What is a characteristic of Avamar encryption?
What is a characteristic of Avamar encryption?
A new EMC Avamar customer is planning to have a multi-node Avamar server replicate to an offsite multi-node Avamar server. Because their data is extremely sensitive, they are concerned about the security of the backup environment.The customer is planning to encrypt all network transmissions. They also want to use encryption-at-rest on the primary Avamar backup server to provide an additional level of data security for their stored backup data.What is an expected outcome of deploying this configuration?
An EMC Avamar customer wants to use LDAP authentication for logging into Avamar Administrator. The customer has Avamar servers located in three separate data centers.They want to restrict administration of specific backup clients to specific users.How should this be set up?
An EMC Avamar backup administrator wants to use their company login account for administering an Avamar server using LDAP authentication. The directory service was added successfully using Avamar Administrator. However, they still cannot successfully log into Avamar Administrator with the account.What action is needed?
A client is performing a file system backup to an Avamar 7.0 server. During the hashing process, it determines that a file hash is not located in any of the cache pages loaded in RAM, but is found in the champion list.What will happen as a result of this?