Dell PowerProtect Cyber Recovery Deploy v2 v1.0

Page:    1 / 3   
Exam contains 36 questions

What is the maximum number of PowerProtect Data Domains supported by Dell PowerProtect Cyber Recovery?

  • A. 4
  • B. 2
  • C. 10
  • D. 5


Answer : D

Which three server types are part of the Dell PowerProtect Cyber Recovery solution? (Choose three.)

  • A. Storage application server
  • B. Backup application recovery server
  • C. Application analytics server
  • D. Web application Server
  • E. PowerProtect Cyber Recovery management server


Answer : ACE

Which two options correctly describe how you can connect from the vault to another environment? (Choose two.)

  • A. Connect by a Telnet Client to the PowerProtect Cyber Recovery vault
  • B. Connect by a replication data link between the vault-environment and production environment Dell PowerProtect Data Domain systems
  • C. Connect by a SSH Client to the PowerProtect Cyber Recovery vault
  • D. Connect by an optional dedicated link from the Cyber Recovery management host in the Dell PowerProtect Cyber Recovery vault to the production network operations center


Answer : BD

You execute the crsetup.sh --check command to upgrade the Dell PowerProtect Cyber Recovery software using the precheck option.
What is the first check that the update precheck performs?

  • A. Recovery operating system size requirements
  • B. Running status of the Cyber Recovery registry service
  • C. Compatibility with the installed version on your system


Answer : B

Which feature of the Dell PowerProtect Cyber Recovery in collaboration with VMware ESXi 8.0 environment offers the capacity of 220 TB?

  • A. ESX hypervisor with customized settings
  • B. Dell PowerEdge hardware with all-flash media on a supported Hyper-V
  • C. KVM with hybrid media built on Dell hardware
  • D. Dell PowerEdge hardware with all-flash media


Answer : D

Which two server configurations are valid for the CyberSense virtual appliance? (Choose two.)

  • A. Small - 16 CPU, 128 GB Memory
  • B. X-Large - 48 CPU, 512 GB Memory
  • C. Large - 32 CPU, 384 GB Memory
  • D. Medium - 20 CPU, 192 GB Memory


Answer : AC

Which describes the best use of Dell PowerProtect Data Domain in an isolated clean room?

  • A. Stand by for production Data Domain
  • B. To extend recoverability of the immutable copies for up to 45 days
  • C. Offloading long running analyze jobs from vault Data Domain
  • D. Target for alternate recovery


Answer : D

You have multiple Dell PowerProtect Data Domain integrated with a Dell PowerProtect Cyber Recovery host. Connection is lost to one of the Data Domains.
Which two methods would a Cyber Recovery administrator use to find out about it? (Choose two.)

  • A. An alert notification will be sent out to the admin stating, ‘Vault status is Unknown’.
  • B. Alert 2035 will be generated stating ‘An error was detected while attempting to communicate with the DD system’.
  • C. In the Cyber Recovery GUI, the vault status will be changed to ‘Unknown’.
  • D. In the Cyber Recovery GUI, the vault status will be changed to ‘Degraded’.


Answer : BC

What are the three characteristics of CyberSense? (Choose three.)

  • A. Full content-based scan
  • B. Identifies the full path of the suspect file
  • C. Protects from cyber attacks
  • D. Identifies the last known good file
  • E. Identifies known vulnerability


Answer : ABD

Which three statements are true when performing a Dell Avamar Automated Recovery? (Choose three.)

  • A. Run lockbox_restore.pl script to recover MCUser and GSAN accounts.
  • B. Vault PowerProtect Data Domain Storage ID in Dell PowerProtect Cyber Recovery must be known to obtain the latest checkpoint.
  • C. Avamar System ID must be known for Avamar checkpoint restore.
  • D. Avamar version, build, and FQDN must match the production.
  • E. DDBoost username, role, and password on Vault Data Domain must match the production.


Answer : ACE

What is the purpose of the command crsetup. sh --install in the context of Dell PowerProtect Cyber Recovery software?

  • A. Start the PowerProtect Cyber Recovery software
  • B. Configure the software on the Cyber Recovery OVA
  • C. Configure the software on the PowerProtect Cyber Recovery management host
  • D. Force re-creation of the PowerProtect Cyber Recovery containers


Answer : C

A Dell PowerProtect Cyber Recovery administrator has noticed multiple file corruption events and suspects some potential harmful situations in their environment.
Which error log level can be used to analyze the situation?

  • A. DEBUG
  • B. INFO
  • C. ERROR
  • D. WARNING


Answer : A

Which CPU/memory requirements are needed to deploy CyberSense virtual appliance with large configuration?

  • A. 25 vCPU/ 192 GB RAM
  • B. 32 vCPU/ 384 GB RAM
  • C. 32 vCPU/ 364 GB RAM
  • D. 20 vCPU/ 192 GB RAM


Answer : B

If you are deploying CyberSense on an i3en.12xlarge instance, which statement best describe the key feature of using this AWS instance type?

  • A. It optimized for compute-intensive workloads with high CPU performance.
  • B. It provides large SAS storage optimized for maximum capacity.
  • C. It can process many disk images and a large amount of data with CyberSense.
  • D. It offers high memory capacity for large-scale database applications.
  • E. It provides cost-effective general-purpose computing with balanced resources.


Answer : C

Which application object is required in the Dell PowerProtect Cyber Recovery vault to perform data analysis for malware or anomalies?

  • A. Dell Avamar
  • B. Dell PowerProtect Data Manager
  • C. Dell NetWorker
  • D. CyberSense


Answer : D

Page:    1 / 3   
Exam contains 36 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy | Amazon Exams | Cisco Exams | CompTIA Exams | Databricks Exams | Fortinet Exams | Google Exams | Microsoft Exams | VMware Exams