Which two configurations are supported for a virtual machine backup using the Agent for VMware? (Select two.)
A. GRT item restore for Exchange 2016
B. GRT item restore for Red Hat Enterprise Linux
C. GRT item restore for Enterprise Vault
D. GRT item restore for Active Directory Domain Service
E. GRT item restore for Distributed SharePoint Farm
An administrator is attempting to browse file and directory details, but only backup set header information is available.
What may be the cause for the lack of detailed information; and how should the administrator enable the selection of individual items for restore?
A. The backup sets have expired, and the media must be re-cataloged.
B. The backup sets have expired, and the media must be re-inventoried.
C. The Backup Exec server catalog settings have been set to truncate automatically, and the media must be re-cataloged
D. The Backup Exec server catalog settings have been set to truncate automatically, and the media must be re-inventoried.
Which two capabilities of the Symantec Backup Exec Agent for Microsoft Exchange are supported? (Select two.)
A. Granular restore of Database Availability Groups (DAG) in a virtual environment
B. Continuous backup of Exchange databases and mailboxes
C. Direct granular restore from tape without prior disk staging
D. Restore of mailboxes or mailbox items to a .PST file
E. Restores of individual mail items
Which software encryption recommendation is part of Veritas best practices?
A. Use the Blowfish encryption algorithm.
B. Avoid using the same encryption keys for all synthetic backup templates.
C. Avoid using hardware compression with software encryption.
D. Use 128-bit encryption to be FIPS compliant.
Which two alternate destinations are available when using the restore wizard to restore from file and folder backups? (Select two.)
A. Zip file
B. Drive and Path
C. Microsoft Virtual Hard Disk
D. PST file
E. VMDK file
An administrator targets a backup to a disk storage device, but the backup goes into a queued state due to insufficient disk space.
Which action should the administrator take to ensure the next backup completes successfully?
A. split the backup into more than one backup job
B. include only as much data as can fit on the disk storage device
C. target the backup to a disk storage pool that has more than one device in the pool with sufficient space
D. recreate the backup job
Which task should an administrator complete before using Backup Exec to perform a recovery of a Unified Extensible Firmware Interface (UEFI) partition?
A. recreate the extended partition
B. install a storage controller driver
C. recreate the utility partition
D. create a Simplified Disaster Recovery Disk
An administrator has several expired backup sets that are still showing under the configured Disk Storage. Which two reasons will prevent the expired backup sets from being deleted? (Select two.)
A. There are other unexpired backup sets that are dependent on them.
B. The expired backup sets need to be duplicated before they will be deleted.
C. The expired backup sets are part of a (Simplified Disaster Recovery) SDR-enabled backup.
D. The expired backup sets have to be overwritten by a new backup job.
E. The expired backup sets need to be manually deleted from the Backup Exec console.
The security team that monitors and audits a network has captured unexpected but regular network traffic being sent from the Backup Exec server to systems that are deliberately restricted from being involved with Backup Exec. The team has notified the backup administrator of the findings.
Which Backup Exec setting should the administrator change to stop the unexpected network traffic?
A. Allow Backup Exec to report anonymous usage information
B. Discover servers that have data that has not been backed up
C. Enable TCP dynamic port range
D. Check for updates automatically according to a schedule
Which action must an administrator take to properly restore System State on a live Windows web server?
A. Restore System State in Safe mode
B. Restore System State in Directory Services Restore mode
C. Restore System State and reboot the server
D. Reboot the server before the restore of System State
E. restore System State with the option to Mark this server as the primary arbitrator