• Home
  • EMC
  • E20-380 Storage Management Implementation Dumps

Pass Your EMC E20-380 Exam Easy!

100% Real EMC E20-380 Exam Questions & Answers, Accurate & Verified By IT Experts

Instant Download, Free Fast Updates, 99.6% Pass Rate

EMC E20-380 Practice Test Questions, Exam Dumps

EMC E20-380 (Storage Management Implementation) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. EMC E20-380 Storage Management Implementation exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the EMC E20-380 certification exam dumps & EMC E20-380 practice test questions in vce format.

A Fundamental Guide to the E20-380 Exam and NetWorker Concepts

The E20-380 Exam was a significant milestone for IT professionals seeking to validate their expertise in enterprise data protection. Specifically, it was the qualifying test for the EMC Storage Administrator, NetWorker Specialist certification. While this particular exam code is now retired as part of the evolution of the Dell Technologies certification portfolio, the principles it tested remain profoundly relevant. Understanding the structure and content of the E20-380 Exam provides a robust framework for learning the core tenets of enterprise backup and recovery. This series will deconstruct the knowledge domains of the exam, offering a deep dive into the technology it was built around.

The curriculum for the E20-380 Exam served as a comprehensive guide to implementing and managing the NetWorker backup and recovery solution. It was designed for system administrators, storage administrators, and implementation engineers who were responsible for the day-to-day operations of a NetWorker environment. The topics covered ranged from initial installation and configuration to advanced administration, performance tuning, and disaster recovery. By exploring these topics, we can build a foundational understanding that is applicable not only to modern versions of NetWorker but also to the broader field of data protection, making the study of the E20-380 Exam's syllabus a valuable exercise.

The Core Purpose of NetWorker

At its heart, NetWorker is an enterprise-level, cross-platform data protection software solution. Its primary function is to centralize and automate backup and recovery processes for a wide array of operating systems, applications, and databases within a heterogeneous IT environment. Originally developed by Legato and later acquired by EMC, which is now part of Dell, NetWorker has a long history of safeguarding critical data for large organizations. The E20-380 Exam focused on ensuring that administrators could effectively wield this powerful tool to meet stringent recovery point objectives (RPO) and recovery time objectives (RTO) demanded by businesses.

NetWorker's design philosophy is built on the principles of reliability, scalability, and flexibility. It can protect everything from individual files on a user's laptop to massive, multi-terabyte databases powering mission-critical applications. It achieves this through a client-server architecture that allows a central server to manage backup schedules, media, and data movement for hundreds or even thousands of clients across the network. A candidate preparing for the E20-380 Exam would have needed to master this architecture to effectively manage data protection policies, monitor jobs, and ensure the recoverability of all protected data assets.

Deconstructing the NetWorker Architecture

A crucial component of the E20-380 Exam curriculum was a thorough understanding of the NetWorker architecture. The environment is composed of three primary functional components: the NetWorker Server, NetWorker Storage Nodes, and NetWorker Clients. The NetWorker Server acts as the brain of the operation. It maintains the central configuration, houses the media database and resource files, and coordinates all backup and recovery activities. All policies, schedules, and client configurations are managed from this central server, making its health and availability paramount for the entire data protection infrastructure.

The NetWorker Client is the software component installed on any machine that contains data to be protected. This could be a file server, a database server, or a virtual machine. The client software is responsible for reading the data from the local disk and transmitting it across the network during a backup. Conversely, during a restore, it receives data from the backup infrastructure and writes it back to its original or an alternate location. The client interacts with the NetWorker Server to receive instructions on what to back up, when to back up, and where the backup data should be sent.

A NetWorker Storage Node is a dedicated machine that manages and controls backup devices. While the NetWorker Server can also function as a storage node, in larger environments, it is common to have separate, dedicated storage nodes to distribute the workload. A storage node is directly connected to backup hardware, such as tape libraries, virtual tape libraries (VTLs), or disk-based backup appliances. Its job is to receive the backup data stream from the clients and write it to the configured storage media. This distribution of roles was a key concept for the E20-380 Exam, as it directly impacts performance and scalability.

The NetWorker Management Console (NMC)

Interacting with and managing this distributed architecture is accomplished through the NetWorker Management Console, or NMC. The NMC is a graphical user interface (GUI) that provides a centralized point of control for the entire NetWorker datazone. For anyone studying for the E20-380 Exam, proficiency with the NMC was not just recommended, it was essential. From the NMC, an administrator can configure and manage clients, devices, backup policies, and schedules. It is the primary tool for monitoring the real-time status of backup and recovery jobs, viewing logs, and generating reports on data protection activities.

