Data Protection and Management Version 2 v1.0 (DEA-3TT2)

Page:    1 / 4   
Total 60 questions

At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?

  • A. Protection Application
  • B. Management Domain
  • C. Data Source
  • D. Database Application


Answer : C

What is the process of identifying and moving inactive data from primary storage systems to lower-cost storage systems for long-term retention?

  • A. Data archiving
  • B. Replication
  • C. Business continuity
  • D. Data locality


Answer : A

What is a hot backup?

  • A. application is up-and-running with users accessing their data during the backup process
  • B. backup is indexed from last full backup
  • C. a full backup is synthesized
  • D. requires the application to be shut down during the backup process


Answer : A

A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives. What is the maximum number of drive failures that can be withstood without losing the data in this configuration?

  • A. 6
  • B. 4
  • C. 3
  • D. 5


Answer : B

Which model does MapReduce utilize?

  • A. Batch processing
  • B. Backup
  • C. Geographic mapping
  • D. Redundancy


Answer : A

Where is the index stored after an archiving operation?

  • A. Archive storage
  • B. Archive server
  • C. Backup server
  • D. Media server


Answer : A

Which product allows data owners to back up and restore using native applications?

  • A. Dell EMC PowerProtect Data Manager
  • B. VMware vRealize Cloud Management
  • C. VMware vRealize Operations
  • D. Dell EMC Data Protection Advisor


Answer : A

What is orchestration?

  • A. automated arrangement, coordination, and management of various IT functions
  • B. capability of unified controller to process block-level, file-level, and I/O requests concurrently
  • C. moving inactive data out of primary storage systems into lower-cost storage systems
  • D. sharing of the storage resources to increase storage utilization


Answer : A

What is a healthcare use case for Big Data Analytics?

  • A. Analyze historical transactions, pricing, and customer behavior
  • B. Improve marketing and inventory management
  • C. Analyze purchase history and create customer profiles
  • D. Improve patient care and services


Answer : D

DRAG DROP -
Match the types of cyber-attack with their respective description.



Answer :

Which plane of SDDC is used to perform administrative operations such as configuring a system and changing policies?

  • A. Management Plane
  • B. Service Plane
  • C. Control Pane
  • D. Data Plane


Answer : C

The operating time of a system is 24 hours per day, Monday through Saturday. Failure of the system occurs as follows.

Monday: No failure -
Tuesday: 5 A. M. to 7 A. M.

Wednesday: No failure -
Thursday: 4 P.M. to 8 P.M.
Friday: 8 A. M. to 11 A. M.

Saturday: No failure -
What is the MTBF of the system?

  • A. 3 hours
  • B. 8 hours
  • C. 45 hours
  • D. 56 hours


Answer : A

Which are the primary software methods for Data Security Governance?

  • A. masking, de-identification, and NER
  • B. masking, classification, and PCRE
  • C. classification, discovery, and incident management
  • D. classification, discovery, and de-identification


Answer : D

Which component of SDDC generates the billing report based on price per unit and number of units consumed for a service?

  • A. Orchestrator
  • B. Directory Services
  • C. Self Service Portal
  • D. SDDC Controller


Answer : C

An administrator is configuring Dell EMC RecoverPoint. Which Dell EMC storage system can be used without a write splitter installed?

  • A. Unity
  • B. XtremIO
  • C. VMAX
  • D. PowerMax


Answer : A

Page:    1 / 4   
Total 60 questions