A customer is interested in deploying DD Boost for their current EMC Data Domain system. They are aware of Distributed Segment Processing (DSP) and want to know the data flow when they
enable DSP. What describes the data flow from the backup host to the Data Domain system?
A. Segmenting, fingerprinting, and compression occur on the backup host. Fingerprint filtering and writes occur on the Data Domain.
B. Segmenting, fingerprinting, and fingerprint filtering occur on the backup host. Compression and writes occur on the Data Domain.
C. Fingerprinting, compression, and fingerprint filtering occur on the backup host. Segmenting and writes occur on the Data Domain.
D. Segmenting, fingerprinting, fingerprint filtering, and compression occur on the backup host. Writes occur on the Data Domain.
Which method of deduplication yields better deduplication results for multiple data types?
A. Variable segment size deduplication due to its ability to add data to a variable segment and move the data stream.
B. Fixed segment size deduplication due to its ability to add data to a fixed segment without having to move the data stream.
C. Fixed segment size deduplication due to its ability to add data to a fixed segment and move the data stream.
D. Variable segment size deduplication due to its ability to add data to a variable segment without having to move the data stream.
What is a component of the EMC Data Domain Data Invulnerability Architecture that protects against data loss?
A. File system recoverability
B. Summary vector identification
C. System sanitization
D. Segment locality processing
You are implementing an EMC Data Domain system at a location that is not staffed. However, the customer has network connectivity to the site from the main data center. In the event of a system crash, what can be configured to allow the customer the ability to cycle power?
A. Serial over LAN
You have implemented an EMC Data Domain system with directory replication. After replication has occurred, the customer notices that the space utilization on the source and destination systems is different. How can this be explained?
A. Difference in global compression
B. Difference in the encryption algorithm
C. CIFS/NFS is mixed on the same directory
D. Destination directory may be corrupted
An organization currently writes backups to an EMC Data Domain system and then creates encrypted copies of their backups on tapes. These tapes are then shipped to a third-party offsite
vault.They are now planning to deploy a second Data Domain system in a hosted disaster recovery site as a replication target. This will replace the use of the offsite tapes. The two sites
are connected through an encrypted WAN link.
Where should encryption be applied on the Data Domain systems to ensure a similar level of data security as their current process?
A. Use encryption of data in flight to the hosted disaster recovery site
B. Enable encryption of data at rest at the disaster recovery site
C. Enable encryption of data at rest at the source site
D. WAN link between the sites is already encrypted