Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

EMC D-PCR-DY-01 Dell PowerProtect Cyber Recovery Deploy v2 Exam Exam Practice Test

Page: 1 / 4
Total 38 questions

Dell PowerProtect Cyber Recovery Deploy v2 Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

DRAG DROP

When you install a vCenter Server in an on-premises Dell PowerProtect Cyber Recovery vault, you must register it with the PowerProtect Cyber Recovery software. Arrange the necessary steps in chronological order.

Options:

Question 2

DRAG DROP

Put the following steps in the correct order to back up the Index Engines CyberSense configuration files:

Options:

Question 3

Which is the best practice when securing PowerProtect Data Domain in Dell PowerProtect Cyber Recovery vault?

Options:

A.

Disable HTTP access to all PowerProtect Data Domain network ports

B.

Disable SSH access to all Dell PowerProtect Data Domain network ports except from help desk jump host

C.

Disable port 2051 on all PowerProtect Data Domain network ports

D.

Disable ports 80, 443, and 2049 on the PowerProtect Data Domain

Question 4

You execute the crsetup.sh --check command to upgrade the Dell PowerProtect Cyber Recovery software using the precheck option.

What is the first check that the update precheck performs?

Options:

A.

Recovery operating system size requirements

B.

Running status of the Cyber Recovery registry service

C.

Compatibility with the installed version on your system

Question 5

A customer deploying Dell PowerProtect Cyber Recovery software on Microsoft Azure.

Which two components does the ARM template create? (Choose two.)

Options:

A.

Gateway

B.

VNet Endpoint

C.

Security Group

D.

VPN

Question 6

What is used to confirm the CyberSense Server is ready for software install?

Options:

A.

InspectEngine.sh script

B.

CheckEngine.sh script

C.

CheckCyberSense.sh script

D.

CyberSense.sh script

Question 7

An IT manager needs to rerun a previously generated Dell PowerProtect Cyber Recovery report to verify the job activities for a specific period. They want to ensure that report includes the latest data.

What action should the IT manager take to rerun the report?

Options:

A.

Generate a new report using the Report Wizard

B.

Edit the report schedule

C.

Select 'Run Now* in the Generated Reports pane

D.

Clone the report schedule

Question 8

Which common cyber-attack overwhelms the resources of the system with excessive requests that consume all the resources to bring it down?

Options:

A.

Ad ware

B.

Unauthorized Currency Mining

C.

Banking Trojan

D.

Ransomware

E.

Denial of Service

Question 9

What does Dell Technologies recommend before defining Dell PowerProtect Cyber Recovery policies?

Options:

A.

Perform an initial replication between the production and vault systems for each replication context

B.

Enable high availability (HA) on the Dell PowerProtect Data Domain system

C.

Lock the PowerProtect Cyber Recovery vault manually before initiating a Sync operation

D.

Configure two floating IP addresses for PowerProtect Data Domain management and replication

Question 10

What are the two types of alerts in the CyberSense Alerts dashboard? (Choose two.)

Options:

A.

Virus Detected

B.

Threshold exceeded

C.

Timed out

D.

Infection Found

Question 11

What is a key technological limitation that warrants the use of an air-gapped vault in dell PowerProtect Cyber Recovery?

Options:

A.

The inability of firewalls to detect ransomware payloads in real time

B.

The incompatibility of traditional backup systems with modern applications

C.

The extra cost of maintaining physical separation between systems

D.

The vulnerability of online backup copies to unauthorized modifications

Page: 1 / 4
Total 38 questions