An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite vault.
They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?
A. Enable Encryption of Data at Rest at the disaster recovery site
B. Use encryption of data in flight to the hosted disaster recovery site
C. Enable Encryption of Data at Rest at the source site
D. WAN link between the sites is already encrypted
You are installing an EMC Data Domain system with two expansion shelves in a customer- provided rack. When cabling the controller to the shelves, where does the host port on the last shelf in the chain get connected?
A. Expansion port of the upstream shelf
B. Expansion port of the controller
C. Last port is left un-cabled
D. Host port of the controller
What is the default password on a new EMC Data Domain system?
A. serial number
B. abc123
C. sysadmin
D. changeme
NetBackup has been configured to use an EMC Data Domain appliance as a VTL for the primary target storage unit.
Which multiplexing setting should be configured within the NetBackup storage unit to achieve optimal deduplication performance on the Data Domain?
A. Disabled
B. Unlimited
C. 2
D. 4
Which interface is used for the initial access and configuration of an EMC Data Domain system?
A. KVM ports or serial console
B. Onboard eth0a as factory configured IP 192.168.0.1 using Telnet
C. IPMI management port
D. Onboard eth0b as factory configured IP 192.168.0.1 using SSH or HTTP
A customer is implementing an EMC Data Domain system over CIFS using Symantec NetBackup. How would the Data Domain system be configured on the backup server?
A. Storage unit
B. adv_file device
C. Jukebox
D. Backup-to-disk folder
In an EMC Data Domain environment, which protocol is required for DD Boost?
A. CIFS
B. Fibre Channel
C. TCP/IP
D. NDMP
On an EMC Data Domain system, what is the role of file system cleaning?
A. Remove unreferenced segments from physical storage
B. Delete data from VTL cartridges that have been marked as expired
C. Remove all traces of a file to resolve classified message incidents
D. Eliminate older snapshots if the file system exceeds 90% utilization
Which characteristic accurately describes EMC Data Domain Encryption software?
A. Supports both 128-bit and 256-bit AES algorithms
B. Utilizes multiple encryption keys for separate data sets
C. Supports granular encryption of specific data sets
D. Utilizes self-encrypting SATA drives
A customer is running NFS backups with eight Symantec NetBackup Media Servers. The EMC Data Domain system is receiving data at 700 MB/s. What is a possible cause if the system is also writing to disk at 700 MB/s?
A. Network bottlenecks
B. Encrypted data streams
C. Too many media servers
D. Not enough connections