Pass the EMC Data Protection D-PCR-DY-01 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Dell PowerProtect Cyber Recovery administrator has noticed multiple file corruption events and suspects some potential harmful situations in their environment.

Which error log level can be used to analyze the situation?

Options:

A.

DEBUG


B.

INFO


C.

ERROR


D.

WARNING


Expert Solution
Questions # 2:

You have multiple Dell PowerProtect Data Domain integrated with a Dell PowerProtect Cyber Recovery host. Connection is lost to one of the Data Domains.

Which two methods would a Cyber Recovery administrator use to find out about it? (Choose two.)

Options:

A.

An alert notification will be sent out to the admin stating, 'Vault status is Unknown'.


B.

Alert 2035 will be generated stating 'An error was detected while attempting to communicate with the DD system'.


C.

In the Cyber Recovery GUI, the vault status will be changed to 'Unknown'.


D.

In the Cyber Recovery GUI, the vault status will be changed to 'Degraded'.


Expert Solution
Questions # 3:

To protect the production data with Dell PowerProtect Cyber Recovery, which statement describes a correct requirement when planning a vault environment?

Options:

A.

You must store data it in a PowerProtect Data Domain Mtree and integrate with PowerProtect Direct Agent.


B.

You must store data in a PowerProtect Data Domain Mtree and integrate it with Data Protection Central.


C.

You must store data it in a PowerProtect Data Domain MTree within the production environment and replicate to a vault.


D.

You must store data in a PowerProtect Data Domain MTree within the vault environment and replicate it to a production.


Expert Solution
Questions # 4:

Which feature of the Dell PowerProtect Cyber Recovery in collaboration with VMware ESXi 8.0 environment offers the capacity of 220 TB?

Options:

A.

ESX hypervisor with customized settings


B.

Dell PowerEdge hardware with all-flash media on a supported Hyper-V


C.

KVM with hybrid media built on Dell hardware


D.

Dell PowerEdge hardware with all-flash media


Expert Solution
Questions # 5:

A customer deploying Dell PowerProtect Cyber Recovery software on Microsoft Azure.

Which two components does the ARM template create? (Choose two.)

Options:

A.

Gateway


B.

VNet Endpoint


C.

Security Group


D.

VPN


Expert Solution
Questions # 6:

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

Options:

A.

Software Instance ID


B.

PowerProtect Data Domain Virtual Edition serial number


C.

Node Locking ID


D.

Software Serial ID


Expert Solution
Questions # 7:

What are the two types of alerts in the CyberSense Alerts dashboard? (Choose two.)

Options:

A.

Virus Detected


B.

Threshold exceeded


C.

Timed out


D.

Infection Found


Expert Solution
Questions # 8:

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

Options:

A.

Disable HTTP access to all PowerProtect Data Domain network ports


B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host


C.

Disable port 2051 on all PowerProtect Data Domain network ports


D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain


Expert Solution
Questions # 9:

Which three checks are included in the upgrade precheck crsetup.sh –upgcheck command? (Choose three.)

Options:

A.

The crso user credentials are correct.


B.

There is a minimum of 2 GB of free space.


C.

Dell PowerProtect Cyber Recover/ registryservice must have a runningstatus.


D.

No jobs are running in the production environment.


E.

There is compatibility with upgrades from the current version.


Expert Solution
Questions # 10:

What is used to confirm the CyberSense Server is ready for software install?

Options:

A.

InspectEngine.sh script


B.

CheckEngine.sh script


C.

CheckCyberSense.sh script


D.

CyberSense.sh script


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions