Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DEA-3TT2 - Associate - Data Protection and Management Version 2 Exam

Page: 2 / 2
Total 60 questions

What is a healthcare use case for Big Data Analytics?

A.

Analyze historical transactions, pricing, and customer behavior

B.

Improve marketing and inventory management

C.

Analyze purchase history and create customer profiles

D.

Improve patient care and services

The operating time of a system is 24 hours per day, Monday through Saturday. Failure of the system occurs as follows.

Monday: No failure

Tuesday: 5 A. M. to 7 A. M.

Wednesday: No failure

Thursday: 4 P.M. to 8 P.M.

Friday: 8 A. M. to 11 A. M.

Saturday: No failure

What is the MTBF of the system?

A.

3 hours

B.

8 hours

C.

45 hours

D.

56 hours

A backup of 20 GB of data is reduced by a deduplication algorithm to 4 GB of data. What is the deduplication ratio?

A.

1:20

B.

5:1

C.

20:1

D.

1:5

Which product allows data owners to back up and restore using native applications?

A.

Dell EMC PowerProtect Data Manager

B.

VMware vRealize Cloud Management

C.

VMware vRealize Operations

D.

Dell EMC Data Protection Advisor

A consumer performs backup at its on-premise data center for operational recovery. The consumer wants disaster recovery (DR) protection for their data, but they do not want to own and manage a remote site for DR. Which paid backup service is most appropriate for this consumer?

A.

Local backup

B.

Remote backup

C.

Cloud-to-cloud backup

D.

Replicated backup

A full backup of a production volume is created on Sunday, and incremental backups are created for the rest of the week. What are the contents of the backup on Thursday?

A.

all the data on the production volume

B.

all the data that has changed since Wednesday

C.

all the data that has changed since Sunday

D.

all the data that has changed since Monday

What makes services visible and accessible to the users?

A.

Service Catalog

B.

Operational Database

C.

Cloud native application

D.

Unified storage system

Match the types of cyber-attack with their respective description.