Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

EMC DEA-1TT5 Dumps

Page: 1 / 14
Total 142 questions

Associate - Information Storage and Management (Version 5.0) Questions and Answers

Question 1

Refer to the exhibit:

as

Which operation is represented?

Options:

A.

Write-through wrong

B.

Read Hit

C.

Read Miss

D.

Write-back

Question 2

Match the object-based storage device (OSD) features with their descriptions.

as

Options:

Question 3

In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol?

Options:

A.

New Technology File System (NTFS)

B.

Hadoop Distributed File System (HDFS)

C.

Common Internet File System (CIFS)

D.

Network File System (NFS)

Question 4

Which method automatically allocates a large capacity secondary cache using SSD and SCM?

Options:

A.

Cache provisioning

B.

Volatile cache

C.

Cache tiering

D.

Non-volatile cache

Question 5

What is a feature a hypervisor?

Options:

A.

Provides a VMM that manages all VMS on a clustered compute system

B.

Isolates the VMS on a single compute system

C.

Provides a VMM that manages all VMS on a single compute system

D.

Isolates the physical resources of a single compute system

Question 6

Which management monitoring parameter involves examining the amount of infrastructure resources used?

Options:

A.

Configuration

B.

Capacity

C.

Performance

D.

Availability

Question 7

What is a goal of cyber recovery?

Options:

A.

Evaluate systems, networks, and applications to find vulnerabilities

B.

Determine persistence access of system, networks, and applications

C.

Abstract the physical compute hardware from the operating system and applications

D.

lsolate copies of critical data to ensure that an uncompromised copy always exists

Question 8

Refer to the Exhibit:

as

Identify the following FC Frame fields:

Options:

A.

1CRC 2:Data field 3:Frame header

B.

1:Frame header 2:Data field 3CRC

C.

1CRC 2:Frame header 3:Data field

D.

1:Frame header 2CRC 3:Data field

Question 9

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

Options:

A.

Intrusion-based

B.

Policy-based

C.

Anomaly- Based

D.

Signature-based

Question 10

Match the software-defined storage (SDS) attributes with their respective description.

as

Options:

Question 11

Based on the exhibit, what does the "X" represent in the FCIP tunnel configuration?

as

Options:

A.

E_port

B.

EX_port

C.

F_port

D.

VE_port

Question 12

Refer to the exhibit.

as

What type of NAS system(s) processes file write and read operations as described in the example?

Options:

A.

Scale-up and integrated NAS systems

B.

Scale-up NAS system only

C.

Scale -out NAS system

D.

Integrated NAS system only

Question 13

Which type of zoning does the “X” represent?

as

Options:

A.

Fabric zoning

B.

WWN zoning

C.

Mixed zoning

D.

Port zoning

Question 14

What describes an incident in a storage infrastructure?

Options:

A.

Unknown root cause of one or more disruptions to service

B.

Support request to help access an IT resource

C.

Any action that may impact the functionality of the system

D.

Any event that prevents ions of known errors

Question 15

A company's assets are continuously under attack.

To deploy a security control mechanism to protect these assets, what should be considered?

Options:

A.

Minimize the work factor

B.

Easy access to assets by authorized users

C.

Limited access to assets by unauthorized users

D.

Maximize the attack surface

Question 16

What is the maximum number of VLANs that can be supported with one VLAN tag field?

Options:

A.

4096

B.

8192

C.

1024

D.

2048

Question 17

What is determined by the amount of space configured for the journal in continuous data protection (CDP) replication?

Options:

A.

Length of time required to recover the data

B.

Length of time the recovery points can go back

C.

Amount of data that can be restored to a specific point

D.

Amount of space the source and replica volumes require

Question 18

Which interface does an SCM device use to connect to intelligent storage system controllers?

Options:

A.

NVMe

B.

SATA

C.

SAS

D.

FC

Question 19

Which file system provides a streaming interface using the MapReduce framework?

Options:

A.

CIFS

B.

HDFS

C.

NFS

D.

NTFS

Question 20

What type of network connectivity is illustrated in the image below?

as

Options:

A.

Compute to storage connectivity

B.

Data center to data center connectivity

C.

Storage to hybrid cloud connectivity

D.

Compute to hybrid cloud connectivity

Question 21

What is a function of a continuous data protection (CDP) appliance?

Options:

A.

Migrates deduplicated data from the source volume to the target volume during replication

B.

Manages both local and remote replications within and across data centers

C.

Stores all data that has changed from the time the replication session started

D.

Intercepts writes to the production volume and splits each write into two copies

Page: 1 / 14
Total 142 questions