Dell E20-585 Exam Practice Questions (P. 4)
- Full Access (66 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
A backup administrator has configured multiple data movement policies on their Dell EMC Data Domain system that is configured with Extended Retention. They want to remove expired data from the retention tier.
Which feature is used to complete the task?
Which feature is used to complete the task?
- AGarbage collection
- BManual deletion from archive tier
- CData movement policy
- DSpace reclamation
Correct Answer:
D
Incorrect Answers:
C: DATA MOVEMENT POLICIES. The system administrator can configure the policy that guides data movement from the active tier to the retention tier on a. Data
Domain system.
References:
https://www.emc.com/collateral/hardware/white-papers/h8140-data-domain-extendedretention-wp.pdf
D
Incorrect Answers:
C: DATA MOVEMENT POLICIES. The system administrator can configure the policy that guides data movement from the active tier to the retention tier on a. Data
Domain system.
References:
https://www.emc.com/collateral/hardware/white-papers/h8140-data-domain-extendedretention-wp.pdf
send
light_mode
delete
Question #17
Which technique is used to identify the duplicate segments in the SISL process used by Dell EMC Data Domain?
- ACompression
- BSegmenting
- CHashing
- DSummary vector
Correct Answer:
D
The summary vector and segment locality techniques identify 99% of the duplicate segments in RAM (Inline) before storing to disk.
References:
https://www.emc.com/collateral/hardware/white-papers/h7221-data-domain-sisl-sclg-arch-wp.pdf
D
The summary vector and segment locality techniques identify 99% of the duplicate segments in RAM (Inline) before storing to disk.
References:
https://www.emc.com/collateral/hardware/white-papers/h7221-data-domain-sisl-sclg-arch-wp.pdf
send
light_mode
delete
Question #18
In a Dell EMC Data Domain CIFS backup environment, the following error message is used: "Write failure in writing to client xxx, Error connection reset by peer".
Which action could resolve the issue?
Which action could resolve the issue?
- AUpgrade Microsoft Windows to the latest version.
- BOn the Data Domain system, configure the CIFS authentication mode for Workgroup authentication.
- COn the Data Domain system, configure the CIFS authentication mode for Active Directory.
- DIncrease the Microsoft Windows registry value SESSTIMEOUT from the default to 3600 seconds
Correct Answer:
D
Windows 2008 Session Timeout Parameters
SYMPTOMS -
CIFS request timeout messages in log/debug/cifs/clients.log:
write_data: write failure in writing to client 1.2.3.4. Error Connection reset by peer
Error writing 61503 bytes to client for cmd 0x2e mid 0x4c58. -1. (Connection reset by peer)
Failed to send SMB: cmd 46 mid 19544
APPLIES TO: All Data Domain systems, All Software Releases
SOLUTION -
Increase the CIFS request timeout on the client (Windows 2008 server) by changing the registry parameters under the key HKEY_LOCAL_MACHINE\System
\CurrentControlSet\Services\LanmanWorkStation\Parameters.
References:
https://community.emc.com/docs/DOC-30144
D
Windows 2008 Session Timeout Parameters
SYMPTOMS -
CIFS request timeout messages in log/debug/cifs/clients.log:
write_data: write failure in writing to client 1.2.3.4. Error Connection reset by peer
Error writing 61503 bytes to client for cmd 0x2e mid 0x4c58. -1. (Connection reset by peer)
Failed to send SMB: cmd 46 mid 19544
APPLIES TO: All Data Domain systems, All Software Releases
SOLUTION -
Increase the CIFS request timeout on the client (Windows 2008 server) by changing the registry parameters under the key HKEY_LOCAL_MACHINE\System
\CurrentControlSet\Services\LanmanWorkStation\Parameters.
References:
https://community.emc.com/docs/DOC-30144
send
light_mode
delete
Question #19
A Dell EMC Data Domain administrator wants to delegate some Data Domain operations to the Monitoring and Control Team. The administrator wants the team to check the health of the Data Domain system every morning before 10 am. The administrator wants to add a user specifically for the Monitoring and Control team.
The user would be restricted to checking the health of the Data Domain system.
Which role needs to be applied to the new user?
The user would be restricted to checking the health of the Data Domain system.
Which role needs to be applied to the new user?
- ALimited Admin
- BNone
- CBackup Operator
- DUser
Correct Answer:
D
The user role can monitor the system, change their own password, and view system status. The user role cannot change the system configuration.
Incorrect Answers:
A. The limited-admin role can configure and monitor the Data Domain system with some limitations. Users who are assigned this role cannot perform data deletion operations, edit the registry or enter bash or SE mode.
B: The role of None is used for DD Boost authentication and tenant-users. A None role can log in to a Data Domain system and can change their password, but cannot monitor or configure the primary system.
C: The Backup-operator role can perform all tasks permitted for user role users, create snapshots for MTrees, import, export, and move tapes between elements in a virtual tape library, and copy tapes across pools.
References:
https://community.emc.com/thread/238751?start=0&tstart=0
D
The user role can monitor the system, change their own password, and view system status. The user role cannot change the system configuration.
Incorrect Answers:
A. The limited-admin role can configure and monitor the Data Domain system with some limitations. Users who are assigned this role cannot perform data deletion operations, edit the registry or enter bash or SE mode.
B: The role of None is used for DD Boost authentication and tenant-users. A None role can log in to a Data Domain system and can change their password, but cannot monitor or configure the primary system.
C: The Backup-operator role can perform all tasks permitted for user role users, create snapshots for MTrees, import, export, and move tapes between elements in a virtual tape library, and copy tapes across pools.
References:
https://community.emc.com/thread/238751?start=0&tstart=0
send
light_mode
delete
Question #20
Which applications are supported using DD Boost technology?
- AMicrosoft SharePoint, Quest vRanger Pro, and SAP HANA
- BSAP HANA, Quest vRanger Pro, and Microsoft SQL
- CMicrosoft SQL, Quest vRanger Pro, and Microsoft SharePoint
- DQuest vRanger Pro, SAP HANA, and Microsoft SharePoint
Correct Answer:
B
EMC Data Domain Boost for Enterprise Applications integrates seamlessly with Oracle RMAN, Microsoft SQL Server, SAP, SAP HANA, and IBM DB2.
You can also usng vRanger with EMC Data Domain Boost
References:
https://virtualizationandstorage.wordpress.com/2015/06/17/vmware-data-protection-with-data-domain-and-dd-boost/
B
EMC Data Domain Boost for Enterprise Applications integrates seamlessly with Oracle RMAN, Microsoft SQL Server, SAP, SAP HANA, and IBM DB2.
You can also usng vRanger with EMC Data Domain Boost
References:
https://virtualizationandstorage.wordpress.com/2015/06/17/vmware-data-protection-with-data-domain-and-dd-boost/
send
light_mode
delete
All Pages