Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC D-PCR-DY-01 - Dell PowerProtect Cyber Recovery Deploy v2 Exam

Page: 1 / 2
Total 38 questions

Which three statements are true when performing a Dell Avamar Automated Recovery? (Choose three.)

A.

Run lockbox_restore.pl script to recover MCUser and GSAN accounts.

B.

Vault PowerProtect Data Domain Storage ID in Dell PowerProtect Cyber Recovery must be known to obtain the latest checkpoint.

C.

Avamar System ID must be known for Avamar checkpoint restore.

D.

Avamar version, build, and FQDN must match the production.

E.

DDBoost username, role, and password on Vault Data Domain must match the production.

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

A.

Software Instance ID

B.

PowerProtect Data Domain Virtual Edition serial number

C.

Node Locking ID

D.

Software Serial ID

An IT manager needs to rerun a previously generated Dell PowerProtect Cyber Recovery report to verify the job activities for a specific period. They want to ensure that report includes the latest data.

What action should the IT manager take to rerun the report?

A.

Generate a new report using the Report Wizard

B.

Edit the report schedule

C.

Select 'Run Now* in the Generated Reports pane

D.

Clone the report schedule

What is the purpose of the command crsetup. sh --install in the context of Dell PowerProtect Cyber Recovery software?

A.

Start the PowerProtect Cyber Recovery software

B.

Configure the software on the Cyber Recovery OVA

C.

Configure the software on the PowerProtect Cyber Recovery management host

D.

Force re-creation of the PowerProtect Cyber Recovery containers

DRAG DROP

Put the following steps in the correct order to back up the Index Engines CyberSense configuration files:

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

What is a pre-requisite for performing Automated Recovery of Dell PowerProtect Data Manager?

A.

vCenter hosting PowerProtect Data Manager is added to Dell PowerProtect Cyber Recovery.

B.

Manual Snapshot of PowerProtect Data Manager on vCenter.

C.

Create the DDBoost users on the PowerProtect Data Manager.

D.

Keep the same password on Vault PowerProtect Data Manager as production PowerProtect Data Manager.

What is the minimum configuration required to deploy the Dell PowerProtect Cyber Recovery OVA in a VMware ESXi environment?

A.

VMware vCenter or ESXi, Version 7.0 and 8.0, 1 Disks, 2 CPUs, 8GB Memory

B.

VMware vCenter or ESXi, Version 7.0 and 8.0, 6 Disks, 4 CPUs, 4GB Memory

C.

VMware vCenter or ESXi, Version 7.0 and 8.0, 2 Disks, 2 CPUs, 16GB Memory

D.

VMware vCenter or ESXi, Version 7.0 and 8.0, 3 Disks, 4 CPUs, 8GB Memory

Which three checks are included in the upgrade precheck crsetup.sh –upgcheck command? (Choose three.)

A.

The crso user credentials are correct.

B.

There is a minimum of 2 GB of free space.

C.

Dell PowerProtect Cyber Recover/ registryservice must have a runningstatus.

D.

No jobs are running in the production environment.

E.

There is compatibility with upgrades from the current version.

What is the maximum number of PowerProtect Data Domains supported by Dell PowerProtect Cyber Recovery?

A.

4

B.

2

C.

10

D.

5