At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?
Answer : C
What is the process of identifying and moving inactive data from primary storage systems to lower-cost storage systems for long-term retention?
Answer : A
What is a hot backup?
Answer : A
A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives. What is the maximum number of drive failures that can be withstood without losing the data in this configuration?
Answer : B
Which model does MapReduce utilize?
Answer : A
Where is the index stored after an archiving operation?
Answer : A
Which product allows data owners to back up and restore using native applications?
Answer : A
What is orchestration?
Answer : A
What is a healthcare use case for Big Data Analytics?
Answer : D
Which plane of SDDC is used to perform administrative operations such as configuring a system and changing policies?
Answer : C
The operating time of a system is 24 hours per day, Monday through Saturday. Failure of the system occurs as follows.
Monday: No failure -
Tuesday: 5 A. M. to 7 A. M.
Wednesday: No failure -
Thursday: 4 P.M. to 8 P.M.
Friday: 8 A. M. to 11 A. M.
Saturday: No failure -
What is the MTBF of the system?
Answer : A
Which are the primary software methods for Data Security Governance?
Answer : D
Which component of SDDC generates the billing report based on price per unit and number of units consumed for a service?
Answer : C