300+ [UPDATED] Data Protection Manager Interview Questions

  • 1. What Is Data Protection Manager?

    Microsoft System Center Data Protection Manager (DPM) 2010 is a member of the Microsoft System Center family of management products, designed to help IT professionals manage their Windows environment. DPM provides Windows backup and recovery—delivering seamless data protection for Microsoft application and file servers by using integrated disk and tape media. DPM performs replication, synchronization, and recovery point creation to provide reliable protection and rapid recovery of data for both system administrators and end-users.

  • 2. What’s New In Dpm 2010?

    Some of the new features for DPM 2010 include:

    • DPM 2010 automatically grows volumes as required.
    • DPM 2010 allows you to shrink volumes so your space is used effectively.
    • Support for system protection of Windows Server 2008 and Windows Server 2008 R2.
    • Exchange Server 2010 databases now appear within the Database Availability Group (DAG) after creating a new protection group.

    Improved Windows SharePoint support for the following:

    • Restoring individual SharePoint list items.
    • Parallel backups of databases that are on the same instance of SQL Server 2005 in a SharePoint farm.
    • SharePoint list item search recovery. Note that you can now perform a search based on the title of the list item.
    • SharePoint tape backup.

    In DPM 2010, DPM takes the last valid backup at the database level, and then copies the backup to tape. This process creates a complete recovery point for the SharePoint farm. In previous releases, the latest farm level recovery point was backed up to tape, and might not have included all of the databases causing the copy-to-tape operation to be incomplete.

    Recovery of items in a SharePoint farm using host-headers.

  • Project Management Interview Questions

  • 3. What Languages Does Dpm 2010 Support?

    In addition to English, DPM 2010 supports Chinese Simplified, Chinese Traditional, French, German, Italian, Japanese, Korean, and Spanish, Portuguese (Brazilian) and Russian.

  • 4. Does Dpm 2010 Support A Tape-based Backup And Archive Solution?

    Yes.

    DPM provides tape-based and disk-based protection for your data, which can be deployed as follows:

    Disk-to-disk (D2D):
     A method of backup in which data from one computer is stored on the hard disk of another computer. You can use this method to back up your DPM server using your existing alternative tape product.

    Disk-to-tape (D2T):
    A traditional method of backing up data from one computer to a type of storage media, such as tape.

    Disk-to-disk-to-tape (D2D2T)
    : This method combines D2D and D2T for extra protection. D2D2T provides the rapid recovery benefits of disk-based storage in the short term and archive storage for critical data using tape-based storage in the long term.

  • Project Management Tutorial

  • 5. Does Dpm Support Protection Across Forests?

    DPM 2010 supports data protection across forests if a forest-level trust exists between the forests. To set up a forest-level trust relationship, both domains must be in Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 forest mode. Windows Server 2000 does not support forest-level trusts.

  • Peachtree Accounting Interview Questions

  • 6. Does Dpm 2010 Provide Windows Power Shell Integration?

    DPM 2010 provides its own set of Windows Power Shell commands that can be used in addition to DPM Administrator Console to perform data protection management tasks. A DPM administrator can use DPM cmdlets to perform many of the administrative tasks that can be performed in the console. You access the DPM cmdlets through DPM Management Shell.

  • 7. Can I Manage My Dpm Servers Remotely?

    Yes. DPM Management Shell can be installed on computers other than the DPM server, enabling you to administer multiple DPM servers remotely. You can also install DPM Management Shell on desktop computers running Windows XP, Windows Vista, or Windows 7.

  • Network Security Tutorial Network Security Interview Questions

  • 8. How Do I Determine How Many Dpm Servers My Organization Will Require?

    There is no precise algorithm for determining the number of DPM servers you will need. The number of servers and the amount of data that a single DPM server can protect will vary based on the following factors:

    • Change rate of the data sources to be protected.
    • The amount of space available in the storage pool.
    • How often the data will be synchronized.
    • Available bandwidth at each protected computer.
    • Aggregate bandwidth on the DPM server.
  • 9. How Many Snapshots Can A Dpm Server Retain?

