Dell E20-385 Exam Practice Questions (P. 2)
- Full Access (113 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A customer is deploying EMC Data Domain systems in four data centers worldwide. The Data Domain systems will be using VTL. Each system will have a unique tape pool.
The customer wants to replicate data to all sites. The data needs to be encrypted locally and then replicated to remote sites over the WAN.
What needs to be deployed to meet the customer's requirements?
The customer wants to replicate data to all sites. The data needs to be encrypted locally and then replicated to remote sites over the WAN.
What needs to be deployed to meet the customer's requirements?
- AEncryption of Data at Rest and pool replication with encryption enabled
- BEncryption of Data at Rest and collection replication with encryption enabled
- CPool replication with encryption enabled
- DCollection replication with encryption enabled
Correct Answer:
A
A
send
light_mode
delete
Question #7
When a customer deploys an EMC Data Domain system at a remote location that does not have an IT staff, what type of remote management method(s) is possible?
- AManaged with IPMI and SOL commands
- BManaged with IPMI commands only
- CManaged with SOL commands only
- DManaged with iDRAC and SOL commands
Correct Answer:
A
A
send
light_mode
delete
Question #8
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.
They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?
They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?
- AEnable Encryption of Data at Rest at the disaster recovery site
- BUse encryption of data in flight to the hosted disaster recovery site
- CEnable Encryption of Data at Rest at the source site
- DWAN link between the sites is already encrypted
Correct Answer:
A
A
send
light_mode
delete
Question #9
What is a characteristic of EMC Data Domain collection replication?
- AReplication destination is dedicated to receiving data only from the source
- BUnique user accounts and passwords need to be configured on the replication destination
- CReplication destination directory can also be used as a target for backups
- DReplication destination must be at least twice the size of the source
Correct Answer:
A
A
send
light_mode
delete
Question #10
An EMC Data Domain customer wants VTL replication functionality. Which licensing option is required?
- AA single VTL license applied to the source Data Domain. A Replicator license applied to both the source and destination Data Domains.
- BA VTL license applied to both the source and destination Data Domains.
- CA single VTL license applied to the destination Data Domain. A Replicator license applied to both the source and destination Data Domains.
- DA Replicator license applied only to the source Data Domain.
Correct Answer:
A
A
send
light_mode
delete
All Pages