Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the EMC Data Protection D-PCR-DY-01 Questions and answers with ValidTests

Exam D-PCR-DY-01 All Questions
Exam D-PCR-DY-01 Premium Access

View all detail and faqs for the D-PCR-DY-01 exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

If you are deploying CyberSense on an i3en.12xlarge instance, which statement best describe the key feature of using this AWS instance type?

Options:

A.

It optimized for compute-intensive workloads with high CPU performance.

B.

It provides large SAS storage optimized for maximum capacity.

C.

It can process many disk images and a large amount of data with CyberSense.

D.

It offers high memory capacity for large-scale database applications.

E.

It provides cost-effective general-purpose computing with balanced resources.

Expert Solution
Questions # 12:

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

Options:

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

Expert Solution
Questions # 13:

What is a pre-requisite for performing Automated Recovery of Dell PowerProtect Data Manager?

Options:

A.

vCenter hosting PowerProtect Data Manager is added to Dell PowerProtect Cyber Recovery.

B.

Manual Snapshot of PowerProtect Data Manager on vCenter.

C.

Create the DDBoost users on the PowerProtect Data Manager.

D.

Keep the same password on Vault PowerProtect Data Manager as production PowerProtect Data Manager.

Expert Solution
Questions # 14:

What is the maximum number of PowerProtect Data Domains supported by Dell PowerProtect Cyber Recovery?

Options:

A.

4

B.

2

C.

10

D.

5

Expert Solution
Questions # 15:

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

Options:

A.

Software Instance ID

B.

PowerProtect Data Domain Virtual Edition serial number

C.

Node Locking ID

D.

Software Serial ID

Expert Solution
Questions # 16:

A Dell PowerProtect Cyber Recovery administrator has noticed multiple file corruption events and suspects some potential harmful situations in their environment.

Which error log level can be used to analyze the situation?

Options:

A.

DEBUG

B.

INFO

C.

ERROR

D.

WARNING

Expert Solution
Questions # 17:

Which feature of the Dell PowerProtect Cyber Recovery in collaboration with VMware ESXi 8.0 environment offers the capacity of 220 TB?

Options:

A.

ESX hypervisor with customized settings

B.

Dell PowerEdge hardware with all-flash media on a supported Hyper-V

C.

KVM with hybrid media built on Dell hardware

D.

Dell PowerEdge hardware with all-flash media

Expert Solution
Questions # 18:

Which statement is true regards to storing backups?

Options:

A.

Storing backups online is not ideal to meet strict RTO, but it protects data loss from cyberattacks.

B.

Storing backups online is ideal to meet strict Recovery Time Objectives (RTO), and it provides ideal protection against cyberattacks.

C.

Storing backups in an isolated environment is not ideal for meeting strict RTO, but it protects against data loss from cyberattacks.

D.

Storing backups is an isolated environment is ideal to meet strict RTO, and it provides ideal protection against cyberattacks.

Expert Solution
Questions # 19:

What is used to confirm the CyberSense Server is ready for software install?

Options:

A.

InspectEngine.sh script

B.

CheckEngine.sh script

C.

CheckCyberSense.sh script

D.

CyberSense.sh script

Expert Solution
Questions # 20:

Which CPU/memory requirements are needed to deploy CyberSense virtual appliance with large configuration?

Options:

A.

25 vCPU/ 192 GB RAM

B.

32 vCPU/ 384 GB RAM

C.

32 vCPU/ 364 GB RAM

D.

20 vCPU/ 192 GB RAM

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions