Exam4Training

DELL EMC E20-385 Data Domain Specialist Exam for Implementation Engineers Online Training

Question #1

A customer wants to integrate an EMC Data Domain system with IBM Tivoli Storage Manager (TSM) over NFS.

Which device class is recommended to define the Data Domain system in TSM?

  • A . File
  • B . Disk
  • C . AFTD
  • D . Storage Unit

Reveal Solution Hide Solution

Correct Answer: A
Question #2

What is a characteristic of the Dell EMC Data Domain Cloud Tier with Retention Lock?

  • A . Retention Lock is not supported in the cloud tier
  • B . Files that are in cloud tier cannot be locked
  • C . Cloud unit can be deleted when Data Domain is compliant
  • D . Files that are locked on the active tier can be moved to the cloud tier

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Refer to Exhibit.

An EMC Data Domain customer has three offices with their payroll backups currently located in San Jose, California. They want to plan a disaster recovery strategy. The customer is concerned with the possibility of multiple disasters that could compromise both the source and destination sites simultaneously.

Which replication topology will address the customer’s concerns about availability and RTO?

  • A . Topology: One-to-many Source: San Jose Destination: Seattle and Chicago
  • B . Topology: One-to-one Source: San Jose Destination: Seattle
  • C . Topology: Bidirectional Source: San Jose Destination: Chicago
  • D . Topology: Many-to-one Source: San Jose and Seattle Destination: Chicago

Reveal Solution Hide Solution

Correct Answer: A
Question #4

What is the maximum value of ‘Mount Limit’ for restore instances recommended by IBM Spectrum Protect for accessing an NFS share from Dell EMC Data Domain?

  • A . 1024
  • B . 2048
  • C . 4096
  • D . 8192

Reveal Solution Hide Solution

Correct Answer: C
C

Explanation:

The default Mount Limit value is 20 and the maximum value for this parameter is 4096. This means that up to 4096 individual files can be opened at a single time.

References: IBM Spectrum Protect for Linux Version 8.1.2, Administrator’s Reference, page 231

Question #5

Which configuration change requires a mandatory reboot of the Dell EMC Data Domain controller?

  • A . Host name
  • B . Time zone
  • C . NTP
  • D . DNS

Reveal Solution Hide Solution

Correct Answer: A
Question #6

How many slots per VTL are supported in a single Dell EMC Data Domain system?

  • A . 16000
  • B . 24000
  • C . 32000
  • D . 64000

Reveal Solution Hide Solution

Correct Answer: A
Question #7

An organization handling critical data wants to replicate their data store onto a destination system at a remote site. They want to make sure that the replicated data remains unchanged.

Which type of data replication offered by Dell EMC Data Domain meets the organization’s needs?

  • A . Directory replication
  • B . MTree replication
  • C . Pool replication
  • D . Collection replication

Reveal Solution Hide Solution

Correct Answer: B
Question #8

Refer to the exhibit.

When monitoring the system show performance command output, you notice that the state column has "D" for each line entry.

What does the "D" in the "State" column indicate?

  • A . Disk Reconstruction
  • B . Disk Defragmentation
  • C . Data Movement
  • D . Data Integrity

Reveal Solution Hide Solution

Correct Answer: A
Question #9

A Dell EMC Data Domain administrator wants to delegate some Data Domain operations to the Monitoring and Control Team. The administrator wants the team to check the health of the Data Domain system every morning before 10 A.M. The administrator wants to add a user specifically for the Monitoring and Control team. The user would be restricted to checking the health of the Data Domain system.

Which role needs to be applied to the new user?

  • A . None
  • B . User
  • C . Backup Operator
  • D . Limited Admin

Reveal Solution Hide Solution

Correct Answer: B
B

Explanation:

The user role can monitor the system, change their own password, and view system status. The user role cannot change the system configuration.

Question #10

A VTL tape has a bar code of "AAA000LA" What size does the "LA" designation represent?

  • A . 10GIB
  • B . 50GiB
  • C . 100 GiB
  • D . 1.5 TiB

Reveal Solution Hide Solution

Correct Answer: D

Question #11

How many characters are used in barcodes (tape identifiers) for Dell EMC Data Domain VTL?

  • A . 6
  • B . 7
  • C . 8
  • D . 9

Reveal Solution Hide Solution

Correct Answer: B
Question #12

An EMC Data Domain system has been installed at a customer’s site for several months and has reached steady state.

At which threshold percent does capacity reach the point where action should be taken to make more free space available?

  • A . 75
  • B . 85
  • C . 90
  • D . 95

Reveal Solution Hide Solution

Correct Answer: B
Question #13

When configuring backups to an EMC Data Domain system using VTL, what is a backup software recommendation for NetWorker?

  • A . Create two AFTDs per pool
  • B . Group AFTDs by retention period and data type
  • C . Increase the number of target sessions
  • D . Set up a single AFTD in CIFS implementations

Reveal Solution Hide Solution

Correct Answer: A
Question #14

Refer to the exhibit.

When monitoring the system show stats command output, you notice that the "Disk Write KiB/s" column does not have same data rate as "Net eth0a in MB/s" column.

What is a possible reason for this behavior?

  • A . High inline deduplication on the Data Domain system
  • B . Pre-encrypted data written to the Data Domain system
  • C . Pre-compressed data written to the Data Domain system
  • D . High internal file system latency on the Data Domain system

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which hardware and capacity license options are available for an EMC Data Domain system?

  • A . Expanded-Storage, Capacity-Active, DD Extended Retention, and Capacity-Archive
  • B . Expanded-Storage, DD Extended Retention, Capacity-Active, Global Deduplication, and Capacity-Archive
  • C . Expanded-Storage, Capacity-Active, Gateway, and Capacity-Archive
  • D . Expanded-Storage, Global Compression, and DD Extended Retention

Reveal Solution Hide Solution

Correct Answer: A
Question #16

In a EMC Data Domain system, which user role allows creation of snapshots as well as import and export of tapes to a VTL library?

  • A . Backup-operator
  • B . User
  • C . Security
  • D . Data-access

Reveal Solution Hide Solution

Correct Answer: A
Question #17

A customer wants to integrate an EMC Data Domain appliance into their current backup environment using CIFS, NFS, and DD Boost.

Which backup application requires the use of the DD Boost protocol when integrated with Data Domain?

  • A . EMC Avamar
  • B . Simpana CommVault
  • C . Dell vRanger
  • D . Oracle RMAN

Reveal Solution Hide Solution

Correct Answer: A
Question #18

A customer is backing up data to an EMC Data Domain system with Extended Retention.

To which tier(s) is the data written?

  • A . Active
  • B . Recent
  • C . Oldest
  • D . Active and Recent

Reveal Solution Hide Solution

Correct Answer: A
Question #19

Which protocol is used by Dell EMC Data Domain Replicator to send encrypted data being replicated between systems?

  • A . SSL
  • B . FTP
  • C . HTTPS
  • D . IPsec

Reveal Solution Hide Solution

Correct Answer: A
A

Explanation:

DD Replication supports encryption of data-in-flight by using standard Secure Socket Layer (SSL) protocol version 3.

References: https://www.emc.com/collateral/software/white-papers/h7082-data-domain-replicator­wp.pdf, page 11

Question #20

In an EMC Data Domain system with Extended Retention, what is used to move data to the Extended Retention Tier?

  • A . Data Movement Policy
  • B . HSM Movement Policy
  • C . Cloning
  • D . Duplication

Reveal Solution Hide Solution

Correct Answer: A

Question #21

DRAG DROP

What is the correct sequence of operations used by the Dell EMC Data Domain Data Invulnerability Architecture (DIA) in the end-to-end verification process?

Reveal Solution Hide Solution

Correct Answer:


Question #22

When using VTL on an EMC Data Domain system, why should persistent binding be enabled on the host?

  • A . Prevents interruption of backup operations after a system reboot
  • B . Enables LUN Masking, assisting in performance
  • C . Provides access to devices during an outage
  • D . Provides high availability

Reveal Solution Hide Solution

Correct Answer: A
Question #23

Which license is optional beyond the three required for Extended Retention licensing?

  • A . Retention Lock Governance
  • B . Capacity Archive
  • C . Capacity Active
  • D . Cloud Tier Capacity

Reveal Solution Hide Solution

Correct Answer: A
Question #24

An EMC Data Domain customer wants to perform bi-directional replication.

Which two forms of replication would support this function?

  • A . MTree and Directory
  • B . Collection and MTree
  • C . Directory and Collection
  • D . MTree and Cascaded

Reveal Solution Hide Solution

Correct Answer: A
Question #25

You are tasked with integrating two new EMC Data Domain systems into an existing EMC NetWorker environment. Due to customer requirements, a VTL will be created on each Data Domain and drives will be presented to each NetWorker storage node.

