Skip to content

DEA-1TT4 Associate - Information Storage and Management exams demo

Exam A
QUESTION 1
What is an accurate statement about Governance?
A. Restrict access to certain users
B. Ensure removal of security risks
C. Authorize policy-making decisions
D. Demonstrate adherence to polices
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:

.

.


QUESTION 3
An Ethernet switch has eight ports and all ports must be operational for 24 hours, from Monday through Friday.
However, a failure of Port4 occurs as follows:
• Monday = 8 PM to 9 PM
• Wednesday 7 PM to 9 PM
• Thursday = 6 AM to 9 AM
• Saturday = 4 PM to 7 PM
What is the MTTR of Port 4?
A. 2 hours
B. 3 hours
C. 28 hours
D. 38 hours
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
96CE4376707A97CE80D4B1916F054522
QUESTION 4
What accurately describes an iSCSI HBA?
A. Performs both iSCSI and TCP/IP processing
B. Requires CPU cycles for TCP/IP processing
C. Requires a software adapter with built-in functionality
D. Enables transmission of data through iSCSI tunneling
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.dell.com/downloads/global/power/ps4q09-20090419-McConnell.pdf
QUESTION 5
When using the erasure coding technique in an object-based storage system, data is divided into 12 data
segments and 4 coding segments.
What is the maximum number of disk drive failures against which data is protected by the configuration?
A. 3
B. 4
C. 8
D. 12
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
What is a key advantage of cloning a virtual machine (VM)?
A. Ability to run new VMs simultaneously with the same IP address.
B. Reduces the time required to create multiple copies of a VM.
C. Improves the performance of an existing VM and new VMs.
D. Eliminates the need to create multiple snapshots for a VM.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?
A. Role-based
96CE4376707A97CE80D4B1916F054522
B. Profile-based
C. Signature-based
D. Anomaly-based
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf
.

.

.

QUESTION 9
In an archiving environment, how is a content address created in a content addressable storage (CAS) system
to store an object?
A. From the metadata of an object.
B. By using the logical address of the memory space.
C. From the binary representation of an object.
D. By using the physical address of the storage device.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
What is a benefit of link aggregation?
A. Optimizes fabric performance by distributing network traffic across ISLs.
B. Improves ISL utilization by increasing the network traffic on a specific ISL.
C. Yields a higher throughput by combining two parallel ISLs into a single physical ISL.
D. Saves bandwidth by restricting traffic to a specific potentially congested ISL.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.mycloudwiki.com/san/fc-san-topologies/
QUESTION 11
In a compute-based storage area network (SAN), what is a function of the metadata manager?
A. Holds cluster-wide mapping information and load balancing in a compute-based SAN.
B. Performs the I/O operations on the local storage of a compute system as requested by a client.
C. Provides an interface to the software-defined storage controller.
D. Controls all data read and write operations in a compute-based SAN.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Why is it important for organizations to store, protect, and manage their data?
A. Reduce the amount of data to be replicated, migrated, and backed up.
B. Rapidly develop and deploy modern applications for business improvement.
C. Develop new business opportunities by leveraging existing data.
D. Reduce the complexity in managing the data center environment.
Correct Answer: C
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
A Fibre Channel switch has eight ports and all ports must be operational 24×7. However, a failure of Port 5
occurs on a particular week as follows:
• Monday = 11 AM to 12 PM
• Thursday = 7 AM to 11 AM
• Saturday = 11 AM to 1 PM
What is the availability of Port 5 in that week?
A. 93%
B. 94.1%
C. 95.8%
D. 97%
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Which layer of the OSI model provides the functional and procedural methods to transfer data between
network entities?
A. Data link
B. Presentation
C. Session
D. Application
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://en.wikibooks.org/wiki/Network_Plus_Certification/Management/OSI_Model
QUESTION 15
What is an accurate statement about variable prefetching?
A. Many blocks that have recently been written to storage by the compute system are retrieved and placed in
cache.
B. Many non-contiguous blocks that are not currently required can be retrieved from cache in advance.
C. Storage system prefetches data in multiples of the original I/O request size from the compute system.
D. Storage system prefetches many non-contiguous blocks of data, with varied sizes, from cache.
Correct Answer: D
Section: (none)
Explanation
.
.

.

QUESTION 17
Which Dell EMC product is a hyper-scale storage infrastructure that provides universal accessibility with
support for object and HDFS?
A. ViPR Controller
B. PowerMax
C. Isilon
D. Elastic Cloud Storage
Correct Answer: D
Section: (none)
96CE4376707A97CE80D4B1916F054522
Explanation
Explanation/Reference:
Reference: https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=2ahUKEwibs5yDjablAhVCzBoKHbc6AhgQFjAJegQIAxAC&u
rl=https%3A%2F%2Fwww.dell.com%2Fcommunity%2Fs%2Fvjauj58549%2Fattachments%2Fvjauj58549%
2Fsolutions-ch%2F516%2F1%2Fh13999-hadoop-ecs-data-serviceswp.
pdf&usg=AOvVaw1jTgO2qHQLxapR5zvgXWpH
QUESTION 18
Which cloud deployment model allows provisioning of a cloud infrastructure only for use by a single
organization having multiple consumers?
A. Public cloud
B. Multi-cloud
C. Hybrid cloud
D. Private cloud
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.paranet.com/blog/bid/128265/The-Four-Types-of-Cloud-Computing-Models
QUESTION 19
A company plans to deploy a new application in their environment. The new application requires 2 TB of
storage space. During peak workloads, the application is expected to generate 4500 IOPS with a typical I/O
size of 4 KB. The capacity of each available disk drive is 250 GB. In addition, the maximum number of IOPS a
drive can perform at with a 70% utilization is 90 IOPS.
What is the minimum number of disk drives needed to meet the application's capacity and performance
requirements for a RAID 0 configuration?
A. 8
B. 40
C. 50
D. 70
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.dell.com/community/Student-Discussions/E10-001-Exam-Question-Query/tdp/
7099780
QUESTION 20
Which technology decouples the OS, applications, and user state from a physical compute system?
A. Application virtualization
B. Storage virtualization
C. Thin client virtualization
D. Desktop virtualization
Correct Answer: D
96CE4376707A97CE80D4B1916F054522
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21
What is the goal of a business continuity solution?
A. Reduce the amount of investment in protecting an organization's business-related data.
B. Avoid a disaster in a data protection environment to control the loss of data.
C. Ensure information availability that is required to conduct vital business operations.
D. Eliminate security threats in a data protection environment for continuous access to data.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.oreilly.com/library/view/information-storageand/
9781118236963/9781118236963c09.xhtml

.

.

.

Previous article N10-007 CompTIA Network+ Certification Exams demo
Next article AI-900 Microsoft Azure AI Fundamentals exams demo

Leave a comment

* Required fields