Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

HH0-270 Questions and Answers

Note! Following HH0-270 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

HH0-270 Questions and Answers

Question # 6

Your customer must decide which Three Data Center (3DC) Business Continuity Solution configuration meets expectations. Which 3DC configuration is accurate?

A.

3DC Multi-target with a Journal Group on all three USPs.

B.

3DC Multi-target with a Journal Group on each of two USPs.

C.

3DC Pass-Through Cascade with a Journal Group on two USPs.

D.

3DC Pass-Through Cascade with a Journal Group on three USPs.

Full Access
Question # 7

An Hitachi Data Systems customer is implementing a TrueCopy Asynchronous solution. They want to know if the bandwidth of their remote links is sufficient for their configuration. Which two criteria are relevant to the bandwidth of TrueCopy Asynchronous remote links? (Choose two.)

A.

the average LUN size

B.

the average block size of replicated data

C.

the peak number of write I/Os per second

D.

the number of TrueCopy Asynchronous pairs

Full Access
Question # 8

A customer wants to replicate a database on a UNIX host with Universal Replicator but exclude the temporary and backup file systems to reduce the replication workload. What should be reviewed to ensure this is possible?

A.

SAN zone layout map

B.

file system usage report

C.

database relationship map

D.

volume/disk group volume layout

Full Access
Question # 9

Which two configurations are good candidates for a Three Data Center (3DC) Multi-target type replication without purchasing additional hardware? (Choose two.)

A.

Two local 9980v connected through a SAN to Windows 2003 servers with a TrueCopy Asynchronous link to a distant 9980v 300km apart connected through a SAN to disaster recovery Windows 2003 servers.

B.

Two local USPs connected through a SAN to Windows 2003 servers both having a TrueCopy Asynchronous link to a distant USP 300km apart connected through a SAN to disaster recovery Windows 2003 servers.

C.

One primary USP connected through a SAN to Windows 2003 servers having a TrueCopy Synchronous link to a disaster recovery local USP. A secondary site 300km apart with a USP connected through a SAN to Windows 2003 servers.

D.

A primary USP connected through a SAN to Windows 2003 servers. A secondary USP connected through a SAN to Sun servers. Both USPs being cross copy connected by TrueCopy synchronous. A disaster recovery distant USP 300km apart off-line to any CPU connected to local USPs by a Universal Replicator.

Full Access
Question # 10

A customer has a cascaded Three Data Center (3DC) implementation to protect a mission critical UNIX application. The production host crashes, but the array and network are still up. The customer wants to bring up the application on a host at the local data center and still maintain two remote copies of the data. What must be performed first at the local data center?

A.

Suspend HUR pairs.

B.

Suspend TrueCopy pairs.

C.

Perform swap takeover for the HUR pairs.

D.

Perform swap takeover for the TrueCopy pairs.

Full Access
Question # 11

A customer has purchased an Hitachi Storage Cluster (HSC) for Microsoft Environments. Which component is included?

A.

VBS scripts

B.

Microsoft Cluster

C.

Hitachi VSS Agent

D.

Hitachi client for Microsoft Exchange

Full Access
Question # 12

A customer is using ShadowImage to replicate an online database on a UNIX server. The ShadowImage pairs are suspended and the secondary volumes are presented to a recovery server. What are two steps that must be performed prior to starting the database on the recovery server? (Choose two.)

A.

Import the volume/disk group.

B.

Perform a fsck on each file system.

C.

Roll the replicated database logs forward.

D.

Change the IP address of the recovery server.

Full Access
Question # 13

Volume Shadow Copy Service (VSS) coordinates activities of three components to protect mission critical databases, file systems, and application data when used with HiCommand Protection Manager (HPtM) software. What are the three components? (Choose three.)

A.

MS Exchange VSS writer.

B.

MS Exchange VSS reader.

C.

MS Exchange VSS provider.

D.

Protection Manager VSS requestor.

E.

Raid Manager Shadow Copy provider.

Full Access
Question # 14

An Hitachi Data Systems customer is implementing a TrueCopy solution on a Universal Storage Platform (USP). Where would you obtain the latest information regarding supported features and hardware?

A.

Country Product Manager

B.

USP User and Reference Guide

C.

USP TrueCopy User and Reference Guide

D.

Microcode ECN (Engineering Change Notice)

Full Access
Question # 15

A customer wishes to create copies using Copy-on-Write SnapShot of a database containing a large number of changes -- about 50 percent for each day. The customer also wants to keep five copies of the database though access to the copies is not high. Which statement is correct?

A.

The pool should reside on external storage to keep costs low.

B.

The pool logical volumes should be the same size as the production logical volumes.

C.

The database should be copied using ShadowImage and not Copy-on-Write SnapShot.

D.

The pool should be at least three times the size of the database if Copy-on-Write SnapShot is used.

Full Access
Question # 16

The Hitachi HiCommand Protection Manager (HPtM) software uses Volume Shadow Copy Service (VSS) to protect mission critical databases, file systems and application data. Which three components does VSS coordinate to achieve this? (Choose three.)

A.

The application that requests VSS services.

B.

The programs that manage shadow copies.

C.

Copy-on-Write SnapShot designed for VSS.

D.

Hitachi Software that allows you to present storage.

E.

Applications that store persistent information on disk.

Full Access
Question # 17

A customer is planning to use Universal Replicator for Disaster Recovery of a normal transactional database (e.g. Oracle, DB2). Which two must be included in the same Journal Group? (Choose two.)

A.

data files

B.

transaction logs

C.

database dumps

D.

application binaries

Full Access