Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

D-PCR-DY-01 Questions and Answers

Question # 6

What is the maximum number of PowerProtect Data Domains supported by Dell PowerProtect Cyber Recovery?

A.

4

B.

2

C.

10

D.

5

Full Access
Question # 7

The administrator needs to download the Analysis Report to validate some suspicious files.

Which application can the administrator use to perform the Analysis Report download?

A.

CyberSense Alerts Dashboard

B.

Dell PowerProtect Cyber Recovery UI

C.

CyberSense Reports Dashboard

D.

Dell PowerProtect Data Domain UI

Full Access
Question # 8

What is the primary benefit of using Dell APEX Protection Storage All Flash for Cyber Recovery?

A.

Lower initial cost

B.

Increased storage capacity

C.

Compatibility with all hypervisors

D.

Faster read and restore times

Full Access
Question # 9

A customer deploying Dell PowerProtect Cyber Recovery software on Microsoft Azure.

Which two components does the ARM template create? (Choose two.)

A.

Gateway

B.

VNet Endpoint

C.

Security Group

D.

VPN

Full Access
Question # 10

You have multiple Dell PowerProtect Data Domain integrated with a Dell PowerProtect Cyber Recovery host. Connection is lost to one of the Data Domains.

Which two methods would a Cyber Recovery administrator use to find out about it? (Choose two.)

A.

An alert notification will be sent out to the admin stating, 'Vault status is Unknown'.

B.

Alert 2035 will be generated stating 'An error was detected while attempting to communicate with the DD system'.

C.

In the Cyber Recovery GUI, the vault status will be changed to 'Unknown'.

D.

In the Cyber Recovery GUI, the vault status will be changed to 'Degraded'.

Full Access
Question # 11

Which two options correctly describe how you can connect from the vault to another environment? (Choose two.)

A.

Connect by a Telnet Client to the PowerProtect Cyber Recovery vault

B.

Connect by a replication data link between the vault-environment and production environment Dell PowerProtect Data Domain systems

C.

Connect by a SSH Client to the PowerProtect Cyber Recovery vault

D.

Connect by an optional dedicated link from the Cyber Recovery management host in the Dell PowerProtect Cyber Recovery vault to the production network operations center

Full Access