Which best practice should be provided to the customer for this configuration?

  • A . Configure persistent binding on all hosts
  • B . Ensure less than five fabric hops
  • C . Use switch encryption between the Data Domain and storage nodes
  • D . Multiplex data on the tape drives on all storage nodes

Reveal Solution Hide Solution

Correct Answer: A
Question #26

An administrator wants to decrease the time needed to back up data to a locally connected EMC Data Domain system. In addition, the administrator wants to reduce the amount of network traffic generated by the backup software.

Which DD Boost capability will achieve this requirement?

  • A . Distributed Segment Processing
  • B . Managed File Replication
  • C . Advanced Load Balancing and Failover
  • D . Low Bandwidth Optimization

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Where does in-line deduplication occur in an EMC Data Domain (DD) system?

  • A . DD RAM
  • B . DD Boost
  • C . DD NVRAM
  • D . DD CPU

Reveal Solution Hide Solution

Correct Answer: A
Question #28

What is a benefit of snapshots on an EMC Data Domain system?

  • A . Provides data restoration from a specific point in time for deleted data
  • B . Requires no disk space to store
  • C . Included with the replication license
  • D . Provides NDMP backups to a remote site

Reveal Solution Hide Solution

Correct Answer: D
Question #29

An EMC Data Domain customer wants to add a static route using the CLI.

Which command is used?

  • A . route add
  • B . net config
  • C . route config
  • D . config route

Reveal Solution Hide Solution

Correct Answer: A
Question #30

By default, which percentage of CPU resources are allocated to the EMC Data Domain cleaning cycle?

  • A . 25%
  • B . 30%
  • C . 50%
  • D . 75%

Reveal Solution Hide Solution

Correct Answer: C

Question #31

What is the default password on a new EMC Data Domain system?

  • A . serial number
  • B . abc123
  • C . sysadmin
  • D . changeme

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Which user role is limited to monitoring and performing fastcopy operations on an EMC Data Domain system?

  • A . User
  • B . Data-access
  • C . Admin
  • D . Backup-operator

Reveal Solution Hide Solution

Correct Answer: A
Question #33

An EMC Data Domain administrator needs to replicate the entire /data/col1 area from source to destination and be considered a true form of disaster recovery.

Which replication method should be used?

  • A . Collection
  • B . MTree
  • C . Directory
  • D . Managed Replication

Reveal Solution Hide Solution

Correct Answer: A
Question #34

A customer wants to integrate an EMC Data Domain appliance into their current backup environment using CIFS, NFS, DD Boost, and VTL.

Which backup application supports the four protocols?

  • A . Symantec NetBackup and EMC NetWorker
  • B . Symantec NetBackup and Dell vRanger
  • C . EMC Avamar and NetWorker
  • D . Oracle RMAN and Symantec Backup Exec

Reveal Solution Hide Solution

Correct Answer: A
Question #35

A customer reports that their EMC Data Domain system is running out of space. They manually removed many fast copies from their system. However, this has not increased available space on the system.

What else must be done to regain space used by fast copies?

  • A . Run file system cleaning to reclaim space
  • B . Remove the MTrees that contain the fast copies
  • C . Expire the fast copies when they are removed
  • D . Expire and remove the snapshots that were used to create the fast copies

Reveal Solution Hide Solution

Correct Answer: A
Question #36

A customer wants to use the 10 GigE interfaces in their EMC Data Domain system for link failover.

How many interfaces can be added to the bonding group?

  • A . 2
  • B . 3
  • C . 4
  • D . 6

Reveal Solution Hide Solution

Correct Answer: A
Question #37

What is a consideration of replication with cloud tier?

  • A . The source system must be running DD OS 5.7 or higher to support replication to the cloud
  • B . Only collection replication is supported on cloud tier enabled systems
  • C . A replicated file is always placed in the active tier first even when cloud tier is enabled
  • D . A replicated file is placed in a cloud unit first if cloud tier is enabled

Reveal Solution Hide Solution

Correct Answer: A
Question #38

In an EMC Data Domain environment, which path location is the default directory for deduplicated data?

