Exam Objectives
Installing Data Protection Manager (DPM) (16%)
- Install the DPM server
- Enable End User Recovery (EUR)
- Configure networking for DPM
This objective may include but is not limited to: verify software and hardware prerequisites; choose and configure SQL Server location; run DPM installation wizard
This objective may include but is not limited to: configuring Active Directory, DPM server, and Shadow Copy Client
This objective may include but is not limited to: agent to server communication; bandwidth requirements; enabling a dedicated backup protection network
Managing Media and Agents (21%)
- Deploy a DPM agent
- Control DPM bandwidth
- Manage disks
- Manage tapes
This objective may include but is not limited to: domain/forest membership; pushing an agent from the console; deploying an agent by using software distribution or manually; connecting an agent to a DPM server by using the DPM Management Shell
This objective may include but is not limited to: agent bandwidth throttling; server bandwidth throttling; on-the-wire compression
This objective may include but is not limited to: disk; cloud; moving a replica to another disk
This objective may include but is not limited to: tape, tape devices, copy to tape, inventory, encryption
Protecting Workloads (23%)
- Define protection for standalone configurations
- Define protection for highly available configurations
- Configure protection policies
- Manage recovery points
- Stage a replica
This objective may include but is not limited to: setting up protection groups for core workloads, criteria for separate protection groups, ramifications for restore, selecting data sources
This objective may include but is not limited to: application availability options, failover clustering, DFS interactions
This objective may include but is not limited to: implementing a protection policy through a protection group, short-term vs. long-term protection schedules, retention time
This objective may include but is not limited to: creating a recovery point; different types of recovery points; defining recovery point schedules; optimizing schedules for recovery time; time offset
This objective may include but is not limited to: prestaging; running an initial consistency check; postponing initial replication
Recovering Workloads (23%)
- Recover files
- Recover Exchange Server data
- Recover SharePoint data
- Recover SQL Server data
- Recover system state data
- Recover virtualized environments
This objective may include but is not limited to: workstations, file servers, overwrite, permissions, recovering to a network folder
This objective may include but is not limited to: Recovery Storage Group (RSG), Exchange Server 2003 vs. Exchange Server 2007, recovering to an alternative Exchange server, scope of recovery
This objective may include but is not limited to: recovery farms, data granularity, protection schedules
This objective may include but is not limited to: SQL Server 2005 vs. SQL Server 2008, recovery to an alternate server, advanced recovery options, protection schedules and SQL Server recovery mode
This objective may include but is not limited to: choosing when to enable system state recovery; applying recovered system state
This objective may include but is not limited to: virtual guests, host configuration, recovering to another host
Managing, Protecting, and Recovering the DPM Server (18%)
- Monitor DPM
- Perform maintenance
- Integrate with other backup solutions
- Configure DPM for disaster recovery
- Recover a DPM server
This objective may include but is not limited to: setting up alerts, scheduling and running reports, System Center Operations Manager (SCOM), Microsoft Operations Manager (MOM), PerfMon, Event Viewer, DPM Administrator Console
This objective may include but is not limited to: ensuring replica integrity, ad hoc and scheduled consistency checks, data integrity checks
This objective may include but is not limited to: identifying the production data within the DPM server; protecting the DPM configuration database
This objective may include but is not limited to: activating the agent on the primary DPM server; configuring workloads to be protected; switch primary/secondary roles; enable secondary protection with DPM; protecting the DPM configuration database
This objective may include but is not limited to: restoring the DPM configuration database, creating static copies of replicas, repairing DPM