The NMC server is typically installed on the NetWorker server but can also be installed on a separate machine for management flexibility. It presents a comprehensive view of all configured resources, including clients, save groups, storage nodes, and media pools. Administrators use the NMC to initiate ad-hoc backups, perform data recoveries, manage the lifecycle of backup media, and troubleshoot any issues that arise. A deep understanding of the various menus, wizards, and diagnostic tools within the NMC was a core competency tested by the E20-380 Exam, as it is the administrator’s primary window into the health and performance of the system.

Understanding NetWorker Save Sets

A fundamental concept in NetWorker, and a key topic for the E20-380 Exam, is the save set. A save set is the smallest unit of data that NetWorker backs up and tracks. When a client is configured for backup, you specify which file systems, directories, or application data to protect. During the backup process, the data from each of these specified points is bundled into a save set. For instance, backing up the C: drive and D: drive of a Windows client would result in two distinct save sets. Each save set is individually tracked within the NetWorker media database.

This granular approach to data management provides significant flexibility. Each save set has its own metadata, including the client name, the data path, the backup level, and the time of the backup. When a restore is required, an administrator can browse the available save sets for a specific client and select the exact one needed for recovery. This tracking mechanism is critical for ensuring data integrity and simplifying the process of locating and recovering specific versions of files or entire systems. The E20-380 Exam would have tested a candidate's ability to manage and recover data using the save set concept.

Backup Levels and Data Protection Strategy

NetWorker supports various backup levels to enable efficient and flexible data protection strategies. The most common levels, which were a core part of the E20-380 Exam syllabus, are Full, Incremental, and Differential. A Full backup, as the name implies, captures all the selected data, regardless of whether it has changed since the last backup. Full backups form the baseline for any recovery operation but are the most time-consuming and storage-intensive to perform. They are typically scheduled to run on a weekly or monthly basis, often over a weekend when system load is lower.

An Incremental backup captures only the files that have been created or modified since the last backup of any level (full or incremental). This method is very efficient in terms of backup time and storage space. A common strategy involves running a full backup on Sunday, followed by incremental backups on Monday through Saturday. To perform a full restore from this sequence, one would need the last full backup and all subsequent incremental backups. This makes the restore process more complex than recovering from a single full backup, a trade-off that administrators must carefully consider.

A Differential backup captures all files that have been created or modified since the last full backup. This means that each successive differential backup will contain all changes from the previous days. For example, a differential backup run on Wednesday would include all changes from Monday, Tuesday, and Wednesday. To perform a full restore, an administrator would only need the last full backup and the most recent differential backup. This simplifies the restore process compared to an incremental strategy but consumes more storage space as the week progresses. The E20-380 Exam required a deep understanding of these trade-offs.

A less common but important backup level is the Cumulative Incremental. This level backs up all changes since the last full backup, similar to a differential. However, it is used within an incremental schedule. For instance, a schedule might be Full, Incremental, Incremental, Cumulative, Incremental, Incremental, Full. This provides an intermediate point that can speed up recovery without requiring a full backup. Effectively designing a backup schedule using these different levels to balance backup window constraints, storage consumption, and recovery speed objectives was a key skill for a NetWorker specialist and a focus of the E20-380 Exam.

Policies for Data Retention and Browsing

Two of the most critical policy types in NetWorker are the browse policy and the retention policy. These policies dictate how long information about backed-up files is kept and how long the actual backup data is stored and considered recoverable. The E20-380 Exam would have emphasized the importance of correctly configuring these policies to meet business and compliance requirements. The browse policy specifically controls how long the file index data for a save set is kept in the client file index database. This index is what allows a user to "browse" the contents of a backup and select individual files for recovery.

Once the browse policy for a save set expires, the detailed file-level information is purged. This means you can no longer browse the backup to see its contents, but the save set itself still exists on the backup media. This is a critical distinction. The data is not gone, but recovering it becomes more difficult, as you would need to know the exact path and filename to recover, or you would have to recover the entire save set. The browse policy is typically set for a shorter period than the retention policy, such as 30 or 60 days, to manage the size of the client file indexes.

The retention policy, on the other hand, determines the lifespan of the actual save set data on the backup media. As long as a save set has not exceeded its retention period, it is considered valid and recoverable. Once the retention policy expires, NetWorker marks the save set as recyclable. This means that the media volume on which the save set resides can be overwritten with new backup data. Properly setting retention policies is essential for both regulatory compliance, which may require data to be kept for years, and storage capacity management, to ensure old, unneeded data is purged to make room for new backups.

