Practice Free VCS-285 Exam Online Questions
What does an administrator need to enable Smart Meter?
- A . the Java plugin
- B . an xml file
- C . a text file with the NetBackup key
- D . a json file
Some NetBackup jobs are affected by the failure of a disk in an Advanced Disk pool, but the jobs are unavailable to view in the Activity Monitor.
In which two places can the administrator view NetBackup jobs affected by the disk failure? (Select two.)
- A . NetBackup Management > Reports > Status of Backups
- B . NetBackup Management > Reports > Disk Reports > Disk Storage Unit Status
- C . Media and Device Management > Device Monitor > Disk Pool
- D . NetBackup Management > Reports > All Log Entries
- E . NetBackup Management > Reports > Disk Reports > Disk Pool Status
Which supported step should an administrator perform to ensure all operating system logs are automatically sent from an appliance to a central logging server running Linux?
- A . configure syslog forwarding in OpsCenter
- B . configure a cron job on the appliance to copy the logs
- C . configure access to the appliance logs with the share open command
- D . configure syslog forwarding in the appliance CLISH
A NetBackup appliance administrator observes poor performance on backups to an MSDP pool. The job details indicate bpbkar is waiting for empty buffers.
Where should the administrator tune the appliance?
- A . in the bp. conf file’s NUM3ER_3ATA_BUFFERS_DISK setting
- B . in the bp. conf file’s NU1-I3ER_3ATA_3UFFERS setting
- C . Main_Menu > Settings > NetBackup DataBuffers > Size > Defaults
- D . Main_Menu > Settings > NetBackup DataBuffers > Size > Disk
An administrator wants to use a client as the VMware backup host.
Where is the name of the VMware backup host entered in NetBackup?
- A . Media and Device Management > Credentials > Virtual Machine Servers
- B . Host Properties > Clients > VMware Access Hosts
- C . Host Properties > Primary Server > VMware Access Hosts
- D . Access Management > Virtual Machine Servers
Which security algorithms are used for MSDP in NetBackup?
- A . AES 256 bit CTR encryption and SHA256 fingerprinting
- B . Blowfish encryption and MD5 fingerprinting
- C . AES encryption and MD5 fingerprinting
- D . AES 128 bit encryption and SHA-2 fingerprinting
An administrator wants to delete a protection plan, but notices that the Yes option is disabled on the Delete (confirmation prompt) window when attempting to do so.
Which task must the administrator complete to allow deletion of the protection plan?
- A . expire all the backups associated with the protection plan
- B . cancel the active job for the protection plan
- C . unsubscribe all the assets from the protection plan
- D . restart the nbpem service on the primary server
The primary server catalog is being recovered to a new server.
The administrator receives the message displayed below:
Please insert the following media and run the volume configuration wizard or the vmupdate command to update the NetBackup database.
Host – trainl
MediaID – GBP847
Barcode – GBP847S1
In the NetBackup Administration Console, barcode GBP847S1 is associated with media ID P847S1.
How should the administrator proceed?
- A . use bplabel to change the media ID > re-inventory the library > perform recovery
- B . delete the tape > set the media ID generation rule accordingly > re-inventory the library > run recovery
- C . use nbdelete to remove the media id > use vmadd to re-add the media id > re-inventory the library > perform recovery
- D . delete the tape > set the barcode rule accordingly > re-inventory the library > run recovery
Which command should an administrator use to show a list of incomplete copies of lifecycle managed images?
- A . bpimagelist
- B . bpimmedia
- C . bpimage
- D . nbstlutiil
An administrator needs to store secure tape copies of protected data to an offsite location.
How can the administrator automatically eject tape media daily and create detailed reports?
- A . enable the encryption attribute on the vault policy to perform automated ejects and create reports
- B . use tape drives that support hardware encryption and use a storage lifecycle policy to perform automated ejects and create reports
- C . use tape drives that support hardware encryption and use a vault policy to perform automated ejects and create reports
- D . encrypt the tapes using hardware encryption and use a bpstart_notify scripts to perform automatic ejects and create reports