Data Protection Manager Interview Questions & Answers

4 avg. rating (80% score) - 1 votes

Data Protection Manager Interview Questions & Answers

Are you searching for Data Protection Manager job? Data Protection Manager (DPM) is an organization backup system which can be used to back up the data from source to target location on DPM server. DPM backup the data from Microsoft servers and file data from server and client machines. Many Organizations are awaiting for Data Protection Manager job candidates for several roles to perform backup and moving the data. Job opportunities are present everywhere for this technology. Data Protection Manager job description might include experience in server and client computers. Wisdomjobs created interview questions exclusively for the candidates who are in search of job. Do check our page for Data Protection Manager interview questions and answers to get set for the interview.

Data Protection Manager Interview Questions

Data Protection Manager Interview Questions
    1. Question 1. What Is Data Protection Manager?

      Answer :

      Microsoft System Center Data Protection Manager (DPM) 2010 is a member of the Microsoft System Center family of management products, designed to help IT professionals manage their Windows environment. DPM provides Windows backup and recovery—delivering seamless data protection for Microsoft application and file servers by using integrated disk and tape media. DPM performs replication, synchronization, and recovery point creation to provide reliable protection and rapid recovery of data for both system administrators and end-users.

    2. Question 2. What's New In Dpm 2010?

      Answer :

      Some of the new features for DPM 2010 include:

      • DPM 2010 automatically grows volumes as required.
      • DPM 2010 allows you to shrink volumes so your space is used effectively.
      • Support for system protection of Windows Server 2008 and Windows Server 2008 R2.
      • Exchange Server 2010 databases now appear within the Database Availability Group (DAG) after creating a new protection group.

      Improved Windows SharePoint support for the following:

      • Restoring individual SharePoint list items.
      • Parallel backups of databases that are on the same instance of SQL Server 2005 in a SharePoint farm.
      • SharePoint list item search recovery. Note that you can now perform a search based on the title of the list item.
      • SharePoint tape backup.

      In DPM 2010, DPM takes the last valid backup at the database level, and then copies the backup to tape. This process creates a complete recovery point for the SharePoint farm. In previous releases, the latest farm level recovery point was backed up to tape, and might not have included all of the databases causing the copy-to-tape operation to be incomplete.

      Recovery of items in a SharePoint farm using host-headers.

    3. Question 3. What Languages Does Dpm 2010 Support?

      Answer :

      In addition to English, DPM 2010 supports Chinese Simplified, Chinese Traditional, French, German, Italian, Japanese, Korean, and Spanish, Portuguese (Brazilian) and Russian.

    4. Question 4. Does Dpm 2010 Support A Tape-based Backup And Archive Solution?

      Answer :

      Yes.

      DPM provides tape-based and disk-based protection for your data, which can be deployed as follows:

      Disk-to-disk (D2D): A method of backup in which data from one computer is stored on the hard disk of another computer. You can use this method to back up your DPM server using your existing alternative tape product.

      Disk-to-tape (D2T): A traditional method of backing up data from one computer to a type of storage media, such as tape.

      Disk-to-disk-to-tape (D2D2T): This method combines D2D and D2T for extra protection. D2D2T provides the rapid recovery benefits of disk-based storage in the short term and archive storage for critical data using tape-based storage in the long term.

    5. Question 5. Does Dpm Support Protection Across Forests?

      Answer :

      DPM 2010 supports data protection across forests if a forest-level trust exists between the forests. To set up a forest-level trust relationship, both domains must be in Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 forest mode. Windows Server 2000 does not support forest-level trusts.

    6. Question 6. Does Dpm 2010 Provide Windows Power Shell Integration?

      Answer :

      DPM 2010 provides its own set of Windows Power Shell commands that can be used in addition to DPM Administrator Console to perform data protection management tasks. A DPM administrator can use DPM cmdlets to perform many of the administrative tasks that can be performed in the console. You access the DPM cmdlets through DPM Management Shell.

    7. Question 7. Can I Manage My Dpm Servers Remotely?

      Answer :

      Yes. DPM Management Shell can be installed on computers other than the DPM server, enabling you to administer multiple DPM servers remotely. You can also install DPM Management Shell on desktop computers running Windows XP, Windows Vista, or Windows 7.

