Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

EMC D-PCR-DY-01 Dell PowerProtect Cyber Recovery Deploy v2 Exam Exam Practice Test

Page: 1 / 4
Total 38 questions

Dell PowerProtect Cyber Recovery Deploy v2 Exam Questions and Answers

Question 1

You execute the crsetup.sh --check command to upgrade the Dell PowerProtect Cyber Recovery software using the precheck option.

What is the first check that the update precheck performs?

Options:

A.

Recovery operating system size requirements

B.

Running status of the Cyber Recovery registry service

C.

Compatibility with the installed version on your system

Question 2

What does Dell Technologies recommend before defining Dell PowerProtect Cyber Recovery policies?

Options:

A.

Perform an initial replication between the production and vault systems for each replication context

B.

Enable high availability (HA) on the Dell PowerProtect Data Domain system

C.

Lock the PowerProtect Cyber Recovery vault manually before initiating a Sync operation

D.

Configure two floating IP addresses for PowerProtect Data Domain management and replication

Question 3

Which application object is required in the Dell PowerProtect Cyber Recovery vault to perform data analysis for malware or anomalies?

Options:

A.

Dell Avamar

B.

Dell PowerProtect Data Manager

C.

Dell NetWorker

D.

CyberSense

Question 4

Which common cyber-attack overwhelms the resources of the system with excessive requests that consume all the resources to bring it down?

Options:

A.

Ad ware

B.

Unauthorized Currency Mining

C.

Banking Trojan

D.

Ransomware

E.

Denial of Service

Question 5

Which describes the best use of Dell PowerProtect Data Domain in an isolated clean room?

Options:

A.

Stand by for production Data Domain

B.

To extend recoverability of the immutable copies for up to 45 days

C.

long running analyze jobs from vault Data Domain

D.

Target for alternate recovery

Question 6

An IT manager needs to rerun a previously generated Dell PowerProtect Cyber Recovery report to verify the job activities for a specific period. They want to ensure that report includes the latest data.

What action should the IT manager take to rerun the report?

Options:

A.

Generate a new report using the Report Wizard

B.

Edit the report schedule

C.

Select 'Run Now* in the Generated Reports pane

D.

Clone the report schedule

Question 7

After successfully completing the PoC for the Dell PowerProtect Cyber Recovery solution with Dell APEX Protection Storage All-Flash, the customer decided to purchase a license for the further use in the production environment.

Which information is required to generate the License Authorization Code (LAC) for the Dell APEX Protection Storage instance?

Options:

A.

Software Instance ID

B.

PowerProtect Data Domain Virtual Edition serial number

C.

Node Locking ID

D.

Software Serial ID

Question 8

A Dell PowerProtect Cyber Recovery administrator has noticed multiple file corruption events and suspects some potential harmful situations in their environment.

Which error log level can be used to analyze the situation?

Options:

A.

DEBUG

B.

INFO

C.

ERROR

D.

WARNING

Question 9

You have multiple Dell PowerProtect Data Domain integrated with a Dell PowerProtect Cyber Recovery host. Connection is lost to one of the Data Domains.

Which two methods would a Cyber Recovery administrator use to find out about it? (Choose two.)

Options:

A.

An alert notification will be sent out to the admin stating, 'Vault status is Unknown'.

B.

Alert 2035 will be generated stating 'An error was detected while attempting to communicate with the DD system'.

C.

In the Cyber Recovery GUI, the vault status will be changed to 'Unknown'.

D.

In the Cyber Recovery GUI, the vault status will be changed to 'Degraded'.

Question 10

What is the primary benefit of using Dell APEX Protection Storage All Flash for Cyber Recovery?

Options:

A.

Lower initial cost

B.

Increased storage capacity

C.

Compatibility with all hypervisors

D.

Faster read and restore times

Question 11

The administrator needs to download the Analysis Report to validate some suspicious files.

Which application can the administrator use to perform the Analysis Report download?

Options:

A.

CyberSense Alerts Dashboard

B.

Dell PowerProtect Cyber Recovery UI

C.

CyberSense Reports Dashboard

D.

Dell PowerProtect Data Domain UI

Page: 1 / 4
Total 38 questions