Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium EMC D-PCR-DY-01 Dumps Questions Answers

Page: 1 / 3
Total 38 questions

Dell PowerProtect Cyber Recovery Deploy v2 Exam Questions and Answers

Question 1

Which two options correctly describe how you can connect from the vault to another environment? (Choose two.)

Options:

A.

Connect by a Telnet Client to the PowerProtect Cyber Recovery vault

B.

Connect by a replication data link between the vault-environment and production environment Dell PowerProtect Data Domain systems

C.

Connect by a SSH Client to the PowerProtect Cyber Recovery vault

D.

Connect by an optional dedicated link from the Cyber Recovery management host in the Dell PowerProtect Cyber Recovery vault to the production network operations center

Buy Now
Question 2

What is the purpose of the command crsetup. sh --install in the context of Dell PowerProtect Cyber Recovery software?

Options:

A.

Start the PowerProtect Cyber Recovery software

B.

Configure the software on the Cyber Recovery OVA

C.

Configure the software on the PowerProtect Cyber Recovery management host

D.

Force re-creation of the PowerProtect Cyber Recovery containers

Question 3

What should be the consideration for scratch storage when sizing a CyberSense server?

Options:

A.

Scratch storage space is the size of the largest VM

B.

Scratch storage space is the sumsize of all VMs

C.

Scratch storage space is two times the size of the largest VM

D.

Scratch storage space is half the size of the largest VM

Question 4

What is the minimum configuration required to deploy the Dell PowerProtect Cyber Recovery OVA in a VMware ESXi environment?

Options:

A.

VMware vCenter or ESXi, Version 7.0 and 8.0, 1 Disks, 2 CPUs, 8GB Memory

B.

VMware vCenter or ESXi, Version 7.0 and 8.0, 6 Disks, 4 CPUs, 4GB Memory

C.

VMware vCenter or ESXi, Version 7.0 and 8.0, 2 Disks, 2 CPUs, 16GB Memory

D.

VMware vCenter or ESXi, Version 7.0 and 8.0, 3 Disks, 4 CPUs, 8GB Memory

Question 5

Which application object is required in the Dell PowerProtect Cyber Recovery vault to perform data analysis for malware or anomalies?

Options:

A.

Dell Avamar

B.

Dell PowerProtect Data Manager

C.

Dell NetWorker

D.

CyberSense

Question 6

Which three statements are true when performing a Dell Avamar Automated Recovery? (Choose three.)

Options:

A.

Run lockbox_restore.pl script to recover MCUser and GSAN accounts.

B.

Vault PowerProtect Data Domain Storage ID in Dell PowerProtect Cyber Recovery must be known to obtain the latest checkpoint.

C.

Avamar System ID must be known for Avamar checkpoint restore.

D.

Avamar version, build, and FQDN must match the production.

E.

DDBoost username, role, and password on Vault Data Domain must match the production.

Question 7

What component orchestrates synchronization, locking, and recovery operations in the vault environment?

Options:

A.

Dell PowerProtect Cyber Recovery Software

B.

CyberSense Analytics Engine

C.

Vault Retention Policy Manager

D.

Dell PowerProtect Data Manager

Question 8

A customer has the requirement to scan 6.5TB per hour with CyberSense.

What network bandwidth is necessary to fulfill the requirement?

Options:

A.

25G network

B.

10G network

C.

40G network

D.

100G network

Question 9

If you are deploying CyberSense on an i3en.12xlarge instance, which statement best describe the key feature of using this AWS instance type?

Options:

A.

It optimized for compute-intensive workloads with high CPU performance.

B.

It provides large SAS storage optimized for maximum capacity.

C.

It can process many disk images and a large amount of data with CyberSense.

D.

It offers high memory capacity for large-scale database applications.

E.

It provides cost-effective general-purpose computing with balanced resources.

Question 10

What is the primary benefit of using Dell APEX Protection Storage All Flash for Cyber Recovery?

Options:

A.

Lower initial cost

B.

Increased storage capacity

C.

Compatibility with all hypervisors

D.

Faster read and restore times

Question 11

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

Options:

A.

Software Instance ID

B.

PowerProtect Data Domain Virtual Edition serial number

C.

Node Locking ID

D.

Software Serial ID

Page: 1 / 3
Total 38 questions