• Home
  • EMC
  • E20-585 Data Domain Specialist Exam for Storage Administrators Dumps

Pass Your EMC E20-585 Exam Easy!

100% Real EMC E20-585 Exam Questions & Answers, Accurate & Verified By IT Experts

Instant Download, Free Fast Updates, 99.6% Pass Rate

E20-585 Premium VCE File

EMC E20-585 Premium File

66 Questions & Answers

Last Update: Aug 06, 2025

$69.99

E20-585 Bundle gives you unlimited access to "E20-585" files. However, this does not replace the need for a .vce exam simulator. To download VCE exam simulator click here
E20-585 Premium VCE File
EMC E20-585 Premium File

66 Questions & Answers

Last Update: Aug 06, 2025

$69.99

EMC E20-585 Exam Bundle gives you unlimited access to "E20-585" files. However, this does not replace the need for a .vce exam simulator. To download your .vce exam simulator click here

EMC E20-585 Practice Test Questions, Exam Dumps

EMC E20-585 (Data Domain Specialist Exam for Storage Administrators) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. EMC E20-585 Data Domain Specialist Exam for Storage Administrators exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the EMC E20-585 certification exam dumps & EMC E20-585 practice test questions in vce format.

Cracking the Code: A Deep Dive into the E20-585 Exam Concepts

Welcome to this comprehensive series designed to explore the concepts and technologies associated with the E20-585 Exam. This examination was historically centered on the Dell EMC NetWorker solution, a cornerstone product for enterprise data protection. While the specific exam code may now be part of Dell's certification history, the principles it tested remain incredibly relevant. Modern data protection strategies are built upon the foundations established by powerful platforms like NetWorker. Understanding these core ideas is essential for any aspiring storage or backup administrator. This series will deconstruct the key domains of the E20-585 Exam.

This first part serves as the foundation for our entire discussion. We will begin by exploring the fundamental architecture of the NetWorker environment, which is the bedrock of everything that follows. We will introduce the primary components, including the server, the clients, and the storage nodes, and explain how they collaborate to create a robust data protection ecosystem. By the end of this article, you will have a clear understanding of the NetWorker datazone, the flow of data during operations, and the critical terminology that was essential for anyone preparing for the E20-585 Exam.

Historical Context of the E20-585 Exam

The E20-585 Exam, officially titled the NetWorker Specialist Exam for Storage Administrators, was a crucial credential for IT professionals. It was designed to validate an individual's ability to install, configure, and manage a NetWorker environment effectively. Passing this exam demonstrated a deep understanding of backup and recovery operations, media management, and basic troubleshooting within the NetWorker framework. It was a benchmark for competence, assuring employers that a certified professional possessed the necessary skills to protect critical enterprise data, a responsibility that continues to grow in importance in the digital age.

The certification path associated with the E20-585 Exam was part of the broader Dell EMC Proven Professional program. This program was highly respected in the industry for its rigorous standards and its focus on real-world application of knowledge. For a storage administrator, achieving this specialist-level certification was a significant career milestone. It signified a transition from general IT knowledge to a specialized expertise in data protection, opening doors to more advanced roles and responsibilities. The exam covered a wide range of topics, ensuring a comprehensive skill set for managing complex backup infrastructures.

Although the E20-585 Exam itself has been retired and replaced by newer certification tracks, the knowledge base it represents has not vanished. The principles of data protection, client-server backup architecture, and disaster recovery planning are timeless. NetWorker, as a product, has continued to evolve, but its core architectural concepts remain influential. Therefore, studying the domains of this historic exam provides a valuable lens through which to understand not only NetWorker itself but also the broader landscape of enterprise backup and recovery solutions that are prevalent in the industry today.

The Core Architecture of EMC NetWorker

At its heart, the NetWorker platform operates on a classic client-server model, a design that provides centralized administration and distributed execution. This architecture is fundamental to its scalability and was a primary focus of the E20-585 Exam. The entire environment, known as a datazone, is controlled by a single, central NetWorker Server. This server acts as the brain of the operation, coordinating all backup and recovery activities. It communicates with various other components to ensure data is protected according to predefined policies and schedules.

