Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Question:

What is the function of a continuous data protection (CDP) appliance?

A.

Migrates deduplicated data from the source volume to the target volume during replication

B.

Runs data protection software and manages replications within and across data centers

C.

Stores all data that has changed from the time the replication session started

D.

Intercepts writes to the production volume and splits each write into two copies

Full Access
Question # 5

Question:

An organization wants to consume compute, network, and storage resources through a self-service portal. Which cloud service model provides this capability?

A.

Platform as a Service

B.

Infrastructure as a Service

C.

Data as a Service

D.

Software as a Service

Full Access
Question # 6

Question:

A company is looking for a continuous data protection solution that can provide any point-in-time recovery. Which Dell solution is most suitable for this requirement?

A.

Dell SRDF

B.

Dell TimeFinder SnapVX

C.

Dell Cloud Tier

D.

Dell RecoverPoint

Full Access
Question # 7

Question:

Which layer of the OSI model does a router primarily operate at?

A.

Layer 4

B.

Layer 2

C.

Layer 3

D.

Layer 7

Full Access
Question # 8

Question:

What is a key advantage of cloning a VM?

A.

Ability to run new VMs simultaneously with the same IP address

B.

Eliminates the need to create multiple snapshots for a VM

C.

Saves time when creating multiple identical copies of a VM

D.

Improves the performance of existing and new VMs

Full Access
Question # 9

Question:

What is the maximum number of VLANs that can be supported with one VLAN tag field?

A.

1024

B.

2048

C.

4096

D.

8192

Full Access
Question # 10

Question:

Which statement defines the limitation of Native NVMe?

A.

It cannot connect to NVM storage devices outside of the server.

B.

It requires 10 Gigabit or greater Ethernet LANs with TCP.

C.

It requires a 32 Gb/s Fibre Channel to work.

D.

It can only deliver high shared storage performance through Fibre Channel.

Full Access
Question # 11

Question:

What is the most common technique used by malware protection software to detect malware?

A.

Reputation-based analysis

B.

Behavioral analysis

C.

Signature-based detection

D.

Heuristic analysis

Full Access
Question # 12

Question:

In continuous data protection, what does the amount of journal space determine?

A.

How far back the data can be recovered

B.

Amount of space the source and replica volumes require

C.

Length of time required to recover the data

D.

Amount of data that can be restored to a specific point

Full Access
Question # 13

Question:

A Fibre Channel switch has eight ports, and all ports must be operational from 6 AM to 6 PM, Monday through Friday. However, a failure of Port 4 occurs within the week as follows:

    Monday: 11 AM to 1 PM

    Wednesday: 5 PM to 10 PM

    Thursday: 7 AM to 10 AM

    Saturday: 11 AM to 1 PMWhat is the availability of Port 4 in that week?

A.

90%

B.

80%

C.

86.7%

D.

81.6%

Full Access
Question # 14

Question:

What is the main advantage of Network Attached Storage (NAS) systems over general-purpose servers?

A.

Centralizes and optimizes file sharing operations

B.

Supports FC protocols to access files over FC-SAN

C.

Reduces the size of the object ID

D.

Increases data transfer speed

Full Access
Question # 15

Question:

What is an advantage of deploying intelligent storage systems in the data center?

A.

Migrates data from a data center to the cloud at no cost

B.

Reduces the amount of data to replicate, migrate, and back up

C.

Reduces the complexity of managing information by creating silos of storage

D.

Enables efficient and optimized storage and management of information

Full Access
Question # 16

Question:

Which information is contained in a stub file?

A.

Address of the archived file

B.

Address of the source file

C.

Name and size of the archived file

D.

Hard drive address storing the archived file

Full Access
Question # 17

Question:

Which additional technical security control can be applied to reduce and identify the security vulnerability?

A.

Antivirus software

B.

Password encryption

C.

IAM (Identity and Access Management)

D.

IDPS (Intrusion Detection and Prevention System)

Full Access
Question # 18

Question:

In traditional provisioning, which two factors determine the availability, capacity, and performance of the RAID set?

A.

The RAID level

B.

Make of drives

C.

The number of drives in the RAID set

D.

Capacity of drives

Full Access