What else must be done to regain space used by fast copies?
A customer reports that their EMC Data Domain system is running out of space. They manually removed many
fast copies from their system. However, this has not increased available space on the system.
What else must be done to regain space used by fast copies?
Which replication topology does this represent?
An EMC Data Domain customer has an environment with 10 branch offices whose backup data is replicated to
their primary location. For disaster recovery purposes, the primary location is replicated to an offsite location.
Which replication topology does this represent?
when does the "throttle" setting redu…
On an EMC Data Domain system, when does the “throttle” setting reduce resource allocation to the file system
cleaning process?
Which replication method should be used?
An EMC Data Domain administrator needs to replicate the entire /data/col1 area from source to destination and
be considered a true form of disaster recovery. Which replication method should be used?
How can this be implemented in Data Domain?
An EMC Data Domain customer is looking for a way to charge each company department for storage utilization
on their Data Domain systems. How can this be implemented in Data Domain?
Which two forms of replication would support this function?
An EMC Data Domain customer wants to perform bi-directional replication. Which two forms of replication
would support this function?
how many 10 GbE interfaces can be used in a Link Failov…
When using Intel cards, how many 10 GbE interfaces can be used in a Link Failover Bonding Group on an
EMC Data Domain system?
Which EMC Data Domain feature provides this capability?
A customer needs the ability to prevent their retained data from being modified or deleted for a defined period
of time. In addition to protecting the data, regulatory requirements demand a higher level of security ensuring
the integrity of the data.
Which EMC Data Domain feature provides this capability?
What is causing this issue?
An EMC Data Domain customer can view data on a destination system in a collection replication context. They
are attempting to write data using CIFS; however, they are unable to perform writes.
What is causing this issue?
What must be done to ensure the system is protected fro…
A customer has two EMC Data Domain systems. They plan to perform replication seeding before moving the
replication target to a secured site by a third-party. The customer wants to protect the system from
unauthorized data access.
What must be done to ensure the system is protected from unauthorized access or accidental exposure?