The three primary building blocks of any NetWorker datazone are the NetWorker Server, NetWorker Clients, and NetWorker Storage Nodes. The server, as mentioned, is the central controller. The clients are the machines, such as file servers, database servers, or workstations, that contain the data that needs to be protected. Each client runs a small piece of NetWorker software that allows it to communicate with the server. Finally, the storage nodes are responsible for the physical task of writing the backup data onto the target media, which could be tape drives, disk arrays, or other storage devices.

The interaction between these three components is a seamless and highly orchestrated process. When a scheduled backup begins, the NetWorker Server instructs a specific client to start sending its data. The server also directs a storage node to prepare a device to receive that data. The client then streams its data directly to the designated storage node, which writes it to the backup media. This elegant distribution of labor allows the system to handle backups from hundreds or even thousands of clients simultaneously, making it a robust solution for large enterprise environments, a key concept for the E20-585 Exam.

The Role of the NetWorker Server

The NetWorker Server is the single most critical component in the entire data protection infrastructure. It functions as the central command and control hub for the datazone. All configurations, policies, schedules, and monitoring are managed from this server. Without a functioning NetWorker Server, all automated backup and recovery operations would cease. Its primary responsibility is to orchestrate the flow of data and metadata, ensuring that every backup is performed correctly, tracked accurately, and is readily available for recovery when needed. This central role makes its configuration a vital topic for the E20-585 Exam.

One of the server's key functions is maintaining a set of critical databases that contain all the information about the backup environment. The most important of these are the client file index and the media database. The client file index, or CFI, keeps a record of every file that has been backed up for each client, including its version, size, and location. The media database tracks all the backup volumes, such as tapes or disk volumes, and knows which specific savesets are stored on each volume. These databases are essential for browsing files for recovery and for managing the lifecycle of backup media.

Administration of the NetWorker Server and the entire datazone is typically performed through the NetWorker Management Console (NMC). The NMC is a graphical user interface that provides a centralized view of all backup activities, device statuses, and event logs. From this console, an administrator can configure backup policies, define clients, manage storage devices, and initiate manual backup or recovery operations. A deep familiarity with the NMC's features and functionalities was an absolute prerequisite for successfully passing the E20-585 Exam and for competent day-to-day administration of a NetWorker environment.

Exploring the NetWorker Client

In the NetWorker lexicon, a client is any computer system within the network whose data is being protected by the NetWorker server. This can range from a critical database server to a departmental file server or even an end-user workstation. To be recognized and managed by the NetWorker server, each client machine must have the NetWorker client software installed. This software acts as an agent, enabling the machine to communicate with the server and participate in scheduled backup and recovery operations. The proper configuration of clients was a significant part of the E20-585 Exam curriculum.

The client software package includes essential executable programs, most notably the 'save' and 'recover' commands. The 'save' command is responsible for reading the data from the client's file system, preparing it for transport, and sending it across the network to a storage node during a backup. Conversely, the 'recover' command is used during a restore operation. It receives data from a storage node and writes it back to the client's file system, restoring it to its previous state. These commands are the workhorses that perform the fundamental tasks of data protection at the client level.

Clients are defined and configured on the NetWorker server. An administrator creates a client resource, specifying details such as the client's name, the specific data or filesystems to be backed up (known as the save set), and the backup schedule to be applied. This centralized configuration allows for consistent policy enforcement across the entire enterprise. The server initiates the backup process, but it is the client software that performs the actual data reading. This division of responsibility is a key architectural principle that allows NetWorker to scale efficiently.

The Function of the NetWorker Storage Node

The NetWorker Storage Node serves a specialized and critical purpose within the datazone: it manages the physical or virtual backup devices. While the NetWorker Server orchestrates what and when to back up, the storage node handles the "how" and "where" of writing the data. Its primary function is to receive the backup data stream from the clients and write it onto the configured storage media, which can include tape libraries, virtual tape libraries (VTLs), or disk-based backup units like a Data Domain system. This specialization was a key concept tested in the E20-585 Exam.

