Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > Data Protection > D-PCR-DY-01

D-PCR-DY-01 Dell PowerProtect Cyber Recovery Deploy v2 Exam Question and Answers

Question # 4

What does Dell Technologies recommend before defining Dell PowerProtect Cyber Recovery policies?

A.

Perform an initial replication between the production and vault systems for each replication context

B.

Enable high availability (HA) on the Dell PowerProtect Data Domain system

C.

Lock the PowerProtect Cyber Recovery vault manually before initiating a Sync operation

D.

Configure two floating IP addresses for PowerProtect Data Domain management and replication

Full Access
Question # 5

Which two server configurations are valid for the CyberSense virtual appliance? (Choose two.)

A.

Small - 16 CPU, 128 GB Memory

B.

X-Large - 48 CPU, 512 GB Memory

C.

Large - 32 CPU, 384 GB Memory

D.

Medium - 20 CPU, 192 GB Memory

Full Access
Question # 6

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

A.

Software Instance ID

B.

PowerProtect Data Domain Virtual Edition serial number

C.

Node Locking ID

D.

Software Serial ID

Full Access
Question # 7

What should be the consideration for scratch storage when sizing a CyberSense server?

A.

Scratch storage space is the size of the largest VM

B.

Scratch storage space is the sumsize of all VMs

C.

Scratch storage space is two times the size of the largest VM

D.

Scratch storage space is half the size of the largest VM

Full Access
Question # 8

Which two options correctly describe how you can connect from the vault to another environment? (Choose two.)

A.

Connect by a Telnet Client to the PowerProtect Cyber Recovery vault

B.

Connect by a replication data link between the vault-environment and production environment Dell PowerProtect Data Domain systems

C.

Connect by a SSH Client to the PowerProtect Cyber Recovery vault

D.

Connect by an optional dedicated link from the Cyber Recovery management host in the Dell PowerProtect Cyber Recovery vault to the production network operations center

Full Access
Question # 9

What component orchestrates synchronization, locking, and recovery operations in the vault environment?

A.

Dell PowerProtect Cyber Recovery Software

B.

CyberSense Analytics Engine

C.

Vault Retention Policy Manager

D.

Dell PowerProtect Data Manager

Full Access
Question # 10

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

Full Access
Question # 11

Which CPU/memory requirements are needed to deploy CyberSense virtual appliance with large configuration?

A.

25 vCPU/ 192 GB RAM

B.

32 vCPU/ 384 GB RAM

C.

32 vCPU/ 364 GB RAM

D.

20 vCPU/ 192 GB RAM

Full Access