Question 21
You meet with a customer about a new data protection solution. One or the most important requirements is low RTO and RPO numbers. In the range of minutes.
The amount of data to be backed up is in the range of 50TB on an ISCSI based HPE Nimble array.
Is this a backup target that can validly be considered for the new solution?
Solution: Install a NAS device on the ISCSI network to enable data replication from the SAN to the NAS device by the backup application, thus allowing fast recovery over the high speed storage network
The amount of data to be backed up is in the range of 50TB on an ISCSI based HPE Nimble array.
Is this a backup target that can validly be considered for the new solution?
Solution: Install a NAS device on the ISCSI network to enable data replication from the SAN to the NAS device by the backup application, thus allowing fast recovery over the high speed storage network
Question 22
As It relates to application consistent backups, does this statement accurately describe the volume Shadow copy Service (VSS)?
Solution:The use of the VSS mechanism is only possible on Windows based VM's
Solution:The use of the VSS mechanism is only possible on Windows based VM's
Question 23
A customer contacts you tor assistance with performance troubleshooting of Ihelr backup environment because over the last few days they notice Increasing times tor backup completion They see no apparent reason for this, since the data volume to be backed up did not change unusually compared to the previous days and weeks.
You also notice that the deduplication ratio, historically steady at about 20:1. is now gradually declining Is this a potential cause or the problem?
Solution:There might be a network bottleneck, which could increase backup times Verify the network traffic.
You also notice that the deduplication ratio, historically steady at about 20:1. is now gradually declining Is this a potential cause or the problem?
Solution:There might be a network bottleneck, which could increase backup times Verify the network traffic.
Question 24
Does this topology/implementation comply with the 3-2-1 rule of data protection?
Solution:An HPE MSA array creating local snapshots on the same array Backups are made with Veeam to a local HPE StoreOnce system using MAS shares Within Veeam a copy fob is active to a Veeam Cloud Connect repository target hosted at a public cloud provider
Solution:An HPE MSA array creating local snapshots on the same array Backups are made with Veeam to a local HPE StoreOnce system using MAS shares Within Veeam a copy fob is active to a Veeam Cloud Connect repository target hosted at a public cloud provider
Question 25
As it relates to application consistent backups, does this statement accurately describe the Volume Shadow copy Service (VSS)?
Solution:The VSS requestor instructs each VSS provider to perform a task to quiesce data.
After each VSS provider has completed these pre-backup tasks, the VSS writer Instructs the VSS requestor to create the snapshot.
Solution:The VSS requestor instructs each VSS provider to perform a task to quiesce data.
After each VSS provider has completed these pre-backup tasks, the VSS writer Instructs the VSS requestor to create the snapshot.