Misconfiguring these policies can have severe consequences. A browse policy that is too short can frustrate users trying to perform simple file restores. A retention policy that is too short could lead to catastrophic data loss if a save set is recycled before it is no longer needed. Conversely, policies that are too long can lead to sprawling, unmanageable index databases and excessive spending on backup storage media. A significant portion of the E20-380 Exam would have focused on scenarios requiring the candidate to apply the correct browse and retention policies to meet specific service-level agreements.

Planning a NetWorker Implementation

Successfully deploying NetWorker requires careful planning, a topic that was foundational for the E20-380 Exam. The planning phase involves assessing the existing environment and defining the data protection requirements. This includes identifying all the systems and applications that need to be backed up, understanding the volume of data, and determining the acceptable windows for backup operations. An administrator must also work with business stakeholders to define the RPO and RTO for different typest of data. This information is critical for designing an appropriate backup strategy, including the selection of backup levels and schedules.

Network infrastructure is another critical consideration. Backups can be network-intensive, so it is important to ensure that there is sufficient bandwidth between the clients, storage nodes, and the NetWorker server. In many cases, a dedicated backup network is implemented to isolate backup traffic from the production network, preventing any impact on business applications. Sizing the NetWorker server and storage nodes is also a key part of the planning process. The hardware must be powerful enough to handle the expected workload, including managing the databases, processing data streams, and writing to the backup devices without creating bottlenecks.

Finally, planning for disaster recovery is a non-negotiable aspect of any NetWorker implementation. This involves not only ensuring that data is backed up but also that it can be recovered in the event of a total site failure. Strategies often include cloning backup tapes or replicating disk-based backups to an off-site location. It also includes having a well-documented plan for recovering the NetWorker server itself, a process known as a bootstrap recovery. The E20-380 Exam would expect a certified specialist to be able to design a NetWorker solution that is not only efficient for daily operations but also resilient in the face of a disaster.

Preparing for NetWorker Installation

The journey to mastering the skills required for the E20-380 Exam began with the fundamental process of installation. Before any software packages are installed, a thorough preparation and planning phase is crucial for a successful deployment. This involves verifying system requirements for all NetWorker components, including the server, storage nodes, clients, and the NetWorker Management Console (NMC). An administrator must ensure that the chosen operating systems are supported and that the hardware specifications, such as CPU, memory, and disk space, meet or exceed the recommended minimums for the intended workload.

A key part of this preparatory phase is network configuration. It is essential to ensure proper name resolution, both forward and reverse, for all components that will communicate within the NetWorker datazone. Firewalls between the server, storage nodes, and clients must be configured to allow the necessary NetWorker communication ports. Failing to properly configure name resolution and firewall rules is one of the most common causes of issues in a new deployment. A candidate for the E20-380 Exam would be expected to know these prerequisites and be able to troubleshoot connectivity problems stemming from an improperly prepared environment.

Finally, planning the layout of the installation is critical. This includes deciding where to install the NetWorker software binaries and, more importantly, where to place the various NetWorker databases and log files. For performance and recoverability, it is a best practice to place the NetWorker resource directory, media database, and client file indexes on separate, high-performance disk volumes from the operating system. Careful consideration of these elements before running the installer lays the groundwork for a stable, scalable, and high-performing data protection environment, a core tenet of the knowledge tested by the E20-380 Exam.

The NetWorker Installation Process

Once the preparatory work is complete, the installation process itself can begin. The E20-380 Exam would have expected administrators to be familiar with the installation procedures on both Windows and UNIX/Linux platforms. The process typically involves running an installation package which guides the administrator through the setup. For the NetWorker Server, this includes installing the core server daemons, the storage node software (as the server is also a storage node by default), the client software, and the NMC server. The installation wizard prompts for key information, such as the name of the NetWorker server, which formally establishes the datazone.

During the server installation, the setup process creates the necessary directory structures and initializes the core databases. This includes the resource directory, which contains all the configuration files, the media database, which tracks all backup volumes and save sets, and the jobs database. Following the server installation, the next step is to install the NetWorker client software on all the machines that need to be protected. This is a more straightforward process, but it is a critical step to register the clients with the NetWorker server, enabling them to be configured for backups.

Lastly, dedicated storage nodes would be installed. This involves running the NetWorker installation package on the designated storage node server and selecting only the storage node and client components. After installation, the storage node must be configured within the NetWorker server's resources to make it available for use. For the E20-380 Exam, understanding the sequence of these installations and the role each component plays was fundamental. A properly installed environment is the essential first step before any data protection policies can be configured or any backups can be run.

