customer is buying an Hitachi Storage Cluster (HSC) for Microsoft Environments for the purpose of having a long distance cluster. Which two factors should be considered for the configuration? (Choose two.)
A. IP addresses must be static and bi-directional.
B. IP addresses must be mobile and bi-directional.
C. Network latency must not be longer than 100 milliseconds.
D. Network latency must not be longer than 500 milliseconds.
Answer: B, D

Q: 22 A customer would like to view the pool usage for a Copy-on-Write SnapShot (CoW) environment using CCI. Which CCI command should the customer use?
A. inqraid -p pid
B. raidscan -p pid
C. pairdisplay -p pid
D. raidvchkscan -v pid
Answer: D

Q: 23 Command Control Interface (CCI) is being used to manage TrueCopy and ShadowImage pairs. An error has occurred, but there is no indication of the error in any of the CCI HORCM logs or traces. Which two locations could be checked for CCI error messages? (Choose two.)
A. the UNIX syslog
B. the Windows event log
C. the UNIX CCI installation directory
D. the Windows CCI installation directory
Answer: A, B

Q: 24 An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP) with Consistency Groups. When using Storage Navigator, which option in the TrueCopy Configuration Options panel must be selected to define the Consistency Groups?
A. Pair Options
B. RCU Options
C. Usage Monitor
D. Async Options
Answer: D

Q: 25 After executing a paircreate command you find that the secondary volume is mounted to a system. Which action sequence should be used to correct this situation?
A. Unmount the secondary volume.
B. Unmount the secondary volume then execute the paircreate command again.
C. Execute pairsplit -S, unmount the secondary volume, then execute the paircreate command again.
D. Unmount the secondary volume, execute pairsplit -S, then execute the paircreate command again.
Answer: C

Q: 26 Your customer must establish a Three Data Center (3DC) Business Continuity Solution using Universal Storage Platform (USP) systems. Which three tasks are required to setup the solution? (Choose three.)
A. Enable bi-directional paths between local and distant USPs.
B. Upgrade the shared memory size of the local and distant USPs.
C. Upgrade the shared memory size on all three USPs by 25 percent.
D. Enable bi-directional Fibre Channel links between the primary and local USPs.
E. Implement Journal Groups of equal size and performance on local and distant USPs.
Answer: A, D, E

Q: 27 A customer has a Windows CCI server controlling both Universal Replicator and ShadowImage pairs. The customer would like to see the status of the Universal Replicator pairs. Which command can the customer issue prior to using the pairdisplay command to ensure only the status of the Universal Replicator pairs are shown?
A. set HORCC_MRCF=
B. unset HORCC_MRCF
C. set HORCC_MRCF=1
D. export HORCC_MRCF=1
Answer: A

Q: 28 A customer wants to permanently delete a ShadowImage environment while the primary volumes are online and the pairs are in "PAIR" state; the secondary volumes must still be usable. The customer is using Command Control Interface (CCI) and the ShadowImage device group name is SI1_db01. Which CCI command sequence should be used to permanently delete the ShadowImage pairs given the stated objectives?
A. pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01
B. pairsplit -g SI1_db01; pairsplit -g SI1_db01 -S
C. pairsplit -g SI1_db01 ; pairsplit -g SI1_db01 -rw
D. pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01 -rw
Answer: B

Q: 29 A customer asks you to review a plan for installing HiCommand Protection Manager (HPtM) software to protect Microsoft Exchange 2003. You are aware that Exchange 2003 is a very critical business application for this customer. Their plan is to use one large LUN for the public store and check point files and second large LUN for the mail box store and the transaction log.
Which solution will provide the customer with maximum protection?
A. The customer should use four different mounted LUNs: one for public stores, one for mailbox stores, one for checkpoint files, and one transaction log files.
B. The customer should use three different mounted LUNs: one for public stores, one for mailbox stores and checkpoint files, and one for transaction log files.
C. The customer should use three different mounted LUNs: one for public stores and mailbox stores, one for checkpoint files, and one for transaction log files.
D. The customer should use four different mounted LUNs: two LUSE LUNs for public and mailbox stores, one for checkpoint files, and one for transaction log files
Answer: A

Q: 30 You have been asked to install HiCommand Protection Manager (HPtM) software in an environment where integration with backup software is required. Which three must be in place before you begin the installation? (Choose three.)
A. RAID Manager CCI
B. Netbackup MS SQL server agent
C. Netbackup or Backup Exec software
D. HiCommand Device Manager software
E. ShadowImage software or Copy-on-Write Snapshot software
Answer: A, C, E


© 2014 Cheat-Test.com, All Rights Reserved