Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium EMC D-PCR-DY-01 Dumps Questions Answers

Page: 1 / 3
Total 38 questions

Dell PowerProtect Cyber Recovery Deploy v2 Exam Questions and Answers

Question 1

Before starting a Dell NetWorker recovery, the administrator needs to verify that the DDBoost user is correctly configured in both the production and Dell PowerProtect Cyber Recovery environments.

What must be confirmed about the DDBoost user to ensure a successful Dell NetWorker recovery?

Options:

A.

The DDBoost user is different in the vault and production environments.

B.

The DDBoost user is configured with read-only access.

C.

The DDBoost user has administrative privileges.

D.

The DDBoost user is the same UID in both the vault and production environments.

Buy Now
Question 2

What does Dell Technologies recommend before defining Dell PowerProtect Cyber Recovery policies?

Options:

A.

Perform an initial replication between the production and vault systems for each replication context

B.

Enable high availability (HA) on the Dell PowerProtect Data Domain system

C.

Lock the PowerProtect Cyber Recovery vault manually before initiating a Sync operation

D.

Configure two floating IP addresses for PowerProtect Data Domain management and replication

Question 3

To protect the production data with Dell PowerProtect Cyber Recovery, which statement describes a correct requirement when planning a vault environment?

Options:

A.

You must store data it in a PowerProtect Data Domain Mtree and integrate with PowerProtect Direct Agent.

B.

You must store data in a PowerProtect Data Domain Mtree and integrate it with Data Protection Central.

C.

You must store data it in a PowerProtect Data Domain MTree within the production environment and replicate to a vault.

D.

You must store data in a PowerProtect Data Domain MTree within the vault environment and replicate it to a production.

Question 4

Which describes the best use of Dell PowerProtect Data Domain in an isolated clean room?

Options:

A.

Stand by for production Data Domain

B.

To extend recoverability of the immutable copies for up to 45 days

C.

long running analyze jobs from vault Data Domain

D.

Target for alternate recovery

Question 5

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

Options:

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

Question 6

What should be the consideration for scratch storage when sizing a CyberSense server?

Options:

A.

Scratch storage space is the size of the largest VM

B.

Scratch storage space is the sumsize of all VMs

C.

Scratch storage space is two times the size of the largest VM

D.

Scratch storage space is half the size of the largest VM

Question 7

What is used to confirm the CyberSense Server is ready for software install?

Options:

A.

InspectEngine.sh script

B.

CheckEngine.sh script

C.

CheckCyberSense.sh script

D.

CyberSense.sh script

Question 8

DRAG DROP

Put the following steps in the correct order to back up the Index Engines CyberSense configuration files:

Options:

Question 9

What component orchestrates synchronization, locking, and recovery operations in the vault environment?

Options:

A.

Dell PowerProtect Cyber Recovery Software

B.

CyberSense Analytics Engine

C.

Vault Retention Policy Manager

D.

Dell PowerProtect Data Manager

Question 10

What are the two types of alerts in the CyberSense Alerts dashboard? (Choose two.)

Options:

A.

Virus Detected

B.

Threshold exceeded

C.

Timed out

D.

Infection Found

Question 11

Which two options correctly describe how you can connect from the vault to another environment? (Choose two.)

Options:

A.

Connect by a Telnet Client to the PowerProtect Cyber Recovery vault

B.

Connect by a replication data link between the vault-environment and production environment Dell PowerProtect Data Domain systems

C.

Connect by a SSH Client to the PowerProtect Cyber Recovery vault

D.

Connect by an optional dedicated link from the Cyber Recovery management host in the Dell PowerProtect Cyber Recovery vault to the production network operations center

Page: 1 / 3
Total 38 questions