Configuring NetWorker Clients

After installation, the real work of configuration begins. The first step is to configure the client resources within the NMC. Each machine with the NetWorker client software installed must have a corresponding client resource created on the NetWorker server. This resource is the central point for defining the properties of the client. The E20-380 Exam would have tested an administrator's ability to navigate the NMC to create and modify these resources effectively. Key attributes configured here include the client's name, the save sets to be backed up, and the backup schedule to be followed.

Defining the save sets is a critical step in client configuration. This tells NetWorker exactly what data to protect on that client. This can be as broad as 'All', which backs up all local filesystems, or as specific as a single directory or file path. For application servers, such as those running databases or email systems, specialized NetWorker modules are used, and the save set configuration would involve specific keywords recognized by those modules. Correctly identifying and defining the critical data on each client to ensure a complete and consistent backup was a core competency for a NetWorker specialist.

Another important aspect of client configuration is the use of groups. Clients with similar backup requirements, such as belonging to the same department, running the same operating system, or having the same backup window, can be organized into groups. This greatly simplifies administration. Instead of scheduling backups for hundreds of individual clients, an administrator can apply a single backup policy and schedule to an entire group. This approach not only saves time but also ensures consistency in the application of data protection policies across the enterprise, a concept heavily emphasized in the E20-380 Exam curriculum.

Configuring Backup Devices

A NetWorker environment is incomplete without devices to store the backup data. Configuring these devices was a major topic in the E20-380 Exam. NetWorker supports a wide range of backup targets, from traditional physical tape libraries to modern disk-based systems. For a physical tape library, the configuration process involves ensuring the operating system can see the library's robotic arm and the tape drives. Once the hardware is visible to the OS, the administrator can use the NMC's device configuration wizards to define the library and its associated drives within NetWorker.

Disk-based backup is increasingly popular, and NetWorker offers several ways to configure it. The simplest is the Advanced File Type Device (AFTD). An AFTD is essentially a directory on a filesystem that NetWorker treats as a backup device, writing backup data into files within that directory. This is useful for small environments or for staging backups before they are cloned to tape. For enterprise environments, the preferred disk target is often a purpose-built backup appliance like Dell Data Domain. Integration with these systems is a key feature, enabling high-speed, deduplicated backups.

Configuring these devices involves creating the device resource within NetWorker and then labeling the media that will be used. For an AFTD, you create and label volumes within the device's directory structure. For a tape library, this involves loading tapes into the library and using NetWorker to label them, preparing them for use. A properly configured set of devices is essential for the backup process to function correctly. The E20-380 Exam would have required candidates to demonstrate their ability to set up, configure, and troubleshoot various types of backup devices within a NetWorker datazone.

Media Management and Pools

Effective media management is critical for the long-term success of a data protection strategy. A core concept in NetWorker's media management, and a key subject for the E20-380 Exam, is the media pool. A pool is a logical collection of backup volumes. All volumes within a single pool share common characteristics, such as the type of media and, most importantly, the retention policies applied to the data written to them. By directing backups to specific pools, administrators can enforce different data lifecycle policies for different types of data.

For example, an administrator might create a "Daily-30Day-Pool" for standard file server backups that need to be retained for 30 days. A separate "DB-1Year-Pool" could be created for database backups that have a one-year retention requirement due to compliance regulations. When a backup job runs, it is directed to a specific pool, and NetWorker selects an available, writable volume from that pool to store the save set. This logical grouping is the primary mechanism for ensuring that data is retained for the correct period.

The management of these pools and the volumes within them is an ongoing administrative task. This includes monitoring the amount of available space in disk-based pools, adding new volumes (labeling new tapes or creating new file device volumes), and tracking the lifecycle of volumes as they become full, non-writable, and eventually recyclable. The NMC provides extensive tools for viewing the status of all media, including which save sets reside on which volume. A NetWorker specialist preparing for the E20-380 Exam would need to be an expert in creating and managing pools to support a complex enterprise backup policy.

The Concept of Cloning and Staging

Cloning is the process of making a copy of a save set from one media volume to another. This is a fundamental feature for disaster recovery and long-term data archival. A common strategy involves performing the initial backup to a fast, disk-based device like an AFTD or a Data Domain system. This allows for rapid backups and, more importantly, fast operational restores. Then, a clone operation is run to copy these save sets from the disk device to a physical tape. This tape can then be transported to a secure, off-site location for disaster recovery purposes.

