Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

EMC DEA-1TT5 Associate - Information Storage and Management (Version 5.0) Exam Practice Test

Page: 1 / 14
Total 142 questions

Associate - Information Storage and Management (Version 5.0) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

A Fibre Channel switch has eight ports and all ports must be operational from 8 AM to 8 PM, Monday through Friday. However, a failure of Port 2 occurs on a particular week as follows:

Monday = 10 AM to 12 PM Wednesday = 4 PM to 9 PM Thursday = 4 PM to 7 PM

Friday = 3 PM to 6 PM Saturday = 9 AM to 1 PM

What is the availability of Port 2 in that week?

Options:

A.

70%

B.

71.6%

C.

78.3%

D.

80%

Question 2

Which statement is true regarding virtual provisioning?

Options:

A.

Shared and Thin LUNS can be expanded rapidly with only minor disruptions

B.

Multiple shared storage pools can be created while each pool must be allocated to a unique thin LUN

C.

Virtual provisioning enables more efficient allocation of storage to compute systems

D.

Virtual provisioning prevents issues that arise from oversubscription

Question 3

Which block storage volume allocates all of the physical storage specified at the time it is created?

Options:

A.

Thick provisioned LUN

B.

Thin provisioned LUN

C.

Thin provisioned RAID

D.

Thick provisioned RAID

Question 4

A host sends one write /O to the RAID 1 array.

How many writes does it take for the array to store the data?

Options:

A.

Six write 1/Os

B.

Four write I/Os

C.

Two write I/Os

D.

One write I/Os

Question 5

What is an accurate statement about the Do-It-Yourself approach for building modern Infrastructure?

Options:

A.

Utilizes preconfigured preinstalled and prepackaged vendor ready solutions

B.

Combines the datacenter components into a single standalone computing platform managed by software

C.

Utilizes products and services from the vendors that provide specific functions with more configuration options

D.

Combines datacenter components into a distributed infrastructure platform managed by software

Question 6

What occurs when a company’s IT infrastructure security is breached by a passive attack?

Options:

A.

data is altered by an unauthorized user

B.

unauthorized system access is obtained

C.

access to services is denied

D.

availability of data is affected

Question 7

Refer to the Exhibit:

What type of FC port connects each FCIP gateway to each FC SAN?

Options:

A.

VE_Port

B.

TE_Port

C.

E_Port

D.

EX Port

Question 8

What is an accurate statement regarding virtual LANs?

Options:

A.

Supports Fibre Channel network transport data security

B.

Supports one or more logical LANs operating over a single physical LAN

C.

Provides hardware level connectivity and maintains physical LAN transport paths

D.

Provides software level connectivity and maintains physical LAN transport paths

Question 9

What is a goal of cyber recovery?

Options:

A.

Evaluate systems, networks, and applications to find vulnerabilities

B.

Determine persistence access of system, networks, and applications

C.

Abstract the physical compute hardware from the operating system and applications

D.

lsolate copies of critical data to ensure that an uncompromised copy always exists

Question 10

Which interface does an SCM device use to connect to intelligent storage system controllers?

Options:

A.

NVMe

B.

SATA

C.

SAS

D.

FC

Question 11

Which plane of the SDDC architecture provides a CLI and GUI for IT to administrator the infrastructure and to configure policies? (Choose Correct Answer from Associate - Information Storage and Management version 5 Manual from dellemc.com and give explanation)

Options:

A.

Data plane

B.

Service plane

C.

Control plane

D.

Management plane

Question 12

An organization is planning to secure the connection between the data center and cloud while performing data backup and replication.

Which security control mechanism will help organization to achieve the desired security?

Options:

A.

ldentity and Access management

B.

Intrusion Detection and Prevention

C.

Firewall

D.

Virtual Private Network

Question 13

What is a function of VM hardening?

Options:

A.

Isolate VM storage media to ensure data validity

B.

Isolate VM storage media to prevent data leaks

C.

Change the default configuration of the VM to enhance security

D.

Implement access control list across the VMs to enhance security

Question 14

Why is it important for organizations to store protect and manage their data?

Options:

A.

To eliminate complexity in managing the data center environment

B.

To meet the requirements of legal and data governance regulations

C.

To develop and deploy modern applications for business improvement

D.

To reduce the amount of data to be replicated, migrated, and backed up

Question 15

The Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday. However, a failure of Port 4 occurs as follows:

Monday = 8 PM to 11 PM -

Wednesday = 7 PM to 10 PM -

Thursday = 6 AM to 12 PM -

What is the MTTR of Port 4?

Options:

A.

28 hours

B.

2 hours

C.

38 hours

D.

4 hours

Question 16

An IT organization wants to deploy four FC switches for compute and storage system connectivity. To meet performance requirements, a maximum of one active ISL and redundant ISLs for their compute to storage traffic.

Which FC SAN topology should be recommended?

Options:

A.

Single switch

B.

Partial mesh

C.

Multi-switch

D.

Full mesh

Question 17

Which backup component maintains the catalog containing details about the backups that have occurred?

Options:

A.

Storage node

B.

Backup device

C.

Backup client

D.

Backup server

Question 18

An Ethernet switch has eight ports and all ports must be operational for 24 hours from Monday through Friday.

However, a failure of Port 7 occurs as follows:

● Monday=4 PM to 11 PM

● Wednesday= 2 PM to 10 PM

● Friday= 5 AM to11 AM

What is the MTTR of Port 7?

Options:

A.

36 hours

B.

5 hours

C.

7 hours

D.

33 hours

Question 19

Which backup component sends metadata and tracking information about each backup to the system that maintains this information?

Options:

A.

Backup agent

B.

Storage node

C.

Backup device

D.

Backup server

Question 20

What is an advantage of performing incremental backups compared to cumulative backups for the same data?

Options:

A.

Requires more time to perform data backup

B.

Storage capacity needed for backups is significantly reduced

C.

Requires more storage capacity for backup

D.

Reduces restore time but requires a maximum of two copies

Question 21

What is a key benefit for deploying a remote data protection and recovery solution in a data center environment?

Options:

A.

Maximizes application and information availability

B.

Reduces required maintenance time for IT resources

C.

Avoids security risks that exposes the business data

D.

Reduces the cost of protecting data

Page: 1 / 14
Total 142 questions