By offloading the task of device management from the main server, storage nodes play a vital role in the scalability and performance of the backup environment. In a small setup, the NetWorker Server itself can also act as the sole storage node. However, in larger enterprises, deploying dedicated storage nodes is common practice. This allows backup traffic to be distributed across the network, reducing bottlenecks. For instance, a storage node can be placed physically close to a large group of clients, minimizing network latency and improving backup speeds for that segment of the environment.

A storage node has direct control over the backup devices connected to it. It manages tasks like loading and unloading tapes, labeling new media, and managing the disk space on advanced disk devices. The NetWorker Server maintains the metadata about which savesets are on which volumes, but it is the storage node that performs the physical input/output operations. This separation of duties is a powerful architectural feature, allowing for flexible and high-performance data protection strategies, which an E20-585 Exam candidate would need to understand thoroughly.

Navigating the NetWorker Datazone

The term "datazone" is central to the NetWorker vocabulary and was a fundamental concept for the E20-585 Exam. A datazone defines the entire sphere of control for a single NetWorker Server. It encompasses the server itself, along with all the clients and storage nodes that are registered with and managed by that server. In essence, it is a complete, self-contained backup and recovery environment. All policies, schedules, and configurations defined on the server apply to the resources within its datazone. An organization might have one large datazone or several smaller ones depending on its geographical or administrative needs.

The boundaries of a datazone are logically defined by the NetWorker Server. A client or storage node can only belong to one datazone at a time. This creates a clear and manageable administrative domain. All communication related to backup and recovery, such as job scheduling, metadata cataloging, and status reporting, happens within the confines of the datazone. This centralized management model simplifies the administration of potentially vast and complex environments, allowing a small team or even a single administrator to oversee the protection of thousands of systems.

Understanding the datazone concept is crucial for planning and scaling a NetWorker implementation. For example, when adding a new file server that needs to be backed up, an administrator must install the client software on it and then define it as a client resource within the appropriate datazone. Similarly, to add more backup capacity, a new storage node with attached devices would be introduced into the datazone. The scalability of NetWorker is largely due to the ability to easily expand the number of clients and storage nodes within a single, centrally managed datazone.

Understanding the Data Flow in a Backup Operation

To truly grasp how NetWorker operates, it is essential to trace the flow of data and control signals during a typical backup job. This process was a core topic for the E20-585 Exam, as it brings together all the architectural components we have discussed. The entire operation begins with the scheduler on the NetWorker Server. At a predefined time, the scheduler identifies a backup group that is due to run. This group contains a list of clients that need to be backed up according to a specific policy.

Once the group is initiated, the NetWorker Server starts a 'savegrp' process. This process contacts each client listed in the group and instructs it to begin its backup. Simultaneously, the server consults its media database and directs a suitable storage node to prepare a writable volume on one of its devices. The server informs the client which storage node and device it should send its data to. This three-way communication between the server, client, and storage node is the orchestration that kicks off the data movement phase.

With the instructions received, the client starts the 'save' process. This process reads the specified files from the client's disk and streams the data across the network directly to the designated storage node. The client does not send its data to the NetWorker Server; it sends it directly to the storage node. This is a critical point for understanding performance. As the storage node receives the data, it writes it to the prepared backup media. Throughout this process, the client also sends metadata, such as file names and properties, back to the NetWorker server to be cataloged in the client file index.

Upon completion, the client signals the server that its backup is finished. The storage node finalizes writing the data to the media and also updates the server. The server then marks the backup as complete in its databases and generates a log of the activity. This orchestrated flow, which separates the control plane (managed by the server) from the data plane (flowing from client to storage node), is what makes NetWorker an efficient and scalable enterprise backup solution. A candidate for the E20-585 Exam would be expected to describe this process in detail.

