Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.

Prévia do material em texto

Download Valid D-PCR-DY-01 Exam Dumps For Best Preparation
1 / 3
Exam : D-PCR-DY-01
Title :
https://www.passcert.com/D-PCR-DY-01.html
Dell PowerProtect Cyber
Recovery Deploy v2 Exam
Download Valid D-PCR-DY-01 Exam Dumps For Best Preparation
2 / 3
1.An IT manager needs to rerun a previously generated Dell PowerProtect Cyber Recovery report to
verify the job activities for a specific period. They want to ensure that report includes the latest data.
What action should the IT manager take to rerun the report?
A. Generate a new report using the Report Wizard
B. Edit the report schedule
C. Select 'Run Now* in the Generated Reports pane
D. Clone the report schedule
Answer: A
Explanation:
To ensure the report includes the latest data, the IT manager should generate a new report using the
Report Wizard, which reruns the report query and produces an updated output.
2.What does Dell Technologies recommend before defining Dell PowerProtect Cyber Recovery policies?
A. Perform an initial replication between the production and vault systems for each replication context
B. Enable high availability (HA) on the Dell PowerProtect Data Domain system
C. Lock the PowerProtect Cyber Recovery vault manually before initiating a Sync operation
D. Configure two floating IP addresses for PowerProtect Data Domain management and replication
Answer: A
Explanation:
Dell Technologies recommends performing an initial replication between the production and vault systems
for each replication context before defining Cyber Recovery policies to ensure data consistency and
establish a baseline for ongoing replication and protection.
3.Which CPU/memory requirements are needed to deploy CyberSense virtual appliance with large
configuration?
A. 25 vCPU/ 192 GB RAM
B. 32 vCPU/ 384 GB RAM
C. 32 vCPU/ 364 GB RAM
D. 20 vCPU/ 192 GB RAM
Answer: B
Explanation:
Deploying the CyberSense virtual appliance with a large configuration requires 32 vCPU and 384 GB of
RAM to handle the processing and memory demands efficiently.
4.Which describes the best use of Dell PowerProtect Data Domain in an isolated clean room?
A. Stand by for production Data Domain
B. To extend recoverability of the immutable copies for up to 45 days
C. long running analyze jobs from vault Data Domain
D. Target for alternate recovery
Answer: D
Explanation:
Using Dell PowerProtect Data Domain in an isolated clean room serves as a secure target for alternate
recovery, providing a protected environment to restore data if the primary vault is compromised.
Download Valid D-PCR-DY-01 Exam Dumps For Best Preparation
3 / 3
5.What is the minimum configuration required to deploy the Dell PowerProtect Cyber Recovery OVA in a
VMware ESXi environment?
A. VMware vCenter or ESXi, Version 7.0 and 8.0, 1 Disks, 2 CPUs, 8GB Memory
B. VMware vCenter or ESXi, Version 7.0 and 8.0, 6 Disks, 4 CPUs, 4GB Memory
C. VMware vCenter or ESXi, Version 7.0 and 8.0, 2 Disks, 2 CPUs, 16GB Memory
D. VMware vCenter or ESXi, Version 7.0 and 8.0, 3 Disks, 4 CPUs, 8GB Memory
Answer: D
Explanation:
The minimum configuration to deploy the Dell PowerProtect Cyber Recovery OVA on VMware ESXi
includes vCenter or ESXi version 7.0 or 8.0, with 3 disks, 4 CPUs, and 8 GB of memory to meet
performance and storage requirements.
6.What is a pre-requisite for performing Automated Recovery of Dell PowerProtect Data Manager?
A. vCenter hosting PowerProtect Data Manager is added to Dell PowerProtect Cyber Recovery.
B. Manual Snapshot of PowerProtect Data Manager on vCenter.
C. Create the DDBoost users on the PowerProtect Data Manager.
D. Keep the same password on Vault PowerProtect Data Manager as production PowerProtect Data
Manager.
Answer: A
Explanation:
vCenter hosting PowerProtect Data Manager must be added to Dell PowerProtect Cyber Recovery to
enable automated recovery processes. This integration allows Cyber Recovery to manage and automate
the recovery workflows directly through the virtual infrastructure.
7.Which common cyber-attack overwhelms the resources of the system with excessive requests that
consume all the resources to bring it down?
A. Ad ware
B. Unauthorized Currency Mining
C. Banking Trojan
D. Ransomware
E. Denial of Service
Answer: E
Explanation:
A Denial of Service (DoS) attack overwhelms system resources by flooding it with excessive requests,
exhausting capacity and causing service disruption.
8.What are the two types of alerts in the CyberSense Alerts dashboard? (Choose two.)
A. Virus Detected
B. Threshold exceeded
C. Timed out
D. Infection Found
Answer: B C

Mais conteúdos dessa disciplina