This two-step process is often referred to as staging. The backup is first "staged" to disk and then "cloned" to its final destination. Staging provides the best of both worlds: fast recovery for recent data from disk and robust, portable disaster recovery protection from tape. The E20-380 Exam would have tested an administrator's understanding of how to configure and automate this process. NetWorker allows clone operations to be triggered automatically after a backup group completes, ensuring that off-site copies are created without manual intervention.

Each clone of a save set is a complete, independent copy. It has its own browse and retention policy, which can be different from the original save set. This is particularly useful for long-term archival. The original backup on disk might have a retention of 30 days, while the cloned copy on tape could be configured with a retention of seven years to meet legal requirements. Mastering the configuration of clone pools and schedules was a critical skill for any candidate aspiring to pass the E20-380 Exam and be recognized as a NetWorker specialist.

Managing NetWorker's Internal Databases

The NetWorker server relies on a set of internal databases to function. Understanding how to manage and protect these databases was a mandatory skill for the E20-380 Exam. The three main components are the resource directory, the media database, and the client file indexes. The resource directory contains all the configuration files for clients, groups, policies, devices, and schedules. The media database tracks every volume, every session, and every save set in the entire datazone. The client file indexes (CFI) store the detailed, file-level information for each backup, enabling the browse and restore functionality.

These databases are critical; if they are lost, the entire NetWorker server becomes non-functional, and recovering data becomes extremely difficult. Therefore, protecting the NetWorker server itself is the most important backup an administrator must configure. This is accomplished through a special backup process known as the "bootstrap" backup. The bootstrap backup saves a copy of the resource directory and the media database. It also generates a special disaster recovery file that contains the information needed to restore the server in a worst-case scenario.

Regular maintenance of these databases is also important. The client file indexes, in particular, can grow very large over time. Administrators must monitor their size and ensure that browse policies are set appropriately to prune old, expired index entries. The E20-380 Exam would expect a candidate to know the procedure for checking the consistency of the databases, performing maintenance, and, most importantly, executing a bootstrap recovery. Without a solid understanding of how to manage and protect these core components, an administrator cannot guarantee the reliability of the entire data protection system.

Performing and Managing Backups

The core function of NetWorker, and the primary focus of daily administration, is the execution of backups. For anyone preparing for the E20-380 Exam, a deep understanding of how to initiate, manage, and monitor backup jobs was essential. Backups in NetWorker are typically managed through save groups. A save group is a collection of clients that are scheduled to be backed up at the same time. The group resource defines properties such as the start time, the clients included, and other operational settings. This group-based approach is fundamental to automating the data protection process across an enterprise.

While most backups are scheduled to run automatically, administrators frequently need to perform manual, or ad-hoc, backups. This might be necessary to protect a system before applying a critical patch or to re-run a backup for a client that failed during its scheduled window. The NetWorker Management Console (NMC) provides a straightforward interface for starting a manual backup of a specific client or an entire group. A key skill tested conceptually in the E20-380 Exam was knowing how to override default settings, such as the backup level or the target media pool, for these manual operations.

Managing the execution of these groups is a critical task. The NMC offers detailed monitoring windows where administrators can view the real-time status of each save group, including the throughput of each client backup, the amount of data transferred, and the specific media volume being used. This visibility is crucial for identifying performance bottlenecks and ensuring that backups complete within their designated windows. The ability to effectively manage both scheduled and unscheduled backup operations is the hallmark of a competent NetWorker administrator, a standard upheld by the E20-380 Exam.

Monitoring and Reporting

A data protection system cannot be managed effectively without robust monitoring and reporting. NetWorker provides several tools for this purpose, and proficiency in using them was a key competency for the E20-380 Exam. The primary tool for real-time monitoring is the NMC's monitoring window. Here, an administrator can see active sessions, device status, and pending events. It provides an immediate, at-a-glance view of the health of the NetWorker datazone. Logs for each backup session are available, offering detailed information that is invaluable for troubleshooting any issues that may arise during a backup or recovery operation.

Beyond real-time monitoring, reporting is essential for trend analysis, capacity planning, and demonstrating compliance with service-level agreements. The NMC includes a reporting engine that can generate a variety of pre-defined reports, such as backup status summaries, media usage reports, and client configuration details. These reports can be scheduled to run automatically and be emailed to stakeholders. For instance, a daily report summarizing the success and failure of all backup jobs from the previous night is a common requirement in most IT shops.