Key Terminology for the E20-585 Exam

Mastering the specific terminology used by NetWorker is crucial for both practical administration and for successfully navigating the questions on the E20-585 Exam. One of the most fundamental terms is the "saveset." A saveset is the unit of data that is backed up from a client during a single backup operation. For example, if you back up the /home directory on a Linux client, the entire contents of that directory at that point in time are contained within a single saveset. A saveset is the smallest unit of data that can be individually restored.

Another critical concept is the "bootstrap" saveset. The bootstrap is a special saveset that contains all the vital configuration data for the NetWorker Server itself, including the media database and resource configuration files. It is essentially a backup of the server's brain. The bootstrap is the single most important backup in the entire datazone because it is required to perform a complete disaster recovery of the NetWorker Server. Without a valid bootstrap, recovering the backup environment after a catastrophic server failure would be an immensely difficult, if not impossible, task.

Finally, it is important to clearly distinguish between the "Client File Index" (CFI) and the "Media Database" (MDB). The CFI contains file-level metadata for each client. It's like an index in a book, telling you which files were backed up and when, allowing you to browse and select individual files for recovery. The MDB, on the other hand, is concerned with the backup media. It tracks all the physical or virtual volumes and knows which savesets reside on each volume. So, the CFI answers "what was backed up?", while the MDB answers "where is it stored?".

A Deep Dive into the E20-585 Exam Concepts

We established the foundational knowledge required to understand the Dell EMC NetWorker environment, which was the central focus of the E20-585 Exam. We deconstructed the core architecture, identifying the distinct roles of the NetWorker Server, the clients, and the storage nodes. We also traced the flow of data during a backup operation and defined key terminology. That foundation is critical, as we now move from the theoretical "what" to the practical "how" of managing a NetWorker datazone. This part will delve into the hands-on administrative tasks that were essential for the exam.

This second installment will guide you through the processes of installation, configuration, and daily administration. We will explore the steps involved in setting up the different NetWorker components, from the server to the clients. We will then transition into the crucial tasks of configuring backup devices and managing media pools, which are at the heart of storing protected data. Furthermore, we will examine how backup policies and schedules are constructed to implement an organization's data protection strategy. This section mirrors the practical skills that a certified NetWorker specialist, as validated by the E20-585 Exam, would be expected to possess.

Installing the NetWorker Software

The journey into managing a NetWorker environment begins with the installation of its software components. A successful deployment, and a key knowledge area for the E20-585 Exam, requires a methodical approach. The first and most important installation is that of the NetWorker Server. This process lays the groundwork for the entire datazone. It involves running the installer on a dedicated host, which then sets up the core services, creates the necessary resource and media databases, and prepares the system to begin managing clients and storage nodes. Careful planning regarding the server's operating system and hardware resources is paramount.

Following the server installation, the next logical step is to deploy the NetWorker Storage Node software. This can be installed on the same host as the server for smaller environments, or on separate, dedicated machines for improved performance and scalability. The storage node installation requires the system to have a physical or virtual connection to the backup devices it will manage, such as a Fibre Channel HBA for a tape library or a network connection for a disk-based system. Once installed, the storage node must be configured to recognize and control these devices.

The final and most numerous installation task is deploying the client software. This software must be installed on every machine that contains data to be protected. NetWorker provides client packages for a vast array of operating systems, including various versions of Windows, Linux, and UNIX. The installation is typically straightforward, but in large environments, administrators often use automated software deployment tools to push the client software to hundreds or thousands of machines efficiently. After installation, each new client must be configured as a resource on the NetWorker Server to be included in backup policies.

Configuring Backup Devices and Media

Once the software components are installed, the next critical task is to configure the storage hardware where backup data will reside. This was a heavily tested domain in the E20-585 Exam, as improper device configuration is a common source of backup failures. The process begins on the storage node that is physically connected to the hardware. The administrator uses NetWorker tools to scan for and recognize new devices, whether they are individual tape drives, tape libraries with robotic arms, or disk-based backup appliances. Each device must be properly identified and brought under NetWorker's control.

