This page was exported from New Braindump2go Exam Dumps
[
https://www.eccouncildumps.com
]
Export date: Thu Mar 28 14:21:54 2024 / +0000 GMT
QUESTION 1 A. Segmenting, fingerprinting, and compression occur on the backup host. Answer: A QUESTION 2 A. Variable segment size deduplication due to its ability to add data to a variable segment and move the data stream. Answer: DA QUESTION 3 A. File system recoverability Answer: A QUESTION 4 A. Serial over LAN Answer: C QUESTION 5 A. Difference in global compression Answer: A QUESTION 6 A. Use encryption of data in flight to the hosted disaster recovery site Answer: B QUESTION 7 A. Encrypt the replication context Answer: A QUESTION 8 A. Connection problem Answer: D QUESTION 9 A. A Answer: A QUESTION 10 A. Keep the ambient temperature at an acceptable level Answer: B
A customer is interested in deploying DD Boost for their current EMC Data Domain system. They are aware of Distributed Segment Processing (DSP) and want to know the data flow when they enable DSP. What describes the data flow from the backup host to the Data Domain system?
Fingerprint filtering and writes occur on the Data Domain.
B. Segmenting, fingerprinting, and fingerprint filtering occur on the backup host.
Compression and writes occur on the Data Domain.
C. Fingerprinting, compression, and fingerprint filtering occur on the backup host.
Segmenting and writes occur on the Data Domain.
D. Segmenting, fingerprinting, fingerprint filtering, and compression occur on the backup host.
Writes occur on the Data Domain.
Which method of deduplication yields better deduplication results for multiple data types?
B. Fixed segment size deduplication due to its ability to add data to a fixed segment without having to move the data stream.
C. Fixed segment size deduplication due to its ability to add data to a fixed segment and move the data stream.
D. Variable segment size deduplication due to its ability to add data to a variable segment without having to move the data stream.
What is a component of the EMC Data Domain Data Invulnerability Architecture that protects against data loss?
B. Summary vector identification
C. System sanitization
D. Segment locality processing
You are implementing an EMC Data Domain system at a location that is not staffed. However, the customer has network connectivity to the site from the main data center. In the event of a system crash, what can be configured to allow the customer the ability to cycle power?
B. SNMP
C. IPMI
D. Replication
You have implemented an EMC Data Domain system with directory replication. After replication has occurred, the customer notices that the space utilization on the source and destination systems is different. How can this be explained?
B. Difference in the encryption algorithm
C. CIFS/NFS is mixed on the same directory
D. Destination directory may be corrupted
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?
B. Enable encryption of data at rest at the disaster recovery site
C. Enable encryption of data at rest at the source site
D. WAN link between the sites is already encrypted
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.
They are now planning to deploy a second Data Domain system to a secure data center at their corporate headquarters as a replication target to replace the use of the offsite tapes. The two sites are connected through the Internet.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as achieved by their current process?
B. Encrypt the data at rest
C. Encrypt the data at rest and the replication context
D. Encryption is not required
What is indicated by a flashing green SAS state LED on an EMC Data Domain ES20 SAS controller?
B. Connection established
C. RAID reconstruction in progress
D. Connection in process
As illustrated in the exhibit, which cable connects the EMC Data Domain controller to an ES20 expansion shelf?
B. B
C. C
D. D
When connecting EMC Data Domain expansion shelves, what should be done to avoid cable stress at the solder joints of the connector?
B. Use screw lock assemblies
C. Leave enough cable to allow for free air flow
D. Secure the cable to the rack door
Passing your EMC E20-385 Exam by using the latest E20-385 Exam Dump Full Version: http://www.braindump2go.com/e20-385.html
Post date: 2014-08-12 02:16:33
Post date GMT: 2014-08-12 02:16:33
Post modified date: 2014-08-12 02:16:33
Post modified date GMT: 2014-08-12 02:16:33
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com