Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DEA-3TT2 - Associate - Data Protection and Management Version 2 Exam

Page: 1 / 2
Total 60 questions

What is the process of identifying and moving inactive data from primary storage systems to lower-cost storage systems for long-term retention?

A.

Data archiving

B.

Replication

C.

Business continuity

D.

Data locality

Where is the index stored after an archiving operation?

A.

Archive storage

B.

Archive server

C.

Backup server

D.

Media server

Which security control detects and blocks unusual network behavior?

A.

IDPA

B.

VPN

C.

IDPS

D.

Zoning

Which key metric should be used when updating the corporate disaster recovery plan to minimize data loss?

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Which describes graceful degradation?

A.

The application detects a fault in the system and properly shuts down all modules to keep all data consistent

B.

Some modules are unavailable, but the entire application has not been brought down

C.

All modules are still available, but response times are degraded

D.

The application informs the end user their business is important and that the service will be back up as soon as possible

What is true of hot-swappable hardware?

A.

All components need to be rearranged after swap

B.

Reboot is required after a change

C.

All fans need to be running to ensure proper cooling

D.

Replaceable with zero downtime

Which cloud service model allows the deployment of consumer-created applications on the provider's infrastructure?

A.

Platform as a Service

B.

Infrastructure as a Service

C.

Disaster recovery as a Service

D.

Software as a Service

What are the key functions of data management?

A.

detection and orchestration management

B.

discovery and operations management

C.

configuration and detection management

D.

rollout and configuration management

What is a characteristic of data archiving?

A.

Secondary copy of data

B.

Primary copy of data

C.

Short-term retention

D.

Used for operational recovery

What is the correct sequence of actions during a DDBoost backup?