For more advanced or customized reporting needs, NetWorker's underlying databases can be queried directly, or third-party reporting tools can be utilized. The key takeaway, and a concept relevant to the E20-380 Exam, is that data protection is not a "set it and forget it" task. Continuous monitoring of job success rates, data growth, and media consumption is required to proactively manage the environment. This ensures that potential issues are identified and addressed before they lead to failed backups and potential data loss, safeguarding the integrity of the entire backup infrastructure.

Troubleshooting Common Backup Failures

Despite careful planning and configuration, backup jobs can and do fail. A significant portion of a NetWorker administrator's time is spent on troubleshooting these failures. The E20-380 Exam would have expected candidates to possess a systematic approach to problem resolution. The first step in troubleshooting any failure is to examine the logs. The save group completion report provides a high-level summary, but the detailed session logs, accessible through the NMC, contain the specific error messages that point to the root cause of the problem.

Common causes of backup failures are often related to connectivity. This could be a result of network issues, such as a firewall blocking necessary ports, or name resolution problems where the server and client cannot communicate with each other. Another frequent issue is related to permissions, where the NetWorker client software on a machine does not have the necessary rights to read the files it is trying to back up. Media errors are also a common culprit, such as a tape library running out of available tapes in the correct pool or a disk device running out of space.

Troubleshooting requires a methodical process of elimination. The administrator must check connectivity using tools like nsrping, verify name resolution, inspect the permissions on the source files, and check the status of the target backup devices and media. The error messages in the NetWorker logs, while sometimes cryptic, usually provide the necessary clues to guide this investigation. The ability to efficiently diagnose and resolve these common issues is a critical skill for maintaining a healthy backup environment and a core competency for any specialist certified via the E20-380 Exam.

The Data Recovery Process

The ultimate purpose of any backup system is the recovery of data. All the planning, configuration, and backup operations are meaningless if data cannot be restored when needed. The E20-380 Exam placed a heavy emphasis on understanding the various recovery methods available in NetWorker. The most common type of restore is a browsable recovery. This is used when a user needs to recover a specific file or directory and knows the approximate date it was last available. Using the NMC, an administrator can connect to the client, select a point in time, and browse the file index to select the exact items to be restored.

The recovery process involves several steps. First, NetWorker consults the client file index to determine which save set contains the requested file. Then, it consults the media database to identify the specific media volume (tape or disk volume) on which that save set resides. If the volume is in a tape library, NetWorker will issue a command to the library to mount the required tape into a drive. Finally, NetWorker reads the data from the media and sends it to the client, which writes the file back to the specified location, either its original path or an alternate directory.

This process highlights the importance of the client file indexes and the media database. Without them, locating the correct piece of data on the correct tape would be a near-impossible manual task. The NMC abstracts this complexity, providing a user-friendly wizard to guide the administrator through the recovery process. A NetWorker specialist preparing for the E20-380 Exam would need to have hands-on experience performing various types of recoveries to be truly proficient.

Directed and Save Set Recoveries

Beyond the standard browsable recovery, NetWorker offers other powerful recovery options. A directed recovery is a process where data from one client's backup is restored to a different client. This is extremely useful in several scenarios. For example, if a server has completely failed and a new replacement server has been built, a directed recovery can be used to restore the original server's data onto the new hardware. It is also used for testing purposes, allowing administrators to restore production data into a non-production environment without impacting the original system.

Configuring a directed recovery requires careful attention to permissions. The target client must be explicitly authorized to receive data from the source client's backups. This is a security feature to prevent unauthorized access to data. This authorization is configured in the source client's resource properties on the NetWorker server. The E20-380 Exam would expect a candidate to understand how to configure and execute a directed recovery, as it is a common procedure in many disaster recovery and migration scenarios.

Another important recovery method is the save set recovery. This is used when an entire save set needs to be restored, such as a full filesystem or a database. It is also the method used when the client file index for a backup has expired due to the browse policy. In this case, browsing for individual files is not possible, but the entire save set can still be recovered as a whole. The administrator uses the NMC to select the client and then queries the media database for all available save sets, selecting the correct one for recovery based on its name and backup time.

Bare Metal Recovery Concepts

Bare Metal Recovery (BMR) is the process of restoring a complete server from the ground up, including the operating system, applications, and data. While NetWorker itself is not a BMR solution in the sense of provisioning an OS, it is a critical component of the BMR process. The general strategy involves using a third-party OS provisioning tool or a standard OS installation media to get a base operating system running on the new hardware. The server is configured with the same identity (hostname, IP address) as the failed machine.