For environments using tape, configuring a tape library involves several steps. NetWorker must be able to communicate with the library's robotic arm to perform actions like loading, unloading, and moving tapes between slots and drives. The administrator uses the NetWorker Management Console (NMC) to define the library and its drives. They must also label the tape cartridges, a process that writes a NetWorker-specific identifier onto the media, allowing the system to track each tape throughout its lifecycle. This labeling is crucial for the media database to function correctly.

Beyond device configuration, media management is an equally important administrative duty. NetWorker uses the concept of "pools" to organize backup volumes. A media pool is a logical grouping of volumes, typically based on the type of data, its retention period, or the backup level. For example, an administrator might create separate pools for daily incremental backups with a two-week retention and for monthly full backups with a one-year retention. When a backup job runs, NetWorker automatically selects a writable volume from the appropriate pool, simplifying the management of hundreds or thousands of media cartridges.

The NetWorker Management Console (NMC)

The NetWorker Management Console, universally known as the NMC, is the primary graphical interface for administering the entire NetWorker datazone. A deep and practical understanding of the NMC was absolutely non-negotiable for any candidate of the E20-585 Exam. It provides a centralized dashboard for all administrative, monitoring, and reporting activities. From a single console, an administrator can oversee multiple NetWorker servers, giving them a comprehensive view of the entire enterprise data protection landscape. The NMC is typically installed on a dedicated server and accessed via a web browser or a client application.

The NMC is organized into several functional areas. The "Configuration" tab is where administrators define and manage all the resources within the datazone, such as clients, backup policies, schedules, and devices. The "Monitoring" tab provides a real-time view of all running backup and recovery jobs, device status, and system messages. This is the administrator's first stop for checking the health of the environment and identifying any active issues. The "Media" tab is dedicated to managing media pools, tape libraries, and individual volumes.

Another powerful feature of the NMC is its reporting capability. It can generate a wide variety of reports, from summaries of backup success and failure rates to detailed reports on media usage and client backup history. These reports are invaluable for capacity planning, troubleshooting, and demonstrating compliance with data protection service level agreements (SLAs). For any professional studying for the E20-585 Exam, spending extensive time navigating the NMC, understanding its workflows, and practicing configuration tasks was the best way to prepare for the practical aspects of the test.

Creating and Managing Clients

The process of formally adding a system to the backup schedule is known as creating a client resource. After the NetWorker client software is installed on a machine, it remains dormant until it is configured on the NetWorker Server. Using the NMC, an administrator initiates a client creation wizard. This process involves specifying the client's hostname, the backup command to be used, and, most importantly, defining the "save sets." The save set tells NetWorker precisely which filesystems, directories, or data to back up from that client. For example, a save set for a Windows server might be specified as C:\ and D:\Data.

Client configuration offers a high degree of granularity and control. Administrators can specify different save sets for different types of backups. A client might have a save set of All for a weekly full backup, but only a specific application directory for a daily incremental backup. Furthermore, various attributes can be set for each client, such as parallelism, which controls how many simultaneous data streams the client can send to a storage node. Properly tuning these attributes is key to optimizing backup performance and was a topic of interest in the E20-585 Exam.

Managing clients is an ongoing task. As an organization's IT infrastructure evolves, servers are added, retired, or have their storage layouts changed. The backup administrator must ensure that the client configurations in NetWorker reflect these changes. Retiring a client involves deactivating its resource to stop its backups and eventually removing its old backup data (indexes and media) to reclaim space. Keeping the client list accurate and up-to-date is a crucial aspect of good administrative hygiene, ensuring that all critical data is protected and that resources are not wasted backing up decommissioned systems.