  • A . /data/col1/backup
  • B . /ddvar
  • C . /data
  • D . /data/col1

Reveal Solution Hide Solution

Correct Answer: A
Question #39

DRAG DROP

What is the correct sequence of steps to configure a VTL for a Dell EMC Data Domain system?

Reveal Solution Hide Solution

Correct Answer:

Explanation:

Step 1: To set up a simple DD VTL, use the Configuration Wizard.

Then, continue with enabling the DD VTL, create libraries (or pools), and create and import tapes.

Step 2, 3: Enabling DD VTL Procedure

Step 4-5: You can create tapes in either a library or a pool.

References: Dell EMC Data Domain Operating System Version 6.1, Administration Guide, page 338


Question #40

A backup administrator has enabled the Retention Lock feature on a Dell EMC Data Domain system. They notice increased file system utilization over time and upon investigation they discover the expired files are still present on the Data Domain system.

What could be the possible reason for this situation?

  • A . Retention lock feature was disabled before the expiration date
  • B . A-time’ retention expiration date for an archive file was set below the minimum retention period
  • C . Filesystem cleaning was not running as per the schedule
  • D . Archiving application was not set to delete the file after expiration

Reveal Solution Hide Solution

Correct Answer: B

Question #41

An EMC Data Domain customer has an environment with 10 branch offices whose backup data is replicated to their primary location. For disaster recovery purposes, the primary location is replicated to an offsite location.

Which replication topology does this represent?

  • A . Cascaded
  • B . Cascaded One-to-Many
  • C . Many-to-One
  • D . Star

Reveal Solution Hide Solution

Correct Answer: A
Question #42

What is the maximum number of MTrees that can be created on an EMC Data Domain system?

  • A . 14
  • B . 32
  • C . 100
  • D . 750

Reveal Solution Hide Solution

Correct Answer: C
Question #43

What is indicated by a flashing green LED on an EMC Data Domain Expansion Shelf SAS Controller?

  • A . Connection in process
  • B . Disk in use
  • C . Connection established
  • D . Connection problem

Reveal Solution Hide Solution

Correct Answer: A
Question #44

In a Dell EMC Data Domain system, which user role allows the creation of snapshots as well as import and export of tapes to a VTL library?

  • A . None
  • B . Security
  • C . Backup-Operator
  • D . Data-access

Reveal Solution Hide Solution

Correct Answer: B
Question #45

Refer to the Exhibit.

When connecting a single expansion shelf to a EMC Data Doman controller, what are the recommended SAS ports that should be used?

  • A . 3a and 2a
  • B . 3a and 2b
  • C . 3b and 2a
  • D . 3b and 2b

Reveal Solution Hide Solution

Correct Answer: B
Question #46

What does the EMC Data Domain file level retention locking feature provide?

  • A . Active archive protection for IT governance
  • B . Instant restoration of applications and data
  • C . Built-in data safety for extended onsite retention
  • D . Offline availability of archive data

Reveal Solution Hide Solution

Correct Answer: A
Question #47

CORRECT TEXT

Which protocols are supported by Dell EMC Data Domain for data movement to the cloud tier?

  • A . CIFS and vDisk
  • B . DD Boost only
  • C . vDisk only
  • D . CIFS and NFS

Reveal Solution Hide Solution

Correct Answer: D
Question #48

A customer is using EMC NetWorker with EMC DD Boost, writing to a Data Domain DD990. Due to regulatory requirements, the customer must keep their data for seven years.

What should be done to achieve this requirement while minimizing management overhead?

  • A . Use DD Extended Retention
  • B . Use Global Deduplication Array
  • C . Clone the data to tape
  • D . Backup the data to a mid-tier VNX

Reveal Solution Hide Solution

Correct Answer: A
Question #49

Which criteria are used as the basis for configuring the data movement policy of a Dell EMC Data Domain system enabled with Extended Retention?

  • A . Frequency of file activity Availability of space on the target tier
  • B . Creation time of every file stored in the system Frequency of data movement
  • C . Last modified time of every file stored in the system Schedule of data movement
  • D . Last modified time of each directory stored in the system Frequency of updates to each directory

Reveal Solution Hide Solution

Correct Answer: C
Question #50

On an EMC Data Domain system, what is the role of file system cleaning?

  • A . Remove unreferenced segments from physical storage
  • B . Delete data from VTL cartridges that have been marked as expired
  • C . Remove all traces of a file to resolve classified message incidents
  • D . Eliminate older snapshots if the file system exceeds 90% utilization

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version