InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What are the different kinds of copies in the context of Commvault and what do they mean? |
|
Answer» In COMMVAULT, only one primary copy and MANY SORTS of auxiliary/secondary copies are permitted. There are various types of copies.
|
|
| 2. |
In the CommServe database, how are keys stored? |
|
Answer» DATA encryption keys are encrypted with the CLIENT's RSA public key and stored in the database. Depending on the settings, the client's RSA private key is encrypted with either a built-in passphrase or a passphrase provided by the USER. |
|
| 3. |
Is the data encrypted twice if you enable encryption during backup and offline/auxiliary copy? |
|
Answer» No, the data is not double-encrypted. Data that has been encrypted by HDPS Monitor SOFTWARE is FLAGGED. The FLAG is checked during an auxiliary copy operation, and if the data has already been encrypted, no ADDITIONAL software encryption is used. During the auxiliary copy PROCEDURE, only data that has not been encrypted by HDPS will be encrypted. |
|
| 4. |
When writing to the media, can encryption have an effect on compression? |
|
Answer» Yes, data is effectively randomised when backup procedures are PERFORMED using encryption. This means that while compressing encrypted data, compression METHODS will be less effective. As a result, there will be a visible DIFFERENCE in the compression ratio when this data is written to the media. For example, a tape with a native capacity of 110GB that was formerly compressed to 190GB may now only be able to write 124GB to the same tape when encryption is used. The amount of data that can be written to tape depends on the type of data that is being written. Image files will not be compressed because they are already compressed, however, a TXT file will be compressed heavily. |
|
| 5. |
Is a Certificate Authority required for encryption in Commvault? |
|
Answer» Only in the case of asymmetric cryptography, where DISTINCT keys are used to encrypt (with the private key) and decrypt (with the public key), is a Certificate Authority required. There is no need for a certificate or a certificate authority because all of our encryption is symmetric (the same key is used to encrypt and decrypt). When exchanging DATA over insecure lines (such as the INTERNET), and the IDENTITY of the entities on both ends is unknown, asymmetric crypto is employed. The CA helps VALIDATE the validity of the sent data, ensuring that malicious material is not sent. This issue does not exist in our situation because both endpoints have known entities. |
|
| 6. |
What is the difference between a snapshot and a clone of a virtual machine? |
|
Answer» A snapshot copies the virtual machine's DISK file to maintain its current state. It is used as a backup system. Create a snapshot if you need to save the configuration of a virtual machine so you can revert to it later if something goes WRONG. A clone, on the other hand, is a complete copy of the virtual machine. Cloning is the sole OPTION if you need to create a new virtual machine that will run on its own. |
|
| 7. |
Explain the following terminologies in the context of Commvault: Storage Policy, Job Manager, Backup set, Subclient, Collect Files. |
Answer»
|
|
| 8. |
What events are triggered during a Deduplication Database (DDB) backup process? |
|
Answer» The following events occur when the DDB backup job starts:
|
|