Once the base OS is running and network connectivity is established, the NetWorker client software is installed. From this point, the server is essentially a blank slate ready to receive its data. The administrator then performs a full recovery of all the critical save sets from the original machine, such as the operating system files, application binaries, and user data. This process restores the server to its state at the time of the last successful backup. For Windows clients, this often involves recovering the system state save sets.

The E20-380 Exam would have covered the role NetWorker plays in a BMR strategy. While NetWorker does not handle the initial OS deployment, its ability to reliably back up and restore all the necessary system files is what makes a full server recovery possible. A well-defined BMR plan, which includes regular full backups of the operating system volumes and a clear, documented recovery procedure, is a cornerstone of a robust disaster recovery plan. The NetWorker specialist must understand how to provide the data needed to complete this critical process.

Recovering the NetWorker Server

The single most important system to be able to recover is the NetWorker server itself. If the server fails and its internal databases are lost, the ability to orchestrate any other recoveries is compromised. This is why the bootstrap backup is so critical. As mentioned earlier, the bootstrap is a special backup of the server's resource directory and media database. The E20-380 Exam would have thoroughly tested a candidate's knowledge of this disaster recovery procedure, as it is essential for the resilience of the entire backup infrastructure.

The recovery process for the NetWorker server begins with rebuilding the base machine. The operating system must be installed, and NetWorker software must be re-installed. At this point, the server is a blank slate with empty databases. The next step is to use the mmrecov command-line utility. This utility reads the special bootstrap file that was created during the bootstrap backup. This file contains all the information NetWorker needs to locate the most recent bootstrap save set on the backup media.

The mmrecov process will prompt the administrator to insert the required backup volume. It then scans the volume, finds the bootstrap save set, and restores the resource files and the media database. Once this process is complete, the NetWorker server is brought back online. It now has its full configuration and the knowledge of where all the other client backups are located. At this point, the server is fully functional again, and recoveries for any other client in the datazone can proceed as normal. Mastering this bootstrap recovery procedure was non-negotiable for passing the E20-380 Exam.

NetWorker Modules for Application Protection

Protecting simple file systems is straightforward, but enterprise environments are dominated by complex applications like databases and email systems. Simply backing up the files of a running database is not sufficient, as it can lead to a corrupt and unusable backup. To address this, NetWorker utilizes specialized modules. The E20-380 Exam curriculum placed significant emphasis on understanding the role of these modules. The NetWorker Module for Microsoft (NMM) and the NetWorker Module for Databases and Applications (NMDA) are two of the most prominent examples.

These modules act as a bridge between NetWorker and the application. They leverage the application's own native backup APIs to ensure a consistent and recoverable backup. For example, when backing up a Microsoft SQL Server database with NMDA, the module communicates with the SQL Server's Virtual Device Interface (VDI). This interaction properly quiesces the database, flushes all transactions, and then streams the data to the NetWorker storage node. This guarantees an application-consistent backup that can be reliably restored. A NetWorker specialist must understand this co-dependency.

Similarly, NMM provides deep integration with the Microsoft ecosystem, including Exchange, SharePoint, and Hyper-V. For Exchange, it can perform granular, mailbox-level recoveries. For Hyper-V, it provides image-level backups of virtual machines. The configuration of these modules involves installing the module software on the application server and then configuring the client resource in NetWorker with specific parameters and save set entries recognized by the module. The E20-380 Exam would expect a candidate to be familiar with the purpose and basic configuration of these essential modules.

Snapshot Management Integration

Modern storage arrays provide powerful, hardware-based snapshot capabilities. A snapshot is an instantaneous, point-in-time, read-only copy of a volume. Taking a snapshot has very little impact on the performance of the production application. NetWorker can integrate with these storage arrays to leverage snapshot technology for backup purposes. This functionality was an advanced topic covered in the E20-380 Exam, as it represents a more sophisticated approach to data protection, particularly for large, performance-sensitive applications.

The workflow typically involves NetWorker instructing the storage array to create a snapshot of the volume where the application data resides. Once the snapshot is created, it is mounted to a secondary host, often the storage node itself. The NetWorker client on this secondary host then backs up the data from the mounted snapshot. The key advantage of this method is that the backup process reads from the snapshot, not the live production volume. This completely eliminates the performance impact of the backup I/O on the application server, a significant benefit for mission-critical systems.

After the backup from the snapshot is complete, NetWorker instructs the storage array to delete the snapshot, freeing up space on the array. This entire process can be orchestrated and automated from within NetWorker. The configuration is more complex than a standard backup, requiring the setup of replication and snapshot management resources within the NetWorker Management Console. However, for environments with demanding performance requirements, this snapshot-based approach is an invaluable tool. Understanding its concepts was a key differentiator for expert-level candidates of the E20-380 Exam.

