Which Cyber Recovery REST API section allows a user to create log bundles?
- A . Notifications
- B . Actions
- C . Systems
- D . Authentication
Which operating system is supported when installing Cyber Recovery as an application?
- A . SUSE Linux Enterprise 12SP 3
- B . SUSE Linux Enterprise 12SP 5
- C . CentOS Linux 7SP 3
- D . CentOS Linux 7SP 5
While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?
- A . mcserver.sh–mccli
- B . av maint-mccli
- C . dpnctl_mccli
- D . avsetup_mccli
Which TCP port is used to upload or download the Docker container image?
- A . 14779
- B . 14780
- C . 14777
- D . 14778
What should the solution architect used to determine a customer’s Cyber Sense server requirements based on their environment?
- A . Index Engines site
- B . Sizing Calculator
- C . Workload calculator
- D . Cyber Recovery product guide
What are the possible connection states of the CR Vault?
- A . Acked, Unlocked, Unknown, Secured, and Downgraded
- B . Open, Locked, Secured, Promoted, and Unknown
- C . Degraded, Down, Up, Running, and Maintenance
- D . Locked, Unlocked, Unknown, Secured, and Degraded
Which statement is true for a policy?
- A . Only multiple sequenced actions can be run
- B . Sync and Lock actions are unable to run concurrently
- C . Only single actions can be run
- D . A policy can only be modified by the cr so user
What is the result of running the ie restart-r command?
- A . the Cyber Sense v App is restarted
- B . the Cyber Sense software is unpacked
- C . the docker containers are removed and created
- D . the docker image is successfully loaded
What are the required components of a CR Vault Environment?
- A . Power Protect DD, Dedicated Network, and CR management host
- B . NTP, Cyber Recovery management host, and DNS
- C . Network connection, DNS, and Power Protect DD
- D . DNS, Power Protect DD, and NTP
Before performing a NetWorker recovery, what command needs to be run to determine the UID required?
- A . crcli policy show-n{Policy_Name}
- B . crcli policy show-p{Policy_Name}
- C . crcli policy get-n{Policy_Name}
- D . crcli policy get-p{Policy_Name}
Which combination of objects and jobs are within a policy?
- A . Power Protect DD storage and applications, synchronization, copy, and lock
- B . Power Protect applications and DD storage, synchronization, and lock
- C . Power Protect DD storage and applications, synchronization, copy, lock, and analysis
- D . Power Protect Data Manager and applications, synchronization, and copy
Which appliance is supported as the replication target in the CR Vault?
- A . DP4400
- B . DP5300
- C . DP8300
- D . DP8800
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
- A . Production environment can use resources from Vault environment
- B . Production environment is used to run the Cyber Recovery Management Host
- C . Vault and Production infrastructure must be managed by NOC
- D . Vault infrastructure is completely isolated from the Production infrastructure
When is the lockbox passphrase required after the installation?
- A . To reset the security officer’s password and the root user password
- B . To perform upgrades and recoveries from the vault
- C . To perform recoveries from the vault and reset the root user password
- D . To perform upgrades and reset the security officer’s password
A customer wants to use the service of an external network operation center (NOC) /security operation center (SOC) to monitor the CR Vault environment
What is the most secure solution if the customer wants to ensure that communication is only possible to
the NOC/SOC?
- A . Firewall
- B . Dedicated Network Link
- C . Data Diode
- D . VPN Tunnel
What must be done prior to restoring NetWorker data in the CR Vault?
- A . Create a Sandbox
- B . Initiate an analysis in CR
- C . Perform a PIT Copy
- D . Discover CR in NetWorker UI
An enterprise customer needs a Cyber Recovery solution to be implemented. As an outcome from a previous workshop, the following backup environment needs to be protected to the CR Vault.
Location1: 4PowerProtectDDs
Location2: 4PowerProtectDDs
Location3: 2PowerProtectDDs
Location4: 2PowerProtectDDs
The customer wants to implement aCRVaultina5th location
How many Cyber Recovery systems must be installed at a minimum level?
- A . 5
- B . 2
C 7 - C . 4
A customer is unable to deploy the CR Virtual Appliance. They currently use v Center 6.5 and have 4 CPU, 8GB of memory, and 150GB of diskspace available.
Why won’t the virtual appliance deploy?
- A . Insufficient diskspace
- B . Insufficient memory
- C . Unsupported v Center version
- D . Insufficient CPU
A customer environment has Power Protect Data Manager with the Cyber Recovery Solution. They want to perform a recovery test for the Power Protect Data Manager data.
What options can be used to initiate the recovery session?
- A . Cyber Recovery UI or Power Protect Data Manager UI
- B . CRCLI or Power Protect Data Manager UI
- C . Cyber Recovery UI or CRC LI
- D . Power Protect Data Manager CLI or Cyber Recovery UI
Why is the AWS User Canonical ID needed when emailing CyberRecoveryCloudRequest@Dell.com?
- A . For access to the Cloud Formation template
- B . To assign the sales order number to your account
- C . To determine the AWS region to deploy Cyber Recovery
- D . For access to the Cyber Recovery AMI