Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

EMC D-PCR-DY-01 Dumps

Page: 1 / 4
Total 38 questions

Dell PowerProtect Cyber Recovery Deploy v2 Exam Questions and Answers

Question 1

Which three statements are true when performing a Dell Avamar Automated Recovery? (Choose three.)

Options:

A.

Run lockbox_restore.pl script to recover MCUser and GSAN accounts.

B.

Vault PowerProtect Data Domain Storage ID in Dell PowerProtect Cyber Recovery must be known to obtain the latest checkpoint.

C.

Avamar System ID must be known for Avamar checkpoint restore.

D.

Avamar version, build, and FQDN must match the production.

E.

DDBoost username, role, and password on Vault Data Domain must match the production.

Question 2

What is the minimum configuration required to deploy the Dell PowerProtect Cyber Recovery OVA in a VMware ESXi environment?

Options:

A.

VMware vCenter or ESXi, Version 7.0 and 8.0, 1 Disks, 2 CPUs, 8GB Memory

B.

VMware vCenter or ESXi, Version 7.0 and 8.0, 6 Disks, 4 CPUs, 4GB Memory

C.

VMware vCenter or ESXi, Version 7.0 and 8.0, 2 Disks, 2 CPUs, 16GB Memory

D.

VMware vCenter or ESXi, Version 7.0 and 8.0, 3 Disks, 4 CPUs, 8GB Memory

Question 3

What is the primary benefit of using Dell APEX Protection Storage All Flash for Cyber Recovery?

Options:

A.

Lower initial cost

B.

Increased storage capacity

C.

Compatibility with all hypervisors

D.

Faster read and restore times

Question 4

Which statement is true regards to storing backups?

Options:

A.

Storing backups online is not ideal to meet strict RTO, but it protects data loss from cyberattacks.

B.

Storing backups online is ideal to meet strict Recovery Time Objectives (RTO), and it provides ideal protection against cyberattacks.

C.

Storing backups in an isolated environment is not ideal for meeting strict RTO, but it protects against data loss from cyberattacks.

D.

Storing backups is an isolated environment is ideal to meet strict RTO, and it provides ideal protection against cyberattacks.

Question 5

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

Options:

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

Question 6

Which Dell PowerProtect Cyber Recovery feature provides the turnkey data vaulting solution?

Options:

A.

Remediation

B.

Air Gap

C.

Sheltered Harbor

D.

Data Isolation

Question 7

If you are deploying CyberSense on an i3en.12xlarge instance, which statement best describe the key feature of using this AWS instance type?

Options:

A.

It optimized for compute-intensive workloads with high CPU performance.

B.

It provides large SAS storage optimized for maximum capacity.

C.

It can process many disk images and a large amount of data with CyberSense.

D.

It offers high memory capacity for large-scale database applications.

E.

It provides cost-effective general-purpose computing with balanced resources.

Question 8

What is the maximum number of PowerProtect Data Domains supported by Dell PowerProtect Cyber Recovery?

Options:

A.

4

B.

2

C.

10

D.

5

Question 9

Before starting a Dell NetWorker recovery, the administrator needs to verify that the DDBoost user is correctly configured in both the production and Dell PowerProtect Cyber Recovery environments.

What must be confirmed about the DDBoost user to ensure a successful Dell NetWorker recovery?

Options:

A.

The DDBoost user is different in the vault and production environments.

B.

The DDBoost user is configured with read-only access.

C.

The DDBoost user has administrative privileges.

D.

The DDBoost user is the same UID in both the vault and production environments.

Question 10

What is a key technological limitation that warrants the use of an air-gapped vault in dell PowerProtect Cyber Recovery?

Options:

A.

The inability of firewalls to detect ransomware payloads in real time

B.

The incompatibility of traditional backup systems with modern applications

C.

The extra cost of maintaining physical separation between systems

D.

The vulnerability of online backup copies to unauthorized modifications

Question 11

What are the two types of alerts in the CyberSense Alerts dashboard? (Choose two.)

Options:

A.

Virus Detected

B.

Threshold exceeded

C.

Timed out

D.

Infection Found

Page: 1 / 4
Total 38 questions