    8. Question 8. How Do I Determine How Many Dpm Servers My Organization Will Require?

      Answer :

      There is no precise algorithm for determining the number of DPM servers you will need. The number of servers and the amount of data that a single DPM server can protect will vary based on the following factors:

      • Change rate of the data sources to be protected.
      • The amount of space available in the storage pool.
      • How often the data will be synchronized.
      • Available bandwidth at each protected computer.
      • Aggregate bandwidth on the DPM server.

    9. Question 9. How Many Snapshots Can A Dpm Server Retain?

      Answer :

      A DPM server can store up to 9,000 disk-based snapshots, including those retained when you stop protection of a data source. The snapshot limit applies to express full backups and file recovery points, but not to incremental synchronizations.

    10. Question 10. Can I Upgrade To Dpm 2010 Rtm From Dpm 2007?

      Answer :

      Yes. DPM 2010 supports upgrading from DPM 2007 SP1 or later when DPM 2007 is installed on a 64-bit version of either Windows Server 2008 R2, Standard or Enterprise Edition, or Windows Server 2008, Standard or Enterprise Edition. If DPM 2007 SP1 is installed on a 64-bit version of Windows Server 2003, you must upgrade to Windows Server 2008 R2 or Windows Server 2008 before upgrading to DPM 2010.

    11. Question 11. Can I Upgrade To Dpm 2010 Rtm From The Beta Version?

      Answer :

      No. DPM 2010 does not support upgrading from DPM 2010 Beta (build 7336). You must first upgrade from DPM 2010 Beta to DPM 2010 Release Candidate (build 7558), and then upgrade to DPM 2010. To download the and instructions on how to upgrade to DPM 2010 RC, see the DPM Downloads page on the Microsoft Connect site at Upgrading to DPM 2010 from DPM 2010 RC.

    12. Question 12. Can I Upgrade To Dpm 2010 Rtm From The Release Candidate Version?

      Answer :

      Yes. DPM 2010 supports upgrading from DPM 2010 Release Candidate (build 7558). For step-by-step instructions on how to upgrade to DPM 2010 from DPM 2010 RC, see Upgrading to DPM 2010 from DPM 2010 RC.

    13. Question 13. Can I Upgrade To Dpm 2010 From An Evaluation Version?

      Answer :

      Yes. DPM 2010 supports upgrading from the DPM 2010 Evaluation version. For step-by-step instructions on how to upgrade to DPM 2010 from the evaluation version, see Upgrading to DPM 2010 from DPM 2010 Evaluation.

    14. Question 14. What Types Of Licensing Does Dpm Have?

      Answer :

      DPM has standard, enterprise, and client licenses. The standard license entitles you to protect volumes, shares, and folders, as well as computer system state. The enterprise license entitles you to protect application data, such as mailboxes and databases on an Exchange Server, in addition to files. On a server cluster, DPM installs an agent on each node of the cluster. A license is used for each server node. A client license entitles you to protect desktop and laptop computers running Windows XP, Windows Vista, or Windows 7.

    15. Question 15. What Are The System Requirements For Running Dpm 2007?

      Answer :

      DPM Server Software Requirements:

      The System Center Data Protection Manager (DPM) 2010 server requires a 64-bit version of a supported operating system and requires a supported 64-bit or 32-bit version of SQL Server 2008 SP1, Enterprise or Standard Edition, for the DPM database.

      The DPM server must be installed on a computer that is running the 64-bit version of one of the following operating systems:

      • Windows Server 2008 R2, Standard or Enterprise Edition.
      • Windows Server 2008, Standard or Enterprise Edition.

      DPM Server Hardware Requirements:

      DPM is designed to run on a dedicated, single-purpose server. The DPM server should not be installed on any of the following:

      • A computer on which the Application Server role is installed.
      • A computer that is a System Center Operations Manager management server.
      • A computer on which Exchange Server is running.
      • A computer that is a node of a cluster.

