Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Hitachi HH0-400 Exam - Cheat-Test.com

Free HH0-400 Sample Questions:

1. A customer's regulatory requirements require that they will have valid data at the recovery site regardless of any equipment or logical failure in the system or environment.
How many DR site point-in-time copies are required if they want to be able to perform recovery testing?
A.1
B.2
C.3
D.4
Answer: B

2. What are two best practices for DR testing? (Choose two.)
A.Tests should be done at least twice a year.
B.The secondary copy of data (B) can be used as the DR test copy.
C.Testing should only be performed when new applications are added.
D.When using a point-in-time copy solution, another copy (D) should be used for DR testing purposes.
Answer: AD

3. What are two risks when extending a production SAN over distance? (Choose two.)
A.A telecommunications outage will segment the fabric.
B.RSCN storms may ensue from intermittent telecommunications issues.
C.Any differences in domain IDs on the fabric switches between the sites will keep the fabrics from merging.
D.Some Fibre Channel frames may occasionally cross the inter-site links and reach the incorrect storage array.
Answer: AB

4. Which formula is appropriate to use when calculating resource requirements for TrueCopy Asynchronous?
A.Bandwidth = [(peak write Mb/sec) / network compression ratio] + safety margin
B.Journal Capacity = (peak write Mb/sec) * anticipated network outage duration (minimum of 6 GB)
C.Number of RAID groups for journal volumes = (peak write Mb/sec) / (total throughput per RAID group)
D.Host delay = 2 * [(distance between MCU and RCU) / (speed of light in glass)] + losses due to network overhead
Answer: A

5. A customer is using TrueCopy Asynchronous to continuously replicate a database's data and log volumes.
Which two statements are true? (Choose two.)
A.A database checkpoint should be forced immediately upon failover.
B.In the case of a planned outage, log volumes may not include all transactions.
C.In the case of an unplanned outage, log volumes may not include all transactions.
D.At recovery time, the database will rollback all uncommitted transactions in the logs.
Answer: CD

6. A customer is using TrueCopy to replicate a database's data and log volumes.
Which strategy will assist the customer with recovery from logical corruption such as a mistakenly dropped table?
A.Use ShadowImage to create point-in-time copies for recovery.
B.Use TrueCopy for data volumes only. Use log shipping to transfer individual transactions to the recovery facility.
C.Manage database checkpointing so that logs retain sufficient transactions to allow playback up to the corruption event.
D.Inflow control should be used to throttle incoming write traffic so that updates can be identified and prevented prior to their application onto the secondary volumes.
Answer: A

7. Which is required for I/O consistent recoverability?
A.Clustering software is in use at the recovery facility.
B.Recovery volumes have preserved write order fidelity.
C.Buffers on production hosts were fully de-staged to physical disk.
D.Log shipping is used to transfer transactions to the recovery facility.
Answer: B

8. What are three regulatory requirements pertaining to data retention? (Choose three.)
A.Basel II
B.ISO 9000
C.SEC rule 17a
D.Email Archiving
E.Sarbanes-Oxley Act
Answer: ACE

9. Basel II is the second Basel Accord and represents recommendations by bank supervisors and central bankers from 13 countries making up the Basel Committee on banking supervision to revise the international standards for measuring the adequacy of a bank's capital.
Which three statements are true for Basel II? (Choose three.)
A.It can easily be circumvented by regulatory arbitrage.
B.It ensures that capital allocation is less risk conscious.
C.It ensures that capital allocation is more risk conscious.
D.It separates operational risk from credit risk, and quantifies both.
E.It attempts to align economic and regulatory capital more closely to reduce the scope for regulatory arbitrage.
Answer: CDE

10. Which two statements are true for RPO? (Choose two.)
A.If the recovery point is within hours, no replication is necessary.
B.If the recovery point is within minutes, asynchronous (or off-line) replication may be suitable.
C.If the recovery point of an application is set to within seconds of a disaster occurring, synchronous (or live) replication (duplication) of data should be considered.
D.Global clustering, manual migration or tape restore are various options that are dependent on the acceptable time scales required to restore systems to full operations.
Answer: BC

11. Which statement describes RPO?
A.The point-in-time to which data must be copied to start tape backups.
B.The point-in-time to which data must be restored in order to start backup operations.
C.The point-in-time to which data must be restored in order to resume processing transactions.
D.The point-in-time to which data must be archived in order to resume processing transactions.
Answer: C

12. A RPO of six hours has been defined.
Which two statements are true of the selected RPO? (Choose two.)
A.Backups or other data copies must be made at least every six hours.
B.Systems must be restored to the state they were in no longer than six hours ago.
C.RPO defines the environment's ability to withstand major disruptions to systems and related business processes.
D.A complete system restore is necessary including system and boot partitions, system settings, applications, and data to their original state at some point prior to a disaster.
Answer: AB

13. What is the main difference between RPO and RTO?
A.The RTO focuses on how much downtime is acceptable, while the RPO focuses on how much outdated data an organization can tolerate.
B.The RPO focuses on how much downtime is acceptable, while the RTO focuses on how much outdated data an organization can tolerate.
C.The RPO focuses on how much backup time is acceptable, while the RTO focuses on how much outdated data an organization can tolerate.
D.The RTO focuses on how much backup time is acceptable, while the RPO focuses on how much outdated data an organization can tolerate.
Answer: A

14. Which statement is true for RTO?
A.RTO indicates the time required to recover or fail over network operations.
B.RTO describes the age of the data you want to restore in the event of a disaster.
C.RTO is the amount of data which must be restored to the predetermined RPO after an outage.
D.RTO is the period of time after an outage in which the systems and data must be restored to the predetermined RPO.
Answer: D

15. A customer's production facilities are located several hundred miles apart. The customer is cost conscious, and wants to reduce recurring expenses.
Which two replication strategies can be used to balance recoverability against bandwidth costs? (Choose two.)
A.Universal Replicator
B.TrueCopy synchronous
C.TrueCopy Asynchronous
D.TrueCopy synchronous from a ShadowImage secondary volume
Answer: AD

16. A customer is concerned with maintaining real time recovery volumes across several hundred miles with minimal impact to host response time. Network infrastructure between the two facilities is subject to periodic bandwidth reductions due to surges in overall network activity. The customer is unwilling to invest in additional network capacity.
Which replication approach would you recommend for this application?
A.Universal Replicator
B.TrueCopy synchronous
C.TrueCopy Asynchronous
D.TrueCopy synchronous from a ShadowImage secondary volume
Answer: A

17. Which technique should be used to identify whether channel extension products are currently in place?
A.Interview customer personnel.
B.Review replication properties using Storage Navigator.
C.Use RAID Manager to identify devices attached to the Fibre Channel fabric.
D.Perform a SCSI inquiry to determine which channel extension devices are present.
Answer: A

18. Which three software products would be used to identify volumes that are currently being replicated with TrueCopy? (Choose three.)
A.RAID Manager
B.Storage Navigator
C.Protection Manager
D.Universal Volume Manager
E.Business Continuity Manager
Answer: ABE


© 2014 Cheat-Test.com, All Rights Reserved