New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > DCA-DPM > DEA-3TT2

DEA-3TT2 Associate - Data Protection and Management Version 2 Exam Question and Answers

Question # 4

Which are the primary software methods for Data Security Governance?

A.

masking, de-identification, and NER

B.

masking, classification, and PCRE

C.

classification, discovery, and incident management

D.

classification, discovery, and de-identification

Full Access
Question # 5

A computer has an MTBF of 7000 hours and an MTTR of 18 hours? What is the availability of the data?

A.

90.7%

B.

99.1%

C.

99.7%

D.

99.8%

Full Access
Question # 6

What is a key requirement for NAS-based data migration?

A.

Files are moved but not copied

B.

Files accessible at all times

C.

File stubbed during the migration

D.

File accessible will be paused during the migration

Full Access
Question # 7

Which component of SDDC generates the billing report based on price per unit and number of units consumed for a service?

A.

Orchestrator

B.

Directory Services

C.

Self Service Portal

D.

SDDC Controller

Full Access
Question # 8

What is the correct sequence of actions during a DDBoost backup?

Full Access
Question # 9

An application developer is exploring the best technology to have the application easily transportable and have a small image footprint. Which technology satisfies the request?

A.

Containers

B.

Traditional application

C.

Virtual machines

D.

Monolithic application

Full Access