Defining Policies, Groups, and Schedules

NetWorker's power lies in its ability to automate complex backup strategies through a hierarchical policy structure. This structure was a core concept in the E20-585 Exam. At the top of this hierarchy is the "Policy" resource. A policy is a high-level container that typically aligns with a business requirement, such as "Standard File Server Protection" or "Critical Database Protection." Each policy defines overarching settings, such as the data retention period. For example, all backups governed by the database policy might be retained for 90 days.

Within each policy, an administrator defines one or more "Workflows," which are often referred to by the legacy term "Groups." A group is a collection of clients that are to be backed up together as a single unit of work. For instance, a group named "Daily_Incrementals" would contain all the clients that are scheduled for an incremental backup every night. Grouping clients logically, perhaps by department, location, or server role, simplifies administration and scheduling. When a group is started, NetWorker attempts to back up every client defined within it.

The timing of these backups is controlled by "Schedules." A schedule defines when a backup action should occur and what level of backup should be performed. A typical schedule might define a "full" backup to run every Friday evening and an "incremental" backup to run on all other nights of the week. This schedule is then associated with a group. This combination of policies, groups, and schedules provides a flexible and powerful framework for implementing even the most demanding data protection SLAs. An administrator can define the strategy once and let the NetWorker scheduler execute it reliably every day.

Understanding Backup Levels

A thorough understanding of different backup levels is fundamental to data protection and was a key area of knowledge for the E20-585 Exam. NetWorker supports several levels, with the most common being full, incremental, and differential. A "full" backup, as its name implies, copies all the specified data, regardless of whether it has changed since the last backup. Full backups are the baseline for any recovery operation, but they are the most time-consuming and require the most storage space. They are typically performed on a weekly or monthly basis.

An "incremental" backup only copies the data that has changed since the last backup of any level (full or incremental). This is determined by checking the file's modification timestamp. Incremental backups are very fast and consume minimal storage space, making them ideal for daily protection. However, restoring from a series of incrementals can be complex, as it requires the last full backup plus every subsequent incremental backup up to the desired point in time. This is the most common backup strategy used in enterprise environments.

A "differential" backup copies all the data that has changed since the last full backup. Each subsequent differential backup will grow larger throughout the week as more files change. The advantage of a differential backup is a simpler restore process; you only need the last full backup and the most recent differential backup. The trade-off is that they consume more space and take longer to run than incremental backups as the week progresses. NetWorker also supported other levels, like levels 1-9, which function as incrementals relative to the last lower-numbered backup, providing advanced flexibility.

Managing the Media Database

The media database (MDB) is one of the two critical databases maintained by the NetWorker Server, and its health is paramount to the entire backup operation. The E20-585 Exam would expect a candidate to understand its function and basic management tasks. The MDB is a comprehensive catalog of every backup volume that NetWorker has ever used. For each volume, it stores vital information, such as its label, the media pool it belongs to, its physical location (e.g., a slot in a tape library), its status (e.g., full, appendable, recyclable), and a list of all savesets stored on it.

Administrators interact with the MDB primarily through the NMC. They use it to label new media, recycle old media whose data has expired, and to track the location of volumes. For example, if a specific tape is needed for a recovery, the MDB will tell the administrator exactly which library and slot it is in, or if it has been moved to offsite storage. Regular maintenance of the MDB is essential to ensure that NetWorker can find an appropriate volume for new backups and locate the correct volumes for restores.

Given its importance, protecting the MDB is a top priority. The MDB is backed up as part of the server's bootstrap backup. In the event of a server crash, a valid bootstrap is the only way to restore the MDB and bring the backup environment back online without having to manually scan every single backup tape, a process that could take days or weeks in a large environment. Therefore, ensuring the successful completion and secure storage of the bootstrap backup is one of the most critical daily tasks for a NetWorker administrator.

A Deep Dive into the E20-585 Exam Concepts

Following our exploration of installation and configuration in the previous installment, we now pivot to the core purpose of any data protection solution: the backup and recovery of data. This third part of our series on the E20-585 Exam concepts will focus entirely on these operational aspects. While proper setup is crucial, it is the reliability and efficiency of daily backup and restore jobs that ultimately determine the value of the system. This is where the skills of a storage administrator are truly tested, and consequently, these topics formed a significant portion of the specialist-level exam.

