Practice Free D-DP-FN-01 Exam Online Questions
A full backup of a production volume is created on Sunday, and incremental backups are created for the rest of the week.
What are the contents of the backup on Thursday?
- A . all the data on the production volume
- B . all the data that has changed since Wednesday
- C . all the data that has changed since Sunday
- D . all the data that has changed since Monday
What is the recommended approach to migrate applications with the least amount of downtime?
- A . Hybrid migration strategy
- B . Forklift migration strategy
- C . Replatform the applications
- D . Reinstall the applications
What does orchestration refer to in Software Defined Data Protection?
- A . Recovering backed up data from the cloud
- B . Defining the retention period and availability levels of data and applications
- C . Configuring policies and protection storage for backup
- D . Automated arrangement, coordination, and management of systems and components
Which are key CDP solution components?
- A . Journal Volume, Write Splitter, and SAN
- B . CDP Appliance, Journal Volume, and Write Splitter
- C . Production Volume, Replica, and Journal Volume
- D . Hypervisor, SAN, and CDP Appliance
Which countermeasure is used to protect data against unauthorized access, deletion, modification, or disruption?
- A . Data locality
- B . Data sovereignty
- C . Data security
- D . Data governance
Which countermeasure is used to protect data against unauthorized access, deletion, modification, or disruption?
- A . Data locality
- B . Data sovereignty
- C . Data security
- D . Data governance
What does continuous data protection (CDP) offer over traditional backup methods?
- A . Data is backed up at scheduled intervals
- B . Data is backed up in real-time
- C . Data is less secure
- D . Data backups are managed manually
What is the correct order of risk management steps an organization must perform before offering resources or services to users?
- A . assessment, identification, monitoring, and mitigation
- B . identification, monitoring, assessment, and mitigation
- C . identification, assessment, mitigation, and monitoring
- D . assessment, mitigation, monitoring, and identification
What is the correct order of risk management steps an organization must perform before offering resources or services to users?
- A . assessment, identification, monitoring, and mitigation
- B . identification, monitoring, assessment, and mitigation
- C . identification, assessment, mitigation, and monitoring
- D . assessment, mitigation, monitoring, and identification
Which big data protection optimization method eliminates redundant data to significantly shrink storage requirements?
- A . Deduplication
- B . Encryption
- C . Compression
- D . Migration