    A DPM server can store up to 9,000 disk-based snapshots, including those retained when you stop protection of a data source. The snapshot limit applies to express full backups and file recovery points, but not to incremental synchronizations.

  • Internet Security Interview Questions

  • 10. Can I Upgrade To Dpm 2010 Rtm From Dpm 2007?

    Yes. DPM 2010 supports upgrading from DPM 2007 SP1 or later when DPM 2007 is installed on a 64-bit version of either Windows Server 2008 R2, Standard or Enterprise Edition, or Windows Server 2008, Standard or Enterprise Edition. If DPM 2007 SP1 is installed on a 64-bit version of Windows Server 2003, you must upgrade to Windows Server 2008 R2 or Windows Server 2008 before upgrading to DPM 2010.

  • Internet Security Tutorial

  • 11. Can I Upgrade To Dpm 2010 Rtm From The Beta Version?

    No. DPM 2010 does not support upgrading from DPM 2010 Beta (build 7336). You must first upgrade from DPM 2010 Beta to DPM 2010 Release Candidate (build 7558), and then upgrade to DPM 2010. To download the and instructions on how to upgrade to DPM 2010 RC, see the DPM Downloads page on the Microsoft Connect site at Upgrading to DPM 2010 from DPM 2010 RC.

  • IDMS (Integrated Database Management System) Interview Questions

  • 12. Can I Upgrade To Dpm 2010 Rtm From The Release Candidate Version?

    Yes. DPM 2010 supports upgrading from DPM 2010 Release Candidate (build 7558). For step-by-step instructions on how to upgrade to DPM 2010 from DPM 2010 RC, see Upgrading to DPM 2010 from DPM 2010 RC.

  • Project Management Interview Questions

  • 13. Can I Upgrade To Dpm 2010 From An Evaluation Version?

    Yes. DPM 2010 supports upgrading from the DPM 2010 Evaluation version. For step-by-step instructions on how to upgrade to DPM 2010 from the evaluation version, see Upgrading to DPM 2010 from DPM 2010 Evaluation.

  • Computer Security Tutorial

  • 14. What Types Of Licensing Does Dpm Have?

    DPM has standard, enterprise, and client licenses. The standard license entitles you to protect volumes, shares, and folders, as well as computer system state. The enterprise license entitles you to protect application data, such as mailboxes and databases on an Exchange Server, in addition to files. On a server cluster, DPM installs an agent on each node of the cluster. A license is used for each server node. A client license entitles you to protect desktop and laptop computers running Windows XP, Windows Vista, or Windows 7.

  • 15. What Are The System Requirements For Running Dpm 2007?

    DPM Server Software Requirements:

    The System Center Data Protection Manager (DPM) 2010 server requires a 64-bit version of a supported operating system and requires a supported 64-bit or 32-bit version of SQL Server 2008 SP1, Enterprise or Standard Edition, for the DPM database.

    The DPM server must be installed on a computer that is running the 64-bit version of one of the following operating systems:

    • Windows Server 2008 R2, Standard or Enterprise Edition.
    • Windows Server 2008, Standard or Enterprise Edition.

    DPM Server Hardware Requirements:

    DPM is designed to run on a dedicated, single-purpose server. The DPM server should not be installed on any of the following:

    • A computer on which the Application Server role is installed.
    • A computer that is a System Center Operations Manager management server.
    • A computer on which Exchange Server is running.
    • A computer that is a node of a cluster.

    Network Requirements:

    • The DPM server must be deployed within a Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003 Active Directory domain. The domain controllers can be running Windows Server 2000, Windows Server 2003, or Windows Server 2003 R2 Server.
    • DPM 2010 supports protecting servers across domains; however, you must establish two-way trust relationship across the domains prior to protecting the computers.
    • The DPM server requires persistent connectivity with the servers and desktop computers that it protects.
  • Computer Security Interview Questions

  • 16. Can Dpm Be Installed From A Network Share?