We will begin by taking a closer look at the different methods for initiating backup operations, moving beyond simple scheduling to include manual and on-demand jobs. A major focus will be placed on the recovery process, which is the ultimate goal of data protection. We will cover various recovery scenarios, from restoring a single lost file to recovering an entire client system. Additionally, we will discuss advanced features like cloning, which is used for creating secondary copies of backup data for disaster recovery and long-term retention. A solid grasp of these operations is what separates a novice from an expert NetWorker administrator.

Initiating and Monitoring Backup Operations

The primary method for initiating backups in a NetWorker environment is through the automated scheduler, as discussed previously. Groups are scheduled to run at specific times, and the NetWorker server automatically executes them without any manual intervention. This "lights-out" operation is the goal for most daily data protection tasks. However, a competent administrator, and any E20-585 Exam candidate, must also know how to manage backups outside of this automated framework. There are frequent occasions where a backup needs to be run immediately, outside of its normal schedule.

The NetWorker Management Console (NMC) provides an intuitive way to perform these manual backups. An administrator can simply right-click on a specific client or a backup group and select "Start." This is useful for various scenarios, such as before performing a major system upgrade on a server, or if a scheduled backup failed and needs to be rerun immediately. This on-demand capability provides the flexibility needed to respond to the dynamic needs of a production IT environment. The NMC's monitoring view allows the administrator to watch the progress of these manually started jobs in real-time.

Monitoring is a critical daily activity for a backup administrator. The NMC's monitoring window displays all active jobs, showing their status, the amount of data transferred, the speed of the transfer, and any messages or errors generated. This real-time feedback is invaluable for troubleshooting performance issues or identifying failing backups as they happen. In addition to active monitoring, administrators rely on notifications and reports. NetWorker can be configured to send email alerts upon the completion or failure of a group, ensuring that any issues are promptly brought to the administrator's attention for resolution.

The Fundamentals of Data Recovery

The entire purpose of performing backups is to enable recovery. A backup solution that cannot reliably restore data is worthless. Consequently, the principles and practices of data recovery were a cornerstone of the E20-585 Exam. NetWorker provides a powerful and flexible set of tools for recovering data, whether it's a single file accidentally deleted by a user or an entire server volume lost due to a hardware failure. The process is initiated by an authorized administrator or user and is managed and tracked by the NetWorker server.

The recovery process begins with identifying the data that needs to be restored and the point in time from which it should be recovered. Using the recovery tools in the NMC or the command-line interface, the administrator browses the client file index (CFI) for the specific client. The CFI presents a view of the client's filesystem as it existed at the time of each backup. The administrator can navigate through directories and select specific files or folders to be restored. NetWorker automatically determines which savesets and which media volumes are needed to fulfill the recovery request.

Once the files are selected and the recovery is initiated, the NetWorker server coordinates the operation. It instructs the appropriate storage node to load the required media. The storage node reads the data from the media and sends it directly to the client. The 'recover' process running on the client receives this data and writes it back to the specified location on the client's disk. Throughout this process, the server monitors the status and logs all activity, providing a complete audit trail of the recovery job. Understanding this workflow is essential for any backup professional.

Performing Different Types of Restores

NetWorker supports several types of recovery scenarios, and a candidate for the E20-585 Exam would need to be familiar with them. The most common scenario is a simple file-level restore. This is used when a user accidentally deletes a file or a folder. The administrator can quickly locate the latest version of the file in the backup index and restore it to its original location or to an alternate directory. This is the most frequent type of recovery request and can often be completed in just a few minutes, demonstrating the immediate value of the backup system.

A more serious scenario is a full system recovery, often called a disaster recovery (DR). This is necessary when an entire server fails due to a hardware malfunction, data corruption, or a site-wide disaster. In this case, the administrator needs to restore the entire operating system, all applications, and all data to get the server back online. NetWorker provides specialized procedures for this, often involving booting the new hardware with a minimal OS and then initiating a "directed recover" to push the backed-up system files to the new machine.

