Home > Articles

  • Print
  • + Share This
Exam Objectives

Exam Objectives

Installing Data Protection Manager (DPM) (16%)

  • Install the DPM server
  • This objective may include but is not limited to: verify software and hardware prerequisites; choose and configure SQL Server location; run DPM installation wizard

  • Enable End User Recovery (EUR)
  • This objective may include but is not limited to: configuring Active Directory, DPM server, and Shadow Copy Client

  • Configure networking for DPM
  • This objective may include but is not limited to: agent to server communication; bandwidth requirements; enabling a dedicated backup protection network

Managing Media and Agents (21%)

  • Deploy a DPM agent
  • This objective may include but is not limited to: domain/forest membership; pushing an agent from the console; deploying an agent by using software distribution or manually; connecting an agent to a DPM server by using the DPM Management Shell

  • Control DPM bandwidth
  • This objective may include but is not limited to: agent bandwidth throttling; server bandwidth throttling; on-the-wire compression

  • Manage disks
  • This objective may include but is not limited to: disk; cloud; moving a replica to another disk

  • Manage tapes
  • This objective may include but is not limited to: tape, tape devices, copy to tape, inventory, encryption

Protecting Workloads (23%)

  • Define protection for standalone configurations
  • This objective may include but is not limited to: setting up protection groups for core workloads, criteria for separate protection groups, ramifications for restore, selecting data sources

  • Define protection for highly available configurations
  • This objective may include but is not limited to: application availability options, failover clustering, DFS interactions

  • Configure protection policies
  • This objective may include but is not limited to: implementing a protection policy through a protection group, short-term vs. long-term protection schedules, retention time

  • Manage recovery points
  • This objective may include but is not limited to: creating a recovery point; different types of recovery points; defining recovery point schedules; optimizing schedules for recovery time; time offset

  • Stage a replica
  • This objective may include but is not limited to: prestaging; running an initial consistency check; postponing initial replication

Recovering Workloads (23%)

  • Recover files
  • This objective may include but is not limited to: workstations, file servers, overwrite, permissions, recovering to a network folder

  • Recover Exchange Server data
  • This objective may include but is not limited to: Recovery Storage Group (RSG), Exchange Server 2003 vs. Exchange Server 2007, recovering to an alternative Exchange server, scope of recovery

  • Recover SharePoint data
  • This objective may include but is not limited to: recovery farms, data granularity, protection schedules

  • Recover SQL Server data
  • This objective may include but is not limited to: SQL Server 2005 vs. SQL Server 2008, recovery to an alternate server, advanced recovery options, protection schedules and SQL Server recovery mode

  • Recover system state data
  • This objective may include but is not limited to: choosing when to enable system state recovery; applying recovered system state

  • Recover virtualized environments
  • This objective may include but is not limited to: virtual guests, host configuration, recovering to another host

Managing, Protecting, and Recovering the DPM Server (18%)

  • Monitor DPM
  • This objective may include but is not limited to: setting up alerts, scheduling and running reports, System Center Operations Manager (SCOM), Microsoft Operations Manager (MOM), PerfMon, Event Viewer, DPM Administrator Console

  • Perform maintenance
  • This objective may include but is not limited to: ensuring replica integrity, ad hoc and scheduled consistency checks, data integrity checks

  • Integrate with other backup solutions
  • This objective may include but is not limited to: identifying the production data within the DPM server; protecting the DPM configuration database

  • Configure DPM for disaster recovery
  • This objective may include but is not limited to: activating the agent on the primary DPM server; configuring workloads to be protected; switch primary/secondary roles; enable secondary protection with DPM; protecting the DPM configuration database

  • Recover a DPM server
  • This objective may include but is not limited to: restoring the DPM configuration database, creating static copies of replicas, repairing DPM

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.