Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

EMC DEA-1TT5 Dumps

Page: 1 / 5
Total 142 questions

Associate - Information Storage and Management (Version 5.0) Questions and Answers

Question 1

What is a function of the metadata service in an object-based storage device (OSD)?

Options:

A.

Generates the file system namespace from the file contents.

B.

Manages both physical and logical disks on which the user data is stored.

C.

Manages the storage space for all remote clients.

D.

Maintains the object IDs and file system namespace mappings.

Question 2

How is NVMe used to connect a host to M.2 storage devices?

Options:

A.

through an embedded PCIe controller

B.

through a PCIe bus FC HBA card

C.

through a PCIe bus card

D.

through an embedded FC HBA controller

Question 3

What is a benefit of unified storage systems?

Options:

A.

Provides the capability to separately plan the capacity consumption of object-based data

B.

Eliminates the need to use SATA disk drives to store less valued data

C.

Enables rapid development of modern applications by using a common storage pool

D.

Increases the overall storage capacity utilization with no stranded capacity

Question 4

What does the “variability” characteristic of big data signify?

Options:

A.

Importance in obtaining the right information from data at all possible contexts

B.

Cost-effectiveness and business value obtained from massive volumes of data

C.

Diversity in the formats and types of data generated from various sources

D.

Importance in the quality of data gathered from a number of sources

Question 5

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

Options:

A.

Intrusion-based

B.

Policy-based

C.

Anomaly- Based

D.

Signature-based

Question 6

Which process eliminates data redundancy in a data set?

Options:

A.

Data archiving

B.

Data replication

C.

Data migration

D.

Data deduplication

Question 7

Refer to the exhibit:

Which operation is represented?

Options:

A.

Write-through wrong

B.

Read Hit

C.

Read Miss

D.

Write-back

Question 8

What is a purpose of the policy engine in a data archiving environment?

Options:

A.

Facilitates manual searching for archived data in archive storage

B.

Moves the appropriate data into archive storage automatically

C.

Automates the process of identifying the data to move from archive to primary storage

D.

Enables manual migration of older archived data between archive storage devices

Question 9

In a data center environment, what is an advantage of using parity-based RAID protection over mirroring?

Options:

A.

Eliminates the write penalty for improving the performance

B.

Improves the efficiency of logical disk drives in the RAID set

C.

Increases the performance of small write I/O operation

D.

Reduces the storage capacity required to protect the data

Question 10

Cloud tiering is the part of which tier?

Options:

A.

Policy

B.

Secondary Storage

C.

Primary Storage

D.

Application

Question 11

A customer uses FCIP to connect local and remote FC SANs. The remote SAN is continuously replicated to, and used to store

daily backup data. Latency over the IP WAN increases to unacceptable levels during peak replication periods. No other data

transfer services using the WAN experience the same latency problem.

What is the likely cause of the data replication performance issue?

Options:

A.

IP packet segmentation

B.

FCIP gateway FC ports set to EX_Port mode

C.

Ethernet frame segmentation

D.

FCIP gateway FC ports set to TE_Port mode

Question 12

Which method automatically allocates a large capacity secondary cache using SSD and SCM?

Options:

A.

Cache provisioning

B.

Volatile cache

C.

Cache tiering

D.

Non-volatile cache

Question 13

What is the functionality of the application server in a Mobile Device Management?

Options:

A.

Perform administration and management of all unmanaged devices

B.

Authenticate the device that requests access

C.

Perform administration and management of all managed devices

D.

Authorize devices directed to the server

Question 14

A backup administrator has defined a backup policy The policy requires full backups to be performed at 9 PM every Sunday and incremental backups performed at 9 PM the remaining days If files were accidentally deleted Thursday morning, how many backup copies are required to restore the files?

Options:

A.

3

B.

5

C.

4

D.

2

Question 15

What is a function of a continuous data protection (CDP) appliance?

Options:

A.

Migrates deduplicated data from the source volume to the target volume during replication

B.

Manages both local and remote replications within and across data centers

C.

Stores all data that has changed from the time the replication session started

D.

Intercepts writes to the production volume and splits each write into two copies

Question 16

What is true about scale-out NAS storage architecture?

Options:

A.

Grows file system dynamically as nodes are added to the system

B.

Restricts scalability to the limits of the storage controllers

C.

Provides fixed storage capacity that limits scalability

D.

Scales the capacity within a single NAS storage system

Question 17

What is an advantage of performing incremental backups compared to cumulative backups for the same data?

Options:

A.

Requires more time to perform data backup

B.

Storage capacity needed for backups is significantly reduced

C.

Requires more storage capacity for backup

D.

Reduces restore time but requires a maximum of two copies

Question 18

Match the software-defined storage (SDS) attributes with their respective description.

Options:

Question 19

A user lost access to a key VM due to a hardware failure. A proxy server regularly takes PIT snapshots of the VM to protect the data.

What type of data protection method is this called'?

Options:

A.

Agent-based

B.

Backup as a service

C.

Local replication

D.

Image-based

Question 20

What is the maximum number of VLANs that can be supported with one VLAN tag field?

Options:

A.

4096

B.

8192

C.

1024

D.

2048

Question 21

What is a function of VM hardening?

Options:

A.

Isolate VM storage media to ensure data validity

B.

Isolate VM storage media to prevent data leaks

C.

Change the default configuration of the VM to enhance security

D.

Implement access control list across the VMs to enhance security

Page: 1 / 5
Total 142 questions