    Yes. You can run DPM Setup from a network share by using a Universal Naming Convention (UNC) path. However, you cannot run DPM Setup by using a drive that maps to a network share.

    If you experience errors when running DPM Setup from a network share by using a UNC path, follow these steps:

    • Exit DPM Setup. 
    • Copy the DPM installation folder to a local folder on the DPM server.
    • Restart the DPM installation from the local installation folder.
  • 17. What Types Of Storage Can I Use With Dpm 2010?

    DPM 2010 supports use of any of the following sources for server storage:

    • Direct attached storage (DAS).
    • Fibre Channel storage area network (SAN).
    • Internet SCSI (iSCSI) storage device or SAN, providing that the iSCSI storage device has received Windows Hardware Certification.
  • Social Media Manager Interview Questions

  • 18. What Is A Custom Volume?

    You can assign a custom volume to a protection group member, in place of the DPM storage pool. A custom volume is a volume that is not in the DPM storage pool and is specified to store the replica and recovery points for a protection group member.

    Any volume that is attached to the DPM server can be selected as a custom volume, except the volume that contains the system and program files. To use custom volumes for a protection group member, two custom volumes must be available: one volume to store the replica and one volume to store the recovery points.

  • Peachtree Accounting Interview Questions

  • 19. When Should I Use Custom Volumes?

    The DPM-managed storage pool is sufficient for most business needs; however, you might want a greater amount of control over storage for specific data sources. For example, you have critical data that you want to store using a high-performance logical unit number (LUN) on a storage area network.

  • 20. Can I Use Mapped Network Drives?

    No, you cannot add mapped drives to a storage pool.

  • Campaign manager Interview Questions

  • 21. Can You Use A Dpm Server To Protect Its Databases?

    Yes, a DPM server can protect its own databases by backing the databases up to tape. We recommend that you use a unique protection group to back up the DPM server databases, make at least two copies of the backup tapes, and then store each of the backup tapes in a different remote location.

  • 22. Can Dpm 2010 Protect System State?

    Yes. DPM 2010 can protect the system state for any computer on which a DPM protection agent can be installed.

  • 23. How Does The Data Protection Act 1998 Affect Me?

    Unlike the Data Protection Act 1984, the new Act covers manual as well as electronic records. This means that student files, card indexes and all other paper-based record systems which contain information about identifiable living people are subject to the new Act.

  • Cyber Security Interview Questions

  • 24. I Have Been Asked By A Student To Supply A Copy Of Their Records. What Should I Do?

    Refer the request to the Information Protection & Security manager. The student will be asked to complete and return a form setting out the information they wish to see. They may also have to pay a fee which is currently £10. The University is obliged to provide the information to the student within 40 calendar days of receiving the completed request form.

  • Network Security Interview Questions

  • 25. What About Exam Marks And Results?

    Exam marks and any minutes from an exam board meeting relating to a particular student should be disclosed. Exam scripts themselves are exempt from disclosure but data subjects do have right of access to any comments or notes recorded on the script. Exam markers should be aware of this and ensure that they do not record any comments on the exam script which they would not be happy for the data subject to see. There are additional rules which state that exam results need not be disclosed any earlier than they are publicly announced.

  • 26. Can We Still Publish Degree Results On Faculty Notice Boards?

    This issue has been considered by the Information Commissioner (formerly the Data Protection Commissioner) who has concluded that provided there is nothing which would enable individual students to be contacted i.e. by the inclusion of e-mail or postal addresses or telephone numbers, then the publishing of degree results does not breach the terms of the new Act. However, if individual students were to indicate that they did not wish their names to be included on the published list, their wish should be respected.

  • Project Manager Interview Questions

  • 27. I Want To Create A Photo Board Showing Photographs Of All Students Within My School. Can I Do This?

