dell dea-1tt5 practice test

associate - information storage and management exam

Last exam update: Oct 15 ,2024
Page 1 out of 10. Viewing questions 1-10 out of 108

Question 1

Which data deduplication method would a cloud service provider use when storing back up data at their location?

  • A. Source-based
  • B. Target-based
  • C. Application-based
  • D. Agent-based
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

A company finance department needs 250 GB of storage for their business applications. A LUN is created with 250 GB, and RAID 1 protection. The LUN is configured to support application I/O performance.

If storage cost is $2 per GB, what is the chargeback amount to the department for application storage?

  • A. $500
  • B. $250
  • C. $1000
  • D. $2000
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

In continuous data protection, what does the amount of journal space determine?

  • A. Length of time required to recover the data
  • B. Amount of space the source and replica volumes require
  • C. Amount of data that can be restored to a specific point
  • D. How far back the data can be recovered
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

What method does FCIP use to transport Fibre Channel SAN data?

  • A. FCIP splits LAN and FC SAN data and tunnels FC SAN data over Ethernet networks.
  • B. FCIP encapsulates and tunnels FC SAN data over IP networks.
  • C. FCIP separates LAN and FC SAN data and tunnels FC SAN data over IP networks.
  • D. FCIP encapsulates and tunnels FC SAN data over Ethernet networks.
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which statement is true regarding virtual provisioning?

  • A. Multiple shared storage pools can be created while each pool must be allocated to a unique thin LUN
  • B. Virtual provisioning prevents issues that arise from oversubscription
  • C. Virtual provisioning enables more efficient allocation of storage to compute systems
  • D. Shared and Thin LUNs can be expanded rapidly with only minor disruptions
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

What is the key advantage of cloning a VM?

  • A. Improves the performance of existing VM and new VMs
  • B. Eliminates the need to create multiple snapshots for a VM
  • C. Saves time when creating multiple identical copies of a VM
  • D. Ability to run new VMs simultaneously with the same IP address
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which process eliminates data redundancy in a data set?

  • A. Data archiving
  • B. Data replication
  • C. Data migration
  • D. Data deduplication
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What is the maximum number of VLANs that can be supported with one VLAN tag field?

  • A. 4096
  • B. 8192
  • C. 1024
  • D. 2048
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

What is a function of a continuous data protection (CDP) appliance?

  • A. Runs data protection software and manages replications within and across data centers
  • B. Migrates deduplicated data from the source volume to the target volume during replication
  • C. Stores all data that has changed from the time the replication session started
  • D. Intercepts writes to the production volume and splits each write into two copies
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An organization wants to prevent incidents which share common symptoms or root causes from reoccurring. They also want to minimize the adverse impact of incidents that cannot be prevented.

Which management function addresses the organization's requirements?

  • A. Incident management
  • B. Problem management
  • C. Availability management
  • D. Security management
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2