      Network Requirements:

      • The DPM server must be deployed within a Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003 Active Directory domain. The domain controllers can be running Windows Server 2000, Windows Server 2003, or Windows Server 2003 R2 Server.
      • DPM 2010 supports protecting servers across domains; however, you must establish two-way trust relationship across the domains prior to protecting the computers.
      • The DPM server requires persistent connectivity with the servers and desktop computers that it protects.

    16. Question 16. Can Dpm Be Installed From A Network Share?

      Answer :

      Yes. You can run DPM Setup from a network share by using a Universal Naming Convention (UNC) path. However, you cannot run DPM Setup by using a drive that maps to a network share.

      If you experience errors when running DPM Setup from a network share by using a UNC path, follow these steps:

      • Exit DPM Setup. 
      • Copy the DPM installation folder to a local folder on the DPM server.
      • Restart the DPM installation from the local installation folder.

    17. Question 17. What Types Of Storage Can I Use With Dpm 2010?

      Answer :

      DPM 2010 supports use of any of the following sources for server storage:

      • Direct attached storage (DAS).
      • Fibre Channel storage area network (SAN).
      • Internet SCSI (iSCSI) storage device or SAN, providing that the iSCSI storage device has received Windows Hardware Certification.

    18. Question 18. What Is A Custom Volume?

      Answer :

      You can assign a custom volume to a protection group member, in place of the DPM storage pool. A custom volume is a volume that is not in the DPM storage pool and is specified to store the replica and recovery points for a protection group member.

      Any volume that is attached to the DPM server can be selected as a custom volume, except the volume that contains the system and program files. To use custom volumes for a protection group member, two custom volumes must be available: one volume to store the replica and one volume to store the recovery points.

    19. Question 19. When Should I Use Custom Volumes?

      Answer :

      The DPM-managed storage pool is sufficient for most business needs; however, you might want a greater amount of control over storage for specific data sources. For example, you have critical data that you want to store using a high-performance logical unit number (LUN) on a storage area network.

    20. Question 20. Can I Use Mapped Network Drives?

      Answer :

      No, you cannot add mapped drives to a storage pool.

    21. Question 21. Can You Use A Dpm Server To Protect Its Databases?

      Answer :

      Yes, a DPM server can protect its own databases by backing the databases up to tape. We recommend that you use a unique protection group to back up the DPM server databases, make at least two copies of the backup tapes, and then store each of the backup tapes in a different remote location.

    22. Question 22. Can Dpm 2010 Protect System State?

      Answer :

      Yes. DPM 2010 can protect the system state for any computer on which a DPM protection agent can be installed.

    23. Question 23. How Does The Data Protection Act 1998 Affect Me?

      Answer :

      Unlike the Data Protection Act 1984, the new Act covers manual as well as electronic records. This means that student files, card indexes and all other paper-based record systems which contain information about identifiable living people are subject to the new Act.

    24. Question 24. I Have Been Asked By A Student To Supply A Copy Of Their Records. What Should I Do?

      Answer :

      Refer the request to the Information Protection & Security manager. The student will be asked to complete and return a form setting out the information they wish to see. They may also have to pay a fee which is currently £10. The University is obliged to provide the information to the student within 40 calendar days of receiving the completed request form.

    25. Question 25. What About Exam Marks And Results?

      Answer :

      Exam marks and any minutes from an exam board meeting relating to a particular student should be disclosed. Exam scripts themselves are exempt from disclosure but data subjects do have right of access to any comments or notes recorded on the script. Exam markers should be aware of this and ensure that they do not record any comments on the exam script which they would not be happy for the data subject to see. There are additional rules which state that exam results need not be disclosed any earlier than they are publicly announced.

    26. Question 26. Can We Still Publish Degree Results On Faculty Notice Boards?

      Answer :

      This issue has been considered by the Information Commissioner (formerly the Data Protection Commissioner) who has concluded that provided there is nothing which would enable individual students to be contacted i.e. by the inclusion of e-mail or postal addresses or telephone numbers, then the publishing of degree results does not breach the terms of the new Act. However, if individual students were to indicate that they did not wish their names to be included on the published list, their wish should be respected.

