Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

EMC DEP-3CR1 - PowerProtect Cyber Recovery Exam

Page: 1 / 2
Total 54 questions

An administrator wants to create a read/write copy of the replicated data in the CR Vault.

Which task will accomplish the requirement?

A.

Synchronization

B.

Sandbox

C.

Copy

D.

Secure Copy

A Cyber Recovery Administrator encounters a PowerProtect DD system that is offline and unavailable in the CR system.

What are the steps to remove this asset?

A.

From the CLI, look for the asset's UID, and run the command: crcli apps delete --uid

B.

From the Cyber Recovery UI, select Asset, select the unavailable tab, then delete

C.

From the CLI, look for the asset's nickname, and run the command: crcli dd delete –nickname

D.

From the Cyber Recovery UI, select the asset checkbox, then delete

What are the possible connection states of the CR Vault?

A.

Acked, Unlocked, Unknown, Secured, and Downgraded

B.

Open, Locked, Secured, Promoted, and Unknown

C.

Degraded, Down, Up, Running, and Maintenance

D.

Locked, Unlocked, Unknown, Secured, and Degraded

What is the purpose of Denial of Service attacks?

A.

launch the attack from many other host machines

B.

bring down a system to initiate another attack

C.

encrypt the data for ransom

D.

affect the system by a business competitor

Which are valid components of a Cyber Recovery policy?

A.

Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization, copy, and lock

B.

Objects like PowerStore and Backup software applications. Jobs such as synchronization, copy, and lock

C.

Objects like PowerProtect DD and Backup software applications. Jobs such as backup, restore, and cleaning

D.

Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization, copy, and governance

What is the correct sequence to install Cyber Recovery software on a physical host?

How many PIT copies can a sandbox contain?

A.

10

B.

1

C.

2

D.

5

Which feature can enable additional cyber resiliency measures to the Cyber recovery ecosystem?

A.

Cloud tier

B.

Retention Lock

C.

DD Boost

D.

Replication

A customer plans to have 1 policy which replicates data into the vault daily and takes a PIT copy, which is kept for 7 days and retention locked. The customer also plans to have one copy for the sandbox

environment to use for testing.

How many MTrees exist on the PowerProtect DD in the Vault?

A.

8

B.

4

C.

1

D.

3

Which appliance is supported as the replication target in the CR Vault?

A.

DP4400

B.

DP5300

C.

DP8300

D.

DP8800