Questions for the DEA-3TT2 were updated on : Nov 16 ,2024
DRAG DROP
What is the correct sequence of actions during a DDBoost backup?
What is the primary disadvantage of incremental backups?
A
Reference:
https://iosafe.com/data-protection-topics/3-types-of-backup
What is true of hot-swappable hardware?
D
Reference:
https://whatis.techtarget.com/definition/hot-swap
Which Dell EMC Storage product family does SRDF support?
B
Reference:
https://www.delltechnologies.com/asset/en-us/products/storage/technical-
support/docu95482.pdf
Which type of virtual machine clone is created from a snapshot of a parent VM?
C
Reference:
https://www.vmware.com/support/ws5/doc/ws_clone_typeofclone.html
A backup of 20 GB of data is reduced by a deduplication algorithm to 4 GB of dat
a. What is the deduplication ratio?
D
Reference:
https://www.tsmadmin.com/2015/02/data-domain-compression.html
What assurance does the content authenticity feature of CAS provide?
C
Explanation:
CAS assures the genuineness of stored content. This is achieved by generating a unique content
address for each object and validating the content address for stored objects at regular intervals.
Content authenticity is assured because the address assigned to each object is as unique as a
fingerprint. Every time an object is read, CAS uses a hashing algorithm to recalculate the objects
content address as a validation step and compares the result to its original content address. If the
object fails validation, CAS rebuilds the object using a mirror or parity protection scheme.
Which key metric should be used when updating the corporate disaster recovery plan to minimize
data loss?
C
Reference:
https://www.cockroachlabs.com/blog/demand-zero-
rpo/#:~:text=RPO%20(which%20stands%20for%20Recovery,to%20recover%20from%20a%20failure
Which describes graceful degradation?
B
Reference:
https://www.techtarget.com/searchnetworking/definition/graceful-degradation
An application developer is exploring the best technology to have the application easily
transportable and have a small image footprint. Which technology satisfies the request?
A
Reference:
https://searchcloudsecurity.techtarget.com/feature/Cloud-containers-what-they-are-and-
how-they-work
Refer to the exhibit.
How is a hash created on file Apr.Txt in an object-level deduplication?
B
Reference:
https://www.delltechnologies.com/asset/he-il/products/storage/industry-
market/h17072-data-reduction-with-dell-emc-powermax.pdf
What are the key functions of data management?
B
Reference:
https://www.delltechnologies.com/en-gb/learn/data-protection/intelligent-data-
management.htm
DRAG DROP
What is the correct sequence of steps during an image-based backup?
What does the Cloud Gateway Appliance provide?
C
Reference:
https://education.dellemc.com/content/dam/dell-emc/documents/en-
us/2013KS_Panchanathan-What_Why_and_How_of_Cloud_Storage_Gateway.pdf
(3)
When is the target available for use in pointer-based replication?
C
Reference:
https://webcache.googleusercontent.com/search?q=cache:IGSfpLzWKy8J:https://www.shcollege.ac.
in/wp-content/uploads/NAAC_Documents_IV_Cycle/Criterion-
II/2.3.2/Semester5_FOS_Storagebasedarray.pptx+&cd=7&hl=en&ct=clnk&gl=pk