    Photographs constitute personal data so you must get consent from all the individuals concerned before you display their photographs. Consent could, for example, be obtained by asking students and staff to supply photographs and informing them at the point of collection exactly how the photographs are to be used. If an individual objects to the display of their photograph then it must be removed. Since photographs may reveal details of the subject’s race and ethnic origin they are classified personal data. Generally photographs should only be used and retained where strictly necessary.

  • Internet Security Interview Questions

  • 28. I Have Obtained Consent To Display Certain Items Of Personal Data On The Faculty Notice Board/in A Faculty Handbook. Can I Also Publish The Information On The Department Website?

    Only if you have obtained specific consent to this from the individuals concerned. You cannot assume that consent for a particular use of data extends to any other use. If you have consent to use personal data for a particular purpose and wish to use this data for another different purpose, additional consent must be obtained from all the relevant individuals. This is especially important in relation to the publication of personal data on websites because the World Wide Web makes information globally accessible.

  • 29. I Am Already Holding Personal Information On A Database Of Contacts Which I Have Compiled Over A Number Of Years. Can I Continue To Hold And Use This Information?

    Yes, but you should think about what personal data you are collecting and holding and why. All the information should be relevant, accurate and held for no longer than necessary. If you are storing or using old or unreliable personal information you should either update or delete it. One way to do this would be to write to the individuals concerned, notifying them of the data you hold and asking them to check that it is correct. You can also inform them of the purposes for which the data is being held and seek their consent.

  • Operations Manager Interview Questions

  • 30. I Have Sent Literature About Forthcoming Events, Reunions Etc. To Former Students Of The University. A Few People Have Objected, Saying That They Do Not Wish To Receive Any Further Communications. What Should I Do?

    You must ensure that these persons are not sent any further communications. If mail is generated electronically you must introduce a system which ensures that people who have objected to receiving communications from the University are removed from your mailing list.

  • 31. Some Of Our Student Files Contain Comments Of A Personal Or Derogatory Nature. Could These Be Viewed By The Individual Concerned Under The Terms Of The Act?

    Yes. Potentially all personal information can be disclosed. The general rule is that you should not record, however informally, comments which you would not be happy for the data subject to see.

  • 32. What About Confidential Information Such As References. Do These Have To Be Disclosed?

    Potentially yes. There are complicated rules relating to references but basically although the subject of the reference cannot demand a copy from the person giving the reference, t
    hey could possibly obtain it from the person (or institution) to which the reference was sent.

  • Test Manager Interview Questions

  • 33. I Have Been Contacted By A Third Party Requesting Information About A Student/member Of Staff. What Should I Do?

    The general rule is to be very careful about who information is disclosed to. You need to find out exactly who requires the personal data and why. Ideally you should obtain the consent of the relevant student/member of staff before any data is disclosed to a third party, although this may not always be possible (e.g. in a medical emergency). If you are in any doubt as to whether information should be disclosed please contact the information Protection and Security manager.

  • IDMS (Integrated Database Management System) Interview Questions

  • 34. I Have A Form/questionnaire Which Students/members Of Staff/third Parties Complete And Return. Do I Need To Modify This Form To Comply With The New Act?

    Yes.

    Please contact the:
    The Information Protection and Security manager who will be able to advise you on amending any forms to include a statement informing recipients what their personal data will be used for, where it will be held and to whom it may be disclosed.

  • 35. What About Records. How Long Should I Retain Them?

    The new Act states that personal data should be held for no longer than is necessary. In general it is good practice not to collect or retain more personal information than is strictly necessary. All irrelevant or out of date personal information should be destroyed. For advice on the management of your records please contact the he Information Protection and Security manager.

  • 36. This All Seems Quite Complicated. Is There A Basic Rule I Should Remember?

    Be very careful about the personal information you hold and in particular that you pass it on to. Think about what you are using personal data for and whether this is what the individual concerned would expect you to be using it for. Wherever possible obtain specific consent.

  • Computer Security Interview Questions