Practice Free D-DP-FN-01 Exam Online Questions
Question #11
What are the advantages of cloud computing?
- A . on-demand scaling, underutilized resources, pay for use, and self service
- B . underutilized resources, pay for use, self service, and high CAPEX
- C . pay for use, high CAPEX, on-demand scaling, and self service
- D . reduced CAPEX, pay for use, self service, and on-demand scaling
Correct Answer: D
Question #12
What does encryption ensure in data protection?
- A . Data cannot be altered without authorization
- B . Data is stored efficiently
- C . Data is replicated in real time
- D . Data is archived permanently
Correct Answer: C
Question #13
Which is a benefit of cloud computing?
- A . separate servers for each customer
- B . provides business agility
- C . increases up-front CAPEX
- D . owned IT resources
Correct Answer: B
Question #14
Which Dell EMC product offers multiple layers of protection to provide resilience against malicious attacks and isolates critical data?
- A . PowerProtect Cyber Recovery Solution
- B . PowerProtect DP Series Appliance
- C . RecoverPoint
- D . Encryption Enterprise
Correct Answer: A
Question #15
What does the Cloud Gateway Appliance provide?
- A . translation layer between standard storage interfaces and cloud service provider
- B . backup access to the cloud service provider
- C . translation layer between standard network interfaces and cloud service provider
- D . VPN access to the cloud service provider
Correct Answer: C
Question #15
What does the Cloud Gateway Appliance provide?
- A . translation layer between standard storage interfaces and cloud service provider
- B . backup access to the cloud service provider
- C . translation layer between standard network interfaces and cloud service provider
- D . VPN access to the cloud service provider
Correct Answer: C
Question #17
What is a key feature of data archiving?
- A . Storing frequently accessed data
- B . Long-term retention of infrequently used data
- C . Eliminating duplicate data
- D . Real-time data replication
Correct Answer: B
Question #18
At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?
- A . Protection Application
- B . Management Domain
- C . Data Source
- D . Database Application
Correct Answer: C
Question #19
What is a typical feature of automated backup tools?
- A . Manual operation
- B . Policy-driven management
- C . Lack of cloud integration
- D . Real-time deduplication
Correct Answer: D
Question #19
What is a typical feature of automated backup tools?
- A . Manual operation
- B . Policy-driven management
- C . Lack of cloud integration
- D . Real-time deduplication
Correct Answer: D