Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt E20-375 Questions

Page: 3 / 8
Total 200 questions

RecoverPoint Specialist Exam for Implementation Engineers Questions and Answers

Question 9

A VMware user is currently protecting their virtual application servers with RecoverPoint. All data is stored on two VNX arrays. They will soon be adding Site Recovery Manager (SRM) to their VMware infrastructure.

What will be needed to integrate RecoverPoint functionality into their SRM deployment?

Options:

A.

EMC Storage Replication Adapter (SRA) for RecoverPoint only

B.

EMC Virtual Storage Integrator (VSI)

C.

EMC Storage Replication Adapters (SRAs) for VNX and RecoverPoint

D.

vSphere SRM Plug-in for Unisphere for RecoverPoint

Question 10

For a RecoverPoint system with multiple clusters, how many gatekeepers are needed for each VMAX splitter/RecoverPoint-cluster combination?

Options:

A.

2

B.

8

C.

4

D.

16

Question 11

A company is currently using RecoverPoint/CL with CLARiiON CXs in their environment. All of the data has been migrated to new VNXs and the CX splitters need to be removed from RecoverPoint.

How is this accomplished?

Options:

A.

In Unisphere for RecoverPoint, navigate to RPA Clusters > RPA-Cluster-Name tab > Splitters and remove the CX splitters

B.

In Unisphere for RecoverPoint, navigate to RPA Clusters > Splitters and remove the CX splitters

C.

Use RecoverPoint Deployment Manager to remove the CX splitters

D.

The CXs will not be detected by Unisphere and the splitter entries will be removed automatically

Question 12

An application team will be performing a major update to a RecoverPoint protected application. You have been asked by the application team for the best way to ensure a quick recovery at the remote cluster in case the update fails.

In RecoverPoint, what should be done to the associated Consistency Group?

Options:

A.

Manually create a bookmark prior to the update

B.

Enable logged access mode on the source

C.

Enable physical access on the target

D.

Use virtual access mode on the source

Page: 3 / 8
Total 200 questions