2014 Latest EMC E20-385 Exam Dump Free Download!

EMC Exam

QUESTION 1
A customer is interested in deploying DD Boost for their current EMC Data Domain system. They are aware of Distributed Segment Processing (DSP) and want to know the data flow when they enable DSP. What describes the data flow from the backup host to the Data Domain system?

A.    Segmenting, fingerprinting, and compression occur on the backup host.
Fingerprint filtering and writes occur on the Data Domain.
B.    Segmenting, fingerprinting, and fingerprint filtering occur on the backup host.
Compression and writes occur on the Data Domain.
C.    Fingerprinting, compression, and fingerprint filtering occur on the backup host.
Segmenting and writes occur on the Data Domain.
D.    Segmenting, fingerprinting, fingerprint filtering, and compression occur on the backup host.
Writes occur on the Data Domain.

Answer: A

QUESTION 2
Which method of deduplication yields better deduplication results for multiple data types?

A.    Variable segment size deduplication due to its ability to add data to a variable segment and move the data stream.
B.    Fixed segment size deduplication due to its ability to add data to a fixed segment without having to move the data stream.
C.    Fixed segment size deduplication due to its ability to add data to a fixed segment and move the data stream.
D.    Variable segment size deduplication due to its ability to add data to a variable segment without having to move the data stream.

Answer: DA

QUESTION 3
What is a component of the EMC Data Domain Data Invulnerability Architecture that protects against data loss?

A.    File system recoverability
B.    Summary vector identification
C.    System sanitization
D.    Segment locality processing

Answer: A

QUESTION 4
You are implementing an EMC Data Domain system at a location that is not staffed. However, the customer has network connectivity to the site from the main data center. In the event of a system crash, what can be configured to allow the customer the ability to cycle power?

A.    Serial over LAN
B.    SNMP
C.    IPMI
D.    Replication

Answer: C

QUESTION 5
You have implemented an EMC Data Domain system with directory replication. After replication has occurred, the customer notices that the space utilization on the source and destination systems is different. How can this be explained?

A.    Difference in global compression
B.    Difference in the encryption algorithm
C.    CIFS/NFS is mixed on the same directory
D.    Destination directory may be corrupted

Answer: A

QUESTION 6
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?

A.    Use encryption of data in flight to the hosted disaster recovery site
B.    Enable encryption of data at rest at the disaster recovery site
C.    Enable encryption of data at rest at the source site
D.    WAN link between the sites is already encrypted

Answer: B

QUESTION 7
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.
They are now planning to deploy a second Data Domain system to a secure data center at their corporate headquarters as a replication target to replace the use of the offsite tapes. The two sites are connected through the Internet.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as achieved by their current process?

A.    Encrypt the replication context
B.    Encrypt the data at rest
C.    Encrypt the data at rest and the replication context
D.    Encryption is not required

Answer: A

QUESTION 8
What is indicated by a flashing green SAS state LED on an EMC Data Domain ES20 SAS controller?

A.    Connection problem
B.    Connection established
C.    RAID reconstruction in progress
D.    Connection in process

Answer: D

QUESTION 9
As illustrated in the exhibit, which cable connects the EMC Data Domain controller to an ES20 expansion shelf?
 clip_image002

A.    A
B.    B
C.    C
D.    D

Answer: A

QUESTION 10
When connecting EMC Data Domain expansion shelves, what should be done to avoid cable stress at the solder joints of the connector?

A.    Keep the ambient temperature at an acceptable level
B.    Use screw lock assemblies
C.    Leave enough cable to allow for free air flow
D.    Secure the cable to the rack door

Answer: B
Passing your EMC E20-385 Exam by using the latest E20-385 Exam Dump Full Version: http://www.braindump2go.com/e20-385.html