Exam4Training

Dell DEP-3CR1 PowerProtect Cyber Recovery Exam Online Training

Question #1

Which Cyber Recovery REST API section allows a user to create log bundles?

  • A . Notifications
  • B . Actions
  • C . Systems
  • D . Authentication

Reveal Solution Hide Solution

Correct Answer: C
Question #2

Which operating system is supported when installing Cyber Recovery as an application?

  • A . SUSE Linux Enterprise 12SP 3
  • B . SUSE Linux Enterprise 12SP 5
  • C . CentOS Linux 7SP 3
  • D . CentOS Linux 7SP 5

Reveal Solution Hide Solution

Correct Answer: B
Question #3

While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?

  • A . mcserver.sh–mccli
  • B . av maint-mccli
  • C . dpnctl_mccli
  • D . avsetup_mccli

Reveal Solution Hide Solution

Correct Answer: D
Question #4

Which TCP port is used to upload or download the Docker container image?

  • A . 14779
  • B . 14780
  • C . 14777
  • D . 14778

Reveal Solution Hide Solution

Correct Answer: A
Question #5

What should the solution architect used to determine a customer’s Cyber Sense server requirements based on their environment?

  • A . Index Engines site
  • B . Sizing Calculator
  • C . Workload calculator
  • D . Cyber Recovery product guide

Reveal Solution Hide Solution

Correct Answer: B
Question #6

What are the possible connection states of the CR Vault?

  • A . Acked, Unlocked, Unknown, Secured, and Downgraded
  • B . Open, Locked, Secured, Promoted, and Unknown
  • C . Degraded, Down, Up, Running, and Maintenance
  • D . Locked, Unlocked, Unknown, Secured, and Degraded

Reveal Solution Hide Solution

Correct Answer: D
Question #7

Which statement is true for a policy?

  • A . Only multiple sequenced actions can be run
  • B . Sync and Lock actions are unable to run concurrently
  • C . Only single actions can be run
  • D . A policy can only be modified by the cr so user

Reveal Solution Hide Solution

Correct Answer: B
Question #8

What is the result of running the ie restart-r command?

  • A . the Cyber Sense v App is restarted
  • B . the Cyber Sense software is unpacked
  • C . the docker containers are removed and created
  • D . the docker image is successfully loaded

Reveal Solution Hide Solution

Correct Answer: C
Question #9

What are the required components of a CR Vault Environment?

  • A . Power Protect DD, Dedicated Network, and CR management host
  • B . NTP, Cyber Recovery management host, and DNS
  • C . Network connection, DNS, and Power Protect DD
  • D . DNS, Power Protect DD, and NTP

Reveal Solution Hide Solution

Correct Answer: A
Question #10

Before performing a NetWorker recovery, what command needs to be run to determine the UID required?

  • A . crcli policy show-n{Policy_Name}
  • B . crcli policy show-p{Policy_Name}
  • C . crcli policy get-n{Policy_Name}
  • D . crcli policy get-p{Policy_Name}

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which combination of objects and jobs are within a policy?

  • A . Power Protect DD storage and applications, synchronization, copy, and lock
  • B . Power Protect applications and DD storage, synchronization, and lock
  • C . Power Protect DD storage and applications, synchronization, copy, lock, and analysis
  • D . Power Protect Data Manager and applications, synchronization, and copy

Reveal Solution Hide Solution

Correct Answer: A
Question #12

Which appliance is supported as the replication target in the CR Vault?

  • A . DP4400
  • B . DP5300
  • C . DP8300
  • D . DP8800

Reveal Solution Hide Solution

Correct Answer: A
Question #13

What must be considered when planning and implementing a secure Cyber Recovery Vault solution?

  • A . Production environment can use resources from Vault environment
  • B . Production environment is used to run the Cyber Recovery Management Host
  • C . Vault and Production infrastructure must be managed by NOC
  • D . Vault infrastructure is completely isolated from the Production infrastructure

Reveal Solution Hide Solution

Correct Answer: D
Question #14

When is the lockbox passphrase required after the installation?

  • A . To reset the security officer’s password and the root user password
  • B . To perform upgrades and recoveries from the vault
  • C . To perform recoveries from the vault and reset the root user password
  • D . To perform upgrades and reset the security officer’s password

Reveal Solution Hide Solution

Correct Answer: D
Question #15

A customer wants to use the service of an external network operation center (NOC) /security operation center (SOC) to monitor the CR Vault environment

What is the most secure solution if the customer wants to ensure that communication is only possible to

the NOC/SOC?

  • A . Firewall
  • B . Dedicated Network Link
  • C . Data Diode
  • D . VPN Tunnel

Reveal Solution Hide Solution

Correct Answer: C
Question #16

What must be done prior to restoring NetWorker data in the CR Vault?

  • A . Create a Sandbox
  • B . Initiate an analysis in CR
  • C . Perform a PIT Copy
  • D . Discover CR in NetWorker UI

Reveal Solution Hide Solution

Correct Answer: C
Question #17

An enterprise customer needs a Cyber Recovery solution to be implemented. As an outcome from a previous workshop, the following backup environment needs to be protected to the CR Vault.

Location1: 4PowerProtectDDs

Location2: 4PowerProtectDDs

Location3: 2PowerProtectDDs

Location4: 2PowerProtectDDs

The customer wants to implement aCRVaultina5th location

How many Cyber Recovery systems must be installed at a minimum level?

  • A . 5
  • B . 2
    C 7
  • C . 4

Reveal Solution Hide Solution

Correct Answer: B
Question #18

A customer is unable to deploy the CR Virtual Appliance. They currently use v Center 6.5 and have 4 CPU, 8GB of memory, and 150GB of diskspace available.

Why won’t the virtual appliance deploy?

  • A . Insufficient diskspace
  • B . Insufficient memory
  • C . Unsupported v Center version
  • D . Insufficient CPU

Reveal Solution Hide Solution

Correct Answer: A
Question #19

A customer environment has Power Protect Data Manager with the Cyber Recovery Solution. They want to perform a recovery test for the Power Protect Data Manager data.

What options can be used to initiate the recovery session?

  • A . Cyber Recovery UI or Power Protect Data Manager UI
  • B . CRCLI or Power Protect Data Manager UI
  • C . Cyber Recovery UI or CRC LI
  • D . Power Protect Data Manager CLI or Cyber Recovery UI

Reveal Solution Hide Solution

Correct Answer: C
Question #20

Why is the AWS User Canonical ID needed when emailing CyberRecoveryCloudRequest@Dell.com?

  • A . For access to the Cloud Formation template
  • B . To assign the sales order number to your account
  • C . To determine the AWS region to deploy Cyber Recovery
  • D . For access to the Cyber Recovery AMI

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version