What is true of hot-swappable hardware?
- A . All components need to be rearranged after swap
- B . Reboot is required after a change
- C . All fans need to be running to ensure proper cooling
- D . Replaceable with zero downtime
In which technique does an application maintain limited functionality, even when some of the modules or supporting services of that application become unavailable?
- A . Retry logic
- B . Persistent state model
- C . Graceful degradation
- D . Checkpointing
What is a disadvantage of source-based deduplication?
- A . Requires more network bandwidth to send data across LAN or WAN during the backup
- B . CPU cycles may impact application performance
- C . High network load since the client checks all segments on the deduplication server device
- D . Increases CPU utilization in the backup appliance
A customer has created a change management window to perform scheduled system maintenance. During the scheduled downtime window, information will be transferred to another system to ensure continuous availability.
What is this process an example of?
- A . Data governance
- B . Data migration
- C . Automated failback
- D . Disaster recovery
Which architectural component scans and archives files?
- A . Archive storage
- B . Archive server
- C . Primary storage
- D . Archiving agent
What are the three pillars of data security and management?
- A . Security, Confidentiality, and Integrity
- B . High availability, Integrity, and Compliance
- C . Integrity, Governance, and Compliance
- D . Confidentiality, Integrity, and Availability
What are the key functions of data management?
- A . detection and orchestration management
- B . discovery and operations management
- C . configuration and detection management
- D . rollout and configuration management
What is a characteristic of storage resource pools?
- A . Resource pools should always be created by different types of storage devices
- B . Resources are reserved by the application after being released by the consumer
- C . Resources are dynamically released to the pool when the consumer exceeds their quota
- D . Resources are dynamically allocated based on consumer demand
What is the process of identifying and moving inactive data from primary storage systems to lower-cost storage systems for long-term retention?
- A . Data archiving
- B . Replication
- C . Business continuity
- D . Data locality
What are three types of backups?
- A . Image, Object, and Block
- B . Block, File, and Object
- C . NDMP, Image, and Object
- D . File, Block, and Image
Which data migration involves migrating data at the file level using intermediary compute systems?
- A . Host-based migration
- B . NAS-based migration
- C . SAN-based migration
- D . Application migration
What is a characteristic of data archiving?
- A . Secondary copy of data
- B . Primary copy of data
- C . Short-term retention
- D . Used for operational recovery
What is the primary disadvantage of incremental backups?
- A . time-consuming to restore
- B . contain only the blocks that have changed since the previous backup
- C . increased amount of data going across the network
- D . can grow to contain a large amount of data
Which process verifies a user’s identity credentials?
- A . Authentication
- B . Accountability
- C . Authorization
- D . Auditing
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which product helps anticipate business needs by intelligently projecting capacity utilization so an organization can plan capacity requirements and budget accordingly?
- A . Dell PowerScale Archive
- B . Dell NetWorker
- C . Dell CloudIQ
- D . VMware vSphere
Which big data protection optimization method eliminates redundant data to significantly shrink storage requirements?
- A . Deduplication
- B . Encryption
- C . Compression
- D . Migration
What benefit does a virtual appliance provide while facilitating the movement of files from an old NAS system to a new NAS system?
- A . Facilitates client write operations to the old NAS system and read operations from the new NAS system
- B . Balances client workload across old and new NAS systems until all files are moved to the new location
- C . Ensures data consistency by taking both old and new NAS systems offline during data migration
- D . Eliminates dependencies between data accessed at the file level and locations where files are physically stored
What are the three phases of data protection in a software-defined data center framework?
- A . define protection requirements, create protection policies, and enable protection policies
- B . create protection policies, push protection policies, and monitor job completion
- C . discover protection architecture, define protection services, and orchestrate protection operations
- D . create protection policies, assign protection policies, and monitor job completion
The operating time of a system is 24 hours per day, Monday through Saturday.
Failure of the system occurs as follows.
Monday: No failure
Tuesday: 5 A. M. to 7 A. M. Wednesday: No failure
Thursday: 4 P.M. to 8 P.M.
Friday: 8 A. M. to 11 A. M. Saturday: No failure
What is the MTBF of the system?
- A . 3 hours
- B . 8 hours
- C . 45 hours
- D . 56 hours
Which type of file system can be mounted on multiple compute systems running a hypervisor to access the same file system simultaneously?
- A . Memory state file system
- B . Clustered file system
- C . Configuration file system
- D . Virtual disk file system
What is a key function of the cloud service component?
- A . Allows consumers to create service offerings for a service catalog
- B . Enables service providers to request the purchase of new IT resources
- C . Presents cloud infrastructure for use of services by consumers
- D . Allows consumers to modify the existing service offerings in a service catalog
What is a benefit of synchronous remote replication?
- A . provides near zero recovery point objective
- B . requires less storage space for target than source volume
- C . allows restoring source volume to any previous point in time
- D . allows more storage space for target than source volume
Which key metric should be used when updating the corporate disaster recovery plan to minimize downtime?
- A . RTO
- B . MTBSI
- C . RPO
- D . MTBF
What is a key function of a backup and recovery application?