A "directed recover" is a powerful feature that allows an administrator to restore data from one client to a completely different client. This is essential for disaster recovery scenarios where the original hardware is no longer available. It is also extremely useful for other purposes, such as creating a test or development environment that is a clone of a production server. The administrator simply specifies a different destination client during the recovery setup, and NetWorker redirects the data flow accordingly. Mastering this technique is a key skill for advanced administration.

The Concept of Cloning and Staging

Cloning is the process of making a copy of an existing backup saveset. This is not a new backup of the live client data; it is a media-to-media copy of a backup that has already been created. Cloning serves several critical purposes in an enterprise data protection strategy, and understanding its use cases was important for the E20-585 Exam. The primary use case is for disaster recovery. An organization might perform its initial backups to a fast disk-based device at its primary data center. Then, a cloning process automatically copies these backups to tape media, which is then transported to a secure, offsite location.

This cloning strategy ensures that a copy of the backup data exists in a separate physical location. If the primary data center is destroyed in a fire or flood, the offsite tapes can be used to recover the systems at a secondary site. The cloning process is managed by the NetWorker server. An administrator defines a clone pool and a policy that dictates which savesets should be cloned. NetWorker then reads the data from the source backup volume and writes it to a volume in the clone pool, all while updating the media database to track the location of this new, secondary copy.

Staging is a related concept where savesets are migrated from one type of media to another based on a policy. This is often used in tiered storage strategies. For example, backups might first be written to a very fast but expensive disk device for rapid recovery of recent data. After a set period, such as 30 days, these savesets can be automatically "staged" or migrated to a more cost-effective, high-capacity storage tier, like cloud or tape storage, for long-term retention. This allows organizations to balance recovery speed with storage costs effectively.

Managing the Client File Index (CFI)

The Client File Index (CFI) is the database that stores all the file-level metadata for a client's backups. As we've discussed, it is what enables the browsing of a client's backed-up data to select individual files for recovery. The E20-585 Exam would expect a candidate to understand the importance of the CFI and how to manage it. Each client has its own CFI, which is stored on the NetWorker server. As backups run every day, these indexes can grow to be very large, consuming significant disk space on the server.

Because of their potential size, CFIs are managed according to a "browse policy." The browse policy for a client determines how long the file-level details are kept in the index. This is a separate and distinct setting from the "retention policy," which governs how long the actual backup data is kept on the media. For example, a client's backup data might be retained for one year, but its browse policy might be set to only 30 days. This means you could browse for individual files from the last 30 days, but for older backups, you would have to perform a different type of recovery.

If a file needs to be recovered from a backup whose index has passed its browse policy, it is still possible. The administrator would need to perform a "saveset recovery." This involves querying the media database to find the specific saveset from the required date and then restoring the entire saveset. Alternatively, NetWorker has a function to rebuild a client's index from the backup media. This process reads the backup tape or disk and repopulates the CFI, after which the administrator can browse it normally. This is a time-consuming process, so it is reserved for specific recovery needs.


Go to testing centre with ease on our mind when you use EMC E20-585 vce exam dumps, practice test questions and answers. EMC E20-585 Data Domain Specialist Exam for Storage Administrators certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using EMC E20-585 exam dumps & practice test questions and answers vce from ExamCollection.

Read More


Purchase Individually

E20-585 Premium File

Premium File
E20-585 Premium File
66 Q&A
$76.99$69.99

Site Search:

 

VISA, MasterCard, AmericanExpress, UnionPay

SPECIAL OFFER: GET 10% OFF

ExamCollection Premium

ExamCollection Premium Files

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads
Enter Your Email Address to Receive Your 10% Off Discount Code
A Confirmation Link will be sent to this email address to verify your login
We value your privacy. We will not rent or sell your email address

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Next

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.