Deduplication with Data Domain

As data volumes grew exponentially, traditional backup methods that stored multiple full copies of data became prohibitively expensive. The solution to this problem is deduplication, and NetWorker's integration with Dell Data Domain systems was a critical topic for the E20-380 Exam. Deduplication is a process that eliminates redundant data segments. Instead of storing identical blocks of data multiple times, a deduplication system stores only one copy and uses pointers for all subsequent references. This can result in dramatic reductions in the amount of physical storage required for backups.

Data Domain systems are purpose-built backup appliances that perform high-speed, inline deduplication. When NetWorker sends backup data to a Data Domain system, the appliance analyzes the incoming data stream, breaks it into chunks, and compares each chunk to what has already been stored. If a chunk is unique, it is stored. If it is a duplicate, only a pointer is stored. This process can lead to data reduction ratios of 10:1 to 30:1 or even higher, depending on the data type.

The integration, known as DD Boost, provides several key advantages. It allows for client-side deduplication, where the NetWorker client can perform some of the deduplication work before sending the data over the network. This significantly reduces the amount of network bandwidth consumed during backups. The E20-380 Exam would have expected administrators to understand the benefits of this integration and the basics of how to configure a Data Domain system as a backup device within NetWorker to leverage these powerful data reduction capabilities.

Securing the NetWorker Environment

Data protection infrastructure is a prime target for malicious attacks, making security a paramount concern. The E20-380 Exam would have covered the various security features available within NetWorker to protect the environment. The primary mechanism for securing communication between the NetWorker components is an authentication service based on NetWorker's proprietary nsrauth protocol. This ensures that only trusted and authenticated hosts can communicate with each other within the datazone, preventing unauthorized clients or servers from joining and potentially accessing backup data.

In addition to securing communications, NetWorker provides role-based access control (RBAC) for administration. Through the use of user groups and roles within the NetWorker Management Console, it is possible to grant different levels of administrative privileges to different users. For example, a junior operator might be given a role that allows them to monitor backups and perform recoveries for a specific set of clients, but not to change the configuration of policies or devices. This principle of least privilege is a security best practice and is fully supported by NetWorker's administrative framework.

Protecting data itself is also a critical function. NetWorker supports the encryption of backup data both in-flight, as it travels across the network, and at-rest, once it is written to the backup media. NetWorker can use its own built-in encryption capabilities, or for Data Domain targets, it can leverage the encryption features of the appliance itself. A comprehensive understanding of how to implement these security controls to harden the NetWorker environment and protect critical backup data was a key skill for any specialist aiming for the E20-380 Exam certification.

Performance Tuning and Optimization

A default NetWorker installation will function, but in a large and busy environment, performance tuning is often necessary to meet backup windows and recovery time objectives. The E20-380 Exam would have tested a candidate's knowledge of the common performance bottlenecks and the methods used to address them. The three main areas to consider for performance are the client, the network, and the storage node/backup device. The overall throughput of a backup is only as fast as its slowest component.

On the client side, the bottleneck is often the speed at which the client can read data from its disks. For servers with many small files, the process of traversing the filesystem can also be a bottleneck. On the network side, insufficient bandwidth or high latency between the client and the storage node can severely limit backup speeds. This is why a dedicated, high-speed backup network is often recommended. On the storage node side, the performance of the backup devices themselves is a key factor. The speed of the tape drives or the ingest rate of the disk appliance can be the limiting factor.

NetWorker provides several tuning parameters to optimize performance. A key parameter is parallelism. On the NetWorker server, you can configure the maximum number of simultaneous backup sessions it will manage. On each client, you can configure the number of parallel save streams it can send. On each storage node, you can configure the target sessions for each device, which controls how many save sets can be written to a device concurrently. Correctly balancing these parallelism settings to maximize resource utilization without overloading any single component is a core skill of an experienced NetWorker administrator, and a concept the E20-380 Exam sought to validate.


Go to testing centre with ease on our mind when you use EMC E20-380 vce exam dumps, practice test questions and answers. EMC E20-380 Storage Management Implementation certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using EMC E20-380 exam dumps & practice test questions and answers vce from ExamCollection.

Read More


SPECIAL OFFER: GET 10% OFF

ExamCollection Premium

ExamCollection Premium Files

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads
Enter Your Email Address to Receive Your 10% Off Discount Code
A Confirmation Link will be sent to this email address to verify your login
We value your privacy. We will not rent or sell your email address

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Next

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.