HP0-J38 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
QUESTION : 80
When describe Database transaction requirements what is the term for, when a transaction is executed entirely or not at all?
Atomicity requires that database modifications must follow an "all or nothing" rule. Each transaction is said to be atomic if when one part of the transaction fails, the entire transaction fails and database state is left unchanged. It is critical that the database management system maintains the atomic nature of transactions in spite of any application, DBMS, operating system or hardware failure.An atomic transaction cannot be subdivided, and must be processed in its entirety or not at all. Atomicity means that users do not have to worry about the effect of incomplete transactions.Transactions can fail for several kinds
of reasons: Hardware failure: A disk drive fails, preventing some of the
transaction's database changes from taking effect System failure: The user loses their connection to the application before providing all necessary information Database failure: E.g., the database runs out of room to hold additional data Application failure: The application attempts to post data that violates a rule that the database itself enforces, such as attempting
to insert a duplicate value in a primary key column.
QUESTION : 81
Regarding to Databases, what is a checkpoint?
When the Database creates a restart point
When the Database cache is flushed
When the Database tells the transaction log to commit
When the Database commits each write
A checkpoint restart is a facility offered by some database
management systems (DBMSs) and backup-restore software. Checkpoints
are taken in anticipation of the potential need to restart a software
process. Many ordinary batch processes on impersonal computers are time- consuming, as are backup and restore operations. They consist of many units of work. If checkpointing is enabled, checkpoints are initiated at specified intervals, in terms of units of work or of processing time. At each
checkpoint, intermediate results and a log recording the process's progress are saved to non- volatile storage. The contents of the program's memory area may also be saved. The purpose of checkpointing is to minimize the amount of
time and effort wasted when a long software process is interrupted by a hardware
failure, a software failure, or resource unavailability. With checkpointing , the process can be restarted from the latest checkpoint rather than from the beginning. Like described, with a checkpoint the data is also written to disk
what is also in Answer B. which also is right. But the better fit in this questions has to be A.
QUESTION : 82
A Browser can be used to access Command View TL. The Browser connection now failed due to network errors. What else can be used to connect?
RS232 on the management interface card
Only by usingHyperterminal from the management host
Trough Linux Java
From array based management web server on the interface manager card.
Trough the HP ETLA (Extended Tape LIbrary Architecture) all supported products have a management interface card installed. That is likely the same many HP customers know under the name "ILO - Integrated Lights Out" with HP ProLiant Servers or the Onboard Administrator in an HP Blade Environement . The Integrated management card supports likely same funcionality for HP StorageWorks Libraries. Supported connections are HTTP, Telnet, RS232 (direct attach at interface management card). A.
This is the only answer with is absolutely right. B. Hyperterminal is a telnet browser. That would be right. But it is wrong that you can only connect with it. That makes this answer wrong. C. This answer is complete nonsense. D. The answer is a little bit right because the int. mgmt.
card allows connections via http and have a web server onboard .
But it's not Array based. So this questions is also wrong.
QUESTION : 83
In VLS, what does auto-migration provide.
Tape mirror over HP Data Protector.
Data copy between VLS devices withoutdeduplication.
Copy procedure management by the Backup application.
Replication that can be performedaccross any IP Link.
Auto-Migration is offered in two ways, see below. Echo-Copy Which is a way the VLS or D2D device copy's virtual data cadridges to physical catridges . Echo copy is handled by the device only, and needs no interaction by the backup software. Echo copy can streamline the process and reduce the costs of making physical tape cartridges from virtual tape
cartridges, for vaulting and offsiting purposes. Echo copy is run through the Automigration software (a tab on the VLS GUI), not the backup application. It acts as a transparent disk cache to the physical library, so that the backup application writes to virtual cartridges in the virtual library, and Automigration then automatically schedules the copies from virtual cartridges to their matching physical cartridges (with the same barcodes) based on the Automigration policies the user establishes. Since echo copy
is managed through the Automigration software, not the backup application, the destination library is not visible to the backup application – therefore no licensing is required. Copy traffic is no longer routed through the SAN which speeds up the copy process. Since the tape library is
dedicated to the VLS no copy servers are required. Echo copy also eliminates the need for tape-to-tape copy administration since this is automated through copy policy management. All destination tapes created by echo copy are in the native tape format, so they can be easily restored directly from any tape drive or library that is visible to the backup application. Smart-Copy
Smart copy provides the same capabilities as echo copy with one important exception. Smart copy allows the backup ISV to initiate the copy with the VLS9000 directly managing the tape migration process. SMI-S 1.3 support is required by the ISV in order to be able to implement smart copy. HP Data Protector 6.1 supports smart copy. Answer B is the only correct answer, because when data is read vom a deduplicated storage, it is "recalculated".Between devices, data is not copied " deduplicated " it is always copied "non- deduplicated ". Only the new HP
StoreOnce will support a copy of data between two devices while the data is Already deduplicated . Therefore the target device has have a initial copy of the data from the source. Otherwise it would not be able to re-calculate the data when no baseline is existing.
QUESTION : 84
In Addition to met Fips 140-2 encryption Standard. What is a benefit of HP Secure Key Manager
Client-Based encryption model
Centraliced encryption key management for LTO-4 tape libraries.
Reliable key archival (support up to 30 years).
Seure host-based access, admin and logging
The HP StorageWorks Secure Key Manager reduces your risk of a costly data breach and reputation damage while improving regulatory compliance with
a secure centralized encryption key management solution for HP
LTO-4/LTO-5 enterprise tape libraries and Encryption SAN Switches. The Secure Key Manager automates key management and is a hardened server appliance delivering secure identity-based access, administration and logging with strong auditable security meeting the rigorous FIPS 140-2 security validation. Additionally, the Secure Key Manager provides reliable lifetime key archival with automatic multi-site key replication, and high availability clustering. Encryption clients may access the cluster using flexible path and node failover capabilities.
Read more Details »