Exam 70-658:
TS: System Center Data Protection Manager 2007, Configuring
Published: July 17, 2009
Language(s): English, French, German, Japanese
Audience(s): IT Professionals
Technology: Microsoft System Center Data Protection Manager 2007
Type: Proctored Exam
About this Exam
This is a Technical Specialist exam designed t o assess candidates’ hands-on skills configuring System Center Data Protection Manager 2007.
Audience Profile
Candidates for this exam should have the following:
* Operating experience with System Center Data Protection Manager 2007
* At least one year of experience with data and system recoverability and data protection
* At least one year of experience with Windows Server administration and network infrastructure
* Production experience with at least one protected workload, plus working knowledge of the other protected workloads
Credit Toward Certification
When you pass Exam 70-658: TS: System Center Data Protection Manager 2007, Configuring, you complete the requirements for the following certification(s):Microsoft Certified Technology Specialist: System Center Data Protection Manager, Configuration or mcitp training
Note This preparation guide is subject t o change at any time without prior notice and at the sole discretion of Microsoft. Microsoft exams might include adaptive testing technology and simulation items. Microsoft does not identify the format in which exams are presented. Please use this preparation guide t o prepare for the exam, regardless of its format.
Skills Being Measured
This exam measures your ability t o accomplish the technical tasks listed below.The percentages indicate the relative weight of each major topic area on the exam. mcitp certification
Installing Data Protection Manager (DPM) (16%)
* Install the DPM server
o This objective may include but is not limited to: verify software and hardware prerequisites; choose and configure SQL Server location; run DPM installation wizard
* Enable End User Recovery (EUR)
o This objective may include but is not limited to: configuring Active Directory, DPM server, and Shadow Copy Client
* Configure networking for DPM
o This objective may include but is not limited to: agent t o server communication; bandwidth requirements; enabling a dedicated backup protection network
Managing Media and Agents (21%)
* Deploy a DPM agent
o This objective may include but is not limited to: domain/forest membership; pushing an agent from the console; deploying an agent by using software distribution or manually; connecting an agent t o a DPM server by using the DPM Management Shell
* Control DPM bandwidth
o This objective may include but is not limited to: agent bandwidth throttling; server bandwidth throttling; on-the-wire compression
* Manage disks
o This objective may include but is not limited to: disk; cloud; moving a replica t o another disk
* Manage tapes
o This objective may include but is not limited to: tape, tape devices, copy t o tape, inventory, encryption
Protecting Workloads (23%)
* Define protection for standalone configurations
o This objective may include but is not limited to: setting up protection groups for core workloads, criteria for separate protection groups, ramifications for restore, selecting data sources
* Define protection for highly available configurations
o This objective may include but is not limited to: application availability options, failover clustering, DFS interactions
* Configure protection policies
o This objective may include but is not limited to: implementing a protection policy through a protection group, short-term vs. long-term protection schedules, retention time
* Manage recovery points
o This objective may include but is not limited to: creating a recovery point; different types of recovery points; defining recovery point schedules; optimizing schedules for recovery time; time offset
* Stage a replica
o This objective may include but is not limited to: prestaging; running an initial consistency check; postponing initial replication
Recovering Workloads (23%)
* Recover files
o This objective may include but is not limited to: workstations, file servers, overwrite, permissions, recovering t o a network folder
* Recover Exchange Server data
o This objective may include but is not limited to: Recovery Storage Group (RSG), Exchange Server 2003 vs. Exchange Server 2007, recovering t o an alternative Exchange server, scope of recovery
* Recover SharePoint data
o This objective may include but is not limited to: recovery farms, data granularity, protection schedules
* Recover SQL Server data
o This objective may include but is not limited to: SQL Server 2005 vs. SQL Server 2008, recovery t o an alternate server, advanced recovery options, protection schedules and SQL Server recovery mode
* Recover system state data
o This objective may include but is not limited to: choosing when t o enable system state recovery; applying recovered system state
* Recover virtualized environments
o This objective may include but is not limited to: virtual guests, host configuration, recovering t o another host
Managing, Protecting, and Recovering the DPM Server (18%)
* Monitor DPM
o This objective may include but is not limited to: setting up alerts, scheduling and running reports, System Center Operations Manager (SCOM), Microsoft Operations Manager (MOM), PerfMon, Event Viewer, DPM Administrator Console
* Perform maintenance
o This objective may include but is not limited to: ensuring replica integrity, ad hoc and scheduled consistency checks, data integrity checks
* Integrate with other backup solutions
o This objective may include but is not limited to: identifying the production data within the DPM server; protecting the DPM configuration database
* Configure DPM for disaster recovery
o This objective may include but is not limited to: activating the agent on the primary DPM server; configuring workloads t o be protected; switch primary/secondary roles; enable secondary protection with DPM; protecting the DPM configuration database
* Recover a DPM server
o This objective may include but is not limited to: restoring the DPM configuration database, creating static copies of replicas, repairing DPM
Preparation Tools and ResourcesT o help you prepare for this exam, Microsoft Learning recommends that you have hands-on experience with the product and that you use the following training resources. These training resources d o not necessarily cover all of the topics listed in the “Skills Measured” tab.
Classroom Training There is n o classroom training currently available.
Microsoft E-Learning There is n o Microsoft E-Learning training currently available.
Microsoft Press Books There are n o Microsoft Press books currently available.
Practice Tests There are n o practice tests currently available.
Microsoft Online Resources
* Learning Plan: Get started with a step-by-step study guide that is based on recommended resources for this exam.
* Product information: Visit the System Center Data Protection Manager Web site for detailed product information.
* TechNet: Designed for IT professionals, this site includes how-t o instructions, best practices, downloads, technical resources, newsgroups, and chats.
* MSDN: Designed for developers, the Microsoft Developer Network (MSDN) features code samples, technical articles, downloads, newsgroups, and chats.
* Microsoft Learning Community: Join newsgroups and visit community forums t o connect with your peers for suggestions on training resources and advice on your certification path and studies.