Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following HH0-270 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

HH0-270 Exam Dumps - HDS Implementation Specialist - Business Continuity Exam

Go to page:
Question # 9

A customer wants to permanently delete a ShadowImage environment while the primary volumes are online and the pairs are in "PAIR" state; the secondary volumes must still be usable. The customer is using Command Control Interface (CCI) and the ShadowImage device group name is SI1_db01. Which CCI command sequence should be used to permanently delete the ShadowImage pairs given the stated objectives?

A.

pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01

B.

pairsplit -g SI1_db01; pairsplit -g SI1_db01 -S

C.

pairsplit -g SI1_db01 ; pairsplit -g SI1_db01 -rw

D.

pairsplit -g SI1_db01 -S; pairsplit -g SI1_db01 -rw

Full Access
Question # 10

An Hitachi Data Systems customer is using HiCommand Device Manager (HDvM) to manage TrueCopy pairs. An attempt to create a pair fails and the content of the resulting HDvM error message is not sufficient to diagnose the reason for the failure. After escalating to the support group for further analysis, a request is made by the support group to provide the relevant HDvM logs. Which two utilities must be run to collect the requested HDvM logs? (Choose two.)

A.

the TIA utility

B.

the TIC utility

C.

the jpcras utility

D.

the hcmdsgetlogs utility

Full Access
Question # 11

A customer wants a Copy-on-Write SnapShot (CoW) pool configured to be 1TB on a Universal Storage Platform USP1100. However, the created snapshots should initially use no more than 750GB of the pool. What should be configured to achieve this requirement?

A.

Create 750GB of V-VOLs.

B.

Set the pool threshold value to 75%.

C.

Set the Pending Update Data Rate to 75%.

D.

Create a CCI script to send an email if more than 750GB is used.

Full Access
Question # 12

A customer asks you to review a plan for installing HiCommand Protection Manager (HPtM) software to protect Microsoft Exchange 2003. You are aware that Exchange 2003 is a very critical business application for this customer. Their plan is to use one large LUN for the public store and check point files and second large LUN for the mail box store and the transaction log.

Which solution will provide the customer with maximum protection?

A.

The customer should use four different mounted LUNs: one for public stores, one for mailbox stores, one for checkpoint files, and one transaction log files.

B.

The customer should use three different mounted LUNs: one for public stores, one for mailbox stores and checkpoint files, and one for transaction log files.

C.

The customer should use three different mounted LUNs: one for public stores and mailbox stores, one for checkpoint files, and one for transaction log files.

D.

The customer should use four different mounted LUNs: two LUSE LUNs for public and mailbox stores, one for checkpoint files, and one for transaction log files

Full Access
Question # 13

A customer would like to automate the mounting of suspended ShadowImage secondary volumes in a Windows CCI script. Which CCI command would be used to assign a volume to a Windows drive letter?

A.

raidscan -x mount

B.

raidscan -m mount

C.

raidmount -x mount

D.

raidmount -m mount

Full Access
Question # 14

A customer has a TrueCopy Asynchronous environment between two USP100 arrays with a cascaded ShadowImage off of the TrueCopy secondary volumes at the recovery site. The customer would like the ShadowImage volumes synchronized and suspended every four hours for data protection from a rolling disaster. Which steps should be scripted to ensure data consistency on the ShadowImage volumes with the lowest impact to the recovery point?

A.

1) Resynchronize ShadowImage volumes using Quick Split.

2) Suspend ShadowImage volumes.

B.

1) Resynchronize ShadowImage volumes.

2) Suspend ShadowImage volumes using At-Time Split.

C.

1) Suspend TrueCopy volumes.

2) Resynchronize ShadowImage volumes.

3) Suspend ShadowImage volumes.

4) Resynchronize TrueCopy volumes.

D.

1) Suspend TrueCopy volumes.

2) Resynchronize ShadowImage volumes.

3) Suspend ShadowImage volumes using At-Time Split.

4) Resynchronize TrueCopy volumes.

Full Access
Question # 15

A customer has a multi-target Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still working. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data. What must be performed first at the local data center?

A.

Perform swap takeover for the HUR pairs.

B.

Perform swap takeover for the TrueCopy pairs.

C.

Perform Delta Resync between the local and remote arrays.

D.

Perform Delta Resync between the local and production arrays.

Full Access
Question # 16

A customer has purchased an Hitachi Storage Cluster (HSC) for Microsoft Environments. Which component is included?

A.

VBS scripts

B.

Microsoft Cluster

C.

Hitachi VSS Agent

D.

Hitachi client for Microsoft Exchange

Full Access
Go to page: