HP HP Certification III HP2-T16 Questions & Answers
Question 61:
What happens during a differential backup? (Select two)
A. The archive bit is set to 1
B. The archive bit is left alone
C. The archive bit is reset to 0.
D. The transaction log is cleared.
E. The transaction log is left alone.
Correct Answer: BE
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 194\par Differential\par In a differential backup, only the new or changed files with the archive bit set on are backed up. After a file is backed up, the setting of its archive bit is NOT changed. A differential backup initially takes the least amount of time to perform, but the time it takes increases as more and more files are included.\par }
Question 62:
Which backup operations clear the archive bit after the file has been backed up? (Select two)
A. copy
B. normal
C. differential
D. incremental
Correct Answer: BD
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 194\par Full \par In a normal full backup, all specified files are backed up regardless of the value of the archive bit. After a file is backed up, its archive bit is turned off. A copy full backup also backs up all of the files but does not turn off, or clear, the archive bit. A full backup takes the longest to perform.\par Incrementa\par In an incremental backup, only the new or changed files with the archive bit set on are backed up. After a file is backed up, its archive bit is turned off, or cleared. An incremental backup takes much less time to perform than the full backup, but more than the differential backup.\par Differential\par In a differential backup, only the new or changed files with the archive bit set on are backed up. After a file is backed up, the setting of its archive bit is NOT changed. A differential backup initially takes the least amount of time to perform, but the time it takes increases as more and more files are included. \par }
Question 63:
What happens during an incremental backup? (Select two)
A. The archive bit is set to 1.
B. The archive bit is left alone
C. The archive bit is reset to 0.
D. The transaction log is cleared.
E. The transaction log is left alone.
Correct Answer: CD
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 194\par In an incremental backup, only the new or changed files with the archive bit set on are backed up. After a file is backed up, its archive bit is turned off, or cleared. An incremental backup takes much less time to perform than the full backup, but more than the differential backup.\par }
Question 64:
In the GFS backup tape rotation plan, which type of backup is the Grandfather?
A. copy
B. normal
C. differential
D. incremental
Correct Answer: B
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 302\par Grandfather-Father-Son tape rotation The Grandfather-Father-Son (GFS) tape rotation scheme is the most commonly used and requires a weekly backup capacity of at least double the server storage capacity. It uses three levels of backup to provide redundancy and security. Among other things, this scheme allows for different levels of data retention. The system administrator can select which generation of tapes to store temporarily and which to archive.\par GFS backup requires the following:\par Monthly grandfathers\par Weekly fathers\par Daily sons\par Example\par The system administrator typically performs a full backup every Monday (father) and incremental backups on Tuesdays, Wednesdays, and Thursdays (sons). The administrator performs another full backup at the end of the week (father) and another at the end of the month (grandfather).\par }
Question 65:
What are recommended procedures to ensure backup media is securely stored? (Select two)
A. Place the backup media in a fire-proof safe.
B. Ensure the switch on backup tapes is set to lock.
C. Store a copy of all backup media in a locked server rack.
D. Have a bonded third-party firm store backup media at a secure remote facility
E. Take a copy of all backup media home.
Correct Answer: AD
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 203\par Ensuring security of backup media\par The following are some of the methods used to secure backup media:\par Lock the media in an office.\par Lock the media in a cabinet with strict key control.\par Place the media in a safe or in a fire-safe.\par Engage a bonded third-party firm to store the media in their secure facility.\par }
Question 66:
What is considered a best practice for a data center?
A. leaving KVM stations unlocked for ease of administraton
B. labeling both ends of cables for easy or identifications
C. unplugging redundant power supplies to conserve power
D. storing all administrative passwords on a sheet in the locked data center
Correct Answer: B
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 234\par Equipment moves, rack additions, and personnel changes are much less disruptive when the cable infrastructure is planned, documented, and simplified through the use of proper spacing, cable ties, color coding, and accurate labeling.\par }
Question 67:
What is the easiest solution for a company to implement in order to defend data from being compromised if a physical hard disk is stolen?
A. a strong password policy for data shares
B. TPM (Trusted Platform Module) in conjunction with encryption software
C. Integrated Encryption System, enabled on disk arrays located in data centers
D. RAID 6 volumes used to protect again stolent data
Correct Answer: B
Question 68:
Which categories of questions should you ask the customer during needs analysis? (Select two) A. facility size
B. company location
C. future plans
D. business requirements
Correct Answer: CD
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 98\par Conducting a needs analysis\par Future plans\par What are the business goals?\par What is the projected role of the server?\par What is the projected operating system?\par Will RAID be implemented?\par Will the server be connected to more than one network?\par Current environment\par How much storage currently is used?\par Have storage needs grown over the last 12 months?\par Business requirements\par What is the expected availability of the server?\par Is server price or functionality more important?\par Is a rack or tower configuration preferred?\par Will backups be performed?\par Is power protection needed?\par What kinds of system management tools are needed?\par }
Question 69:
Which network management protocols are typically supported by system monitoring agents? (Select two)
A. Internet Message Access Protocol (IMAP)
B. Server Message Block (SMB)
C. Secure Sock Layer (SSL)
D. Intelligent Platform Management Interface (IPMI)
E. Web-based Enterprise Management (WBEM)
Correct Answer: DE
{\rtf1\ansi\ansicpg936\deff0\deflang1033\deflangfe2052{\fonttbl{\f0\fnil\fcharset0 MS Shell Dlg 2;}} \viewkind4\uc1\pard\lang2052\f0\fs17 Industry Standard Architecture - Student Guide 2 - Page 185\par Upgrading system monitoring agents \par Web-based Enterprise\par Management /\par Common Information\par Model (WBEM/CIM)\par The DMTF has recently replaced DMI with the Web-based Enterprise Management (WBEM) and Common Information Model (CIM) standards for system management. WBEM/CIM defines an object- based, client/ server model. In the WBEM/ CIM model, clients send requests for data about managed devices to the CIM object manager server which forwards those requests to providers for the specific devices. The providers return the requested data to the clients through the CIM object manager. The clients can also subscribe for indications about events that occur in the system.\par Intelligent Platform\par Management Interface (IPMI)\par IPMI is an embedded management specification for servers, storage devices, and other network devices. It defines a common and secure interface for monitoring system voltages, temperature, and fan speeds through the use of embedded monitors. It is designed to directly control system components while permitting remote system management and recovery of failed systems.\par }
Question 70:
What can you use to access the server console remotely when an operating system is not running? (Select two)
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only HP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HP2-T16 exam preparations and HP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.