Practice Free D-DP-FN-23 Exam Online Questions
Which data migration involves migrating data at the file level using intermediary compute systems?
- A . Host-based migration
- B . NAS-based migration
- C . SAN-based migration
- D . Application migration
Which is a type of cyber attack?
- A . Tracking cookie
- B . Traffic profiling
- C . Adware
- D . Eavesdrop
Which does Continuous Data Protection support?
- A . remote and cloud replication
- B . local and remote replication
- C . cloud replication only
- D . local replication only
What is a key element of a cloud portal?
- A . Unified manager
- B . Element manager
- C . Orchestrator
- D . Management interface
What does an attack vector refer to in the context of data security?
- A . An entry point an attacker can use to launch an attack
- B . A step or series of steps necessary to complete an attack
- C . A weakness in a system that can be exploited to launch an attack
- D . The amount of time and effort required to complete an attack
Which replication method requires a write to be committed before signaling a write complete to the compute host?
- A . Local
- B . Synchronous
- C . Asynchronous
- D . Remote
What is a characteristic of storage resource pools?
- A . Resource pools should always be created by different types of storage devices
- B . Resources are reserved by the application after being released by the consumer
- C . Resources are dynamically released to the pool when the consumer exceeds their quota
- D . Resources are dynamically allocated based on consumer demand
What is the advantage of deploying a VM full clone in a data protection environment?
- A . Reduces the IT resources required to deploy a new virtual desktop on a VM
- B . Provides the capability of restoring a VM to any previous point in time
- C . Reduces the time required to deploy a new VM in the data center
- D . Reduces the storage required for the clone
Which product automates infrastructure provisioning by enforcing a repeatable, consistent, and reliable process?
- A . Dell EMC Data Protection Advisor
- B . VMware vRealize Operations
- C . Dell EMC PowerProtect Data Manager
- D . VMware vRealize Cloud Management
A storage system is configured with erasure coding, divided up into 12 data segments and 4 coding segments. Each segment is written to different drives.
What is the maximum number of drive failures that can be withstood without losing the data in this configuration?
- A . 6
- B . 4
- C . 3
- D . 5