- A . Performing data migration that moves data between storage systems
- B . Creating a stub file on the primary storage
- C . Integrating with deduplication software to eliminate redundancy
- D . Performing compression and decryption when transferring data
Which model does MapReduce utilize?
- A . Batch processing
- B . Backup
- C . Geographic mapping
- D . Redundancy
What makes services visible and accessible to the users?
- A . Service Catalog
- B . Operational Database
- C . Cloud native application
- D . Unified storage system
Which does Continuous Data Protection support?
- A . remote and cloud replication
- B . local and remote replication
- C . cloud replication only
- D . local replication only
A backup of 12 GB of data is reduced by a deduplication algorithm to 2 GB of data.
What is the deduplication ratio?
- A . 1:6
- B . 1:12
- C . 12:1
- D . 6:1
A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM.
How many backup copies are required to restore the requested files?
- A . 2
- B . 3
- C . 6
- D . 7
Which will affect the deduplication ratio?
- A . File type
- B . File size
- C . File directory
- D . File date
A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives.
What is the maximum number of drive failures that can be withstood without losing the data in this configuration?
- A . 6
- B . 4
- C . 3
- D . 5
What is a function of the discovery operation during the service operation phase of the cloud service lifecycle?
- A . Collects information about people involved in the service operations
- B . Collects information about services available in the catalog
- C . Provides visibility into each Cloud service asset employed
- D . Restores service levels while continuously optimizing operations
A cloud service provider uses a resource pooling approach to improve the utilization of resources by sharing them with multiple customers.
What mechanism should the cloud provider deploy to prevent one consumer from accessing the virtual machines of another consumer?
- A . Hypervisor-based resource pooling
- B . Secure multitenancy through isolation
- C . Pooling of resources through multitenancy
- D . Virtual machine-based resource pooling
What is a function of an API?
- A . Provides storage migration capabilities
- B . Schedules backup and recovery for an application
- C . Can be accessed only by CLI
- D . Enables communication with an application
What does an attack vector refer to in the context of data security?
- A . An entry point an attacker can use to launch an attack
- B . A step or series of steps necessary to complete an attack
- C . A weakness in a system that can be exploited to launch an attack
- D . The amount of time and effort required to complete an attack
A full backup of a production volume is created on Sunday, and incremental backups are created for the rest of the week.
What are the contents of the backup on Thursday?
- A . all the data on the production volume
- B . all the data that has changed since Wednesday
- C . all the data that has changed since Sunday
- D . all the data that has changed since Monday
Which security control provides logical isolation of devices on Ethernet?
- A . VPN
- B . Firewall
- C . VSAN
- D . VLAN
Which is a driver of cloud-based data protection?
- A . Improved resiliency
- B . Reduced OPEX
- C . Improved fault tolerance
- D . Reduced CAPEX
Which product allows data owners to back up and restore using native applications?
- A . Dell EMC PowerProtect Data Manager
- B . VMware vRealize Cloud Management
- C . VMware vRealize Operations
- D . Dell EMC Data Protection Advisor
What are the key benefits of Cloud-Based Data Protection?
- A . High performance, one-time charge, and rapid scaling
- B . One-time subscription and no business agility
- C . Increased IT cost and increased resource management
- D . High availability, pay for use, and flexible scaling
A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Friday and incremental backups for the rest of the week at same time. A data loss happened on Wednesday at 11 AM.
How many backup copies are required to restore the requested files?
- A . 2
- B . 4
- C . 5
- D . 6
Which backup service type is suitable when a cloud service provider already hosts consumer applications and data?
- A . Local backup service
- B . Replicated backup service
- C . Remote backup service
- D . Cloud-to-cloud backup
Which Dell EMC product offers multiple layers of protection to provide resilience against malicious attacks and isolates critical data?
- A . PowerProtect Cyber Recovery Solution
- B . PowerProtect DP Series Appliance
- C . RecoverPoint
- D . Encryption Enterprise
Which countermeasure is used to protect data against unauthorized access, deletion, modification, or disruption?
- A . Data locality
- B . Data sovereignty
- C . Data security
- D . Data governance
Which are the variants of community cloud?
- A . Hybrid cloud and externally hosted
- B . On-premises and private cloud
- C . Externally hosted and on-premises
- D . Hybrid and public cloud
Which key feature of content addressed storage stores data irrelevant to the application that requests the data?
- A . Location independence
- B . Content authenticity
- C . Content integrity
- D . Audit trails
Which product enables the protection, management, and recovery of data in on-premises, virtualized and cloud deployments, including protection of in-cloud workloads?
- A . Dell CloudIQ
- B . Dell TimeFinder
- C . Dell SRDF
- D . Dell PowerProtect Data Manager
What are the key approaches to application transformation?
- A . Restore, Reuse, Retain, Retire
- B . Refactor, Revise, Retain, Retire
- C . Retain, Refactor, Reuse, Revise
- D . Revise, Restore, Retain, Re-iterate
Which is a benefit of cloud computing?
- A . separate servers for each customer
- B . provides business agility
- C . increases up-front CAPEX
- D . owned IT resources