    27. Question 27. I Want To Create A Photo Board Showing Photographs Of All Students Within My School. Can I Do This?

      Answer :

      Photographs constitute personal data so you must get consent from all the individuals concerned before you display their photographs. Consent could, for example, be obtained by asking students and staff to supply photographs and informing them at the point of collection exactly how the photographs are to be used. If an individual objects to the display of their photograph then it must be removed. Since photographs may reveal details of the subject's race and ethnic origin they are classified personal data. Generally photographs should only be used and retained where strictly necessary.

    28. Question 28. I Have Obtained Consent To Display Certain Items Of Personal Data On The Faculty Notice Board/in A Faculty Handbook. Can I Also Publish The Information On The Department Website?

      Answer :

      Only if you have obtained specific consent to this from the individuals concerned. You cannot assume that consent for a particular use of data extends to any other use. If you have consent to use personal data for a particular purpose and wish to use this data for another different purpose, additional consent must be obtained from all the relevant individuals. This is especially important in relation to the publication of personal data on websites because the World Wide Web makes information globally accessible.

    29. Question 29. I Am Already Holding Personal Information On A Database Of Contacts Which I Have Compiled Over A Number Of Years. Can I Continue To Hold And Use This Information?

      Answer :

      Yes, but you should think about what personal data you are collecting and holding and why. All the information should be relevant, accurate and held for no longer than necessary. If you are storing or using old or unreliable personal information you should either update or delete it. One way to do this would be to write to the individuals concerned, notifying them of the data you hold and asking them to check that it is correct. You can also inform them of the purposes for which the data is being held and seek their consent.

    30. Question 30. I Have Sent Literature About Forthcoming Events, Reunions Etc. To Former Students Of The University. A Few People Have Objected, Saying That They Do Not Wish To Receive Any Further Communications. What Should I Do?

      Answer :

      You must ensure that these persons are not sent any further communications. If mail is generated electronically you must introduce a system which ensures that people who have objected to receiving communications from the University are removed from your mailing list.

    31. Question 31. Some Of Our Student Files Contain Comments Of A Personal Or Derogatory Nature. Could These Be Viewed By The Individual Concerned Under The Terms Of The Act?

      Answer :

      Yes. Potentially all personal information can be disclosed. The general rule is that you should not record, however informally, comments which you would not be happy for the data subject to see.

    32. Question 32. What About Confidential Information Such As References. Do These Have To Be Disclosed?

      Answer :

      Potentially yes. There are complicated rules relating to references but basically although the subject of the reference cannot demand a copy from the person giving the reference, they could possibly obtain it from the person (or institution) to which the reference was sent.

    33. Question 33. I Have Been Contacted By A Third Party Requesting Information About A Student/member Of Staff. What Should I Do?

      Answer :

      The general rule is to be very careful about who information is disclosed to. You need to find out exactly who requires the personal data and why. Ideally you should obtain the consent of the relevant student/member of staff before any data is disclosed to a third party, although this may not always be possible (e.g. in a medical emergency). If you are in any doubt as to whether information should be disclosed please contact the information Protection and Security manager.

    34. Question 34. I Have A Form/questionnaire Which Students/members Of Staff/third Parties Complete And Return. Do I Need To Modify This Form To Comply With The New Act?

      Answer :

      Yes.

      Please contact the: The Information Protection and Security manager who will be able to advise you on amending any forms to include a statement informing recipients what their personal data will be used for, where it will be held and to whom it may be disclosed.

    35. Question 35. What About Records. How Long Should I Retain Them?

      Answer :

      The new Act states that personal data should be held for no longer than is necessary. In general it is good practice not to collect or retain more personal information than is strictly necessary. All irrelevant or out of date personal information should be destroyed. For advice on the management of your records please contact the he Information Protection and Security manager.

    36. Question 36. This All Seems Quite Complicated. Is There A Basic Rule I Should Remember?

      Answer :

      Be very careful about the personal information you hold and in particular that you pass it on to. Think about what you are using personal data for and whether this is what the individual concerned would expect you to be using it for. Wherever possible obtain specific consent.

Quality Management Tutorial

Data Protection Manager Practice Tests

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Quality Management Tutorial