Exam4Training

DELL EMC D-PDD-DY-23 Dell Technologies PowerProtect DD Deploy 2023 Online Training

Question #1

A backup administrator is tasked with verifying the compression savings of a PowerProtect DD9900.

Which compression algorithm will they see enabled by default?

  • A . lzw
  • B . gzfast
  • C . lz
  • D . gz

Reveal Solution Hide Solution

Correct Answer: B
Question #2

During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x).

What metrics should be monitored to find the issue?

  • A . Cleaning, NVRAM battery level, and link utilization
  • B . Stream count, CPU utilization, and replication
  • C . Stream count, disk reconstruction, and replication
  • D . NVRAM battery level, link utilization, and disk reconstruction

Reveal Solution Hide Solution

Correct Answer: B
Question #3

Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?

  • A . Dell NetWorker
  • B . Dell Avamar
  • C . IBM Spectrum Protect
  • D . Veritas Backup Exec

Reveal Solution Hide Solution

Correct Answer: A
Question #4

What system role is required to create the second security officer for a PowerProtect DD?

  • A . admin
  • B . sysadmin
  • C . limited-admin
  • D . security officer

Reveal Solution Hide Solution

Correct Answer: C
Question #5

A customer needs a backup system to locally protect 200 TB of mission-critical, post-comp data.

What should be used to back up the system?

  • A . Cloud Tier
  • B . DDVE
  • C . DD6900
  • D . DD3300
  • E . DD6400

Reveal Solution Hide Solution

Correct Answer: C
Question #6

If PowerProtect DD administrator issue a cifs share destroy command, what is the result?

  • A . The CIFS share and contents of the share are deleted.
  • B . The contents of the CIFS share are deleted.
  • C . The CIFS share is deleted.

Reveal Solution Hide Solution

Correct Answer: C
Question #7

An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape.

What is a consideration when configuring the tape size?

  • A . Target single drives to write multiple streams
  • B . Target multiple drives to write single stream
  • C . Set retention periods for as long as possible
  • D . Use smaller tapes for smaller datasets

Reveal Solution Hide Solution

Correct Answer: D
Question #8

What capabilities are enabled with Retention Lock Governance?

  • A . Update or extend retention
    File level retention policies
    Rename MTree
    Audit Logging
  • B . Rename MTree
    File level retention policies
    Secure Clock
    CLI Support
    Update or extend retention
  • C . File level retention policies
    Rename MTree
    Update or extend retention
    CLI Support
  • D . Audit Logging
    Update or extend retention
    File level retention policies
    Rename MTree
    Secure Clock

Reveal Solution Hide Solution

Correct Answer: C
Question #9

An administrator is configuring an Azure cloud unit on their DD6900.

Which certificate must be imported before adding the cloud unit?

  • A . GlobalSign Root R2
  • B . GlobalSign Root R1
  • C . S3 Flexible
  • D . Baltimore CyberTrust Root CA

Reveal Solution Hide Solution

Correct Answer: D
Question #10

What is the default listen port used by PowerProtect DD systems for replication?

  • A . 623
  • B . 2051
  • C . 135
  • D . 9020

Reveal Solution Hide Solution

Correct Answer: B

Question #11

A technician is upgrading a DD9400 with a DS60 expansion shelf with 60 drives. In the GUI interface, only 30 drives are accessible.

What is causing these drives to be inaccessible?

  • A . There are not enough cache drives on the DD9400 to support the extra capacity.
  • B . A second SAS connection from DD9400 to DS60 is not activated.
  • C . There are not enough spare drives.
  • D . The capacity license applied is only for 30 drives.

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which PowerProtect DD feature protects data from accidental or malicious deletion during its retention time?

  • A . Smart Scale
  • B . Retention Lock
  • C . Data Invulnerability Architecture
  • D . Encryption

Reveal Solution Hide Solution

Correct Answer: B
Question #13

What is the maximum capacity for an on-premises DDVE with no cloud storage?

  • A . 64 TB
  • B . 96 TB
  • C . 128 TB
  • D . 256 TB

Reveal Solution Hide Solution

Correct Answer: B
Question #14

What are the steps to configure the Retention Lock Compliance?

Reveal Solution Hide Solution

Correct Answer:


Question #15

A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data.

What is the required action to achieve the customer’s goal?

  • A . Encrypt and reupload the data
  • B . Enable the encryption via cloud tier level
  • C . Activate the Data at Rest encryption
  • D . Turn off encryption and reenable

Reveal Solution Hide Solution

Correct Answer: A
Question #16

A systems administrator wants to change encryption.

Which user role is needed to log in, and what command must be run to enable the security policy?

  • A . security officer user and run authentication policy set security-officer enabled
  • B . sysadmin user and run authentication policy set security-officer enabled
  • C . security officer user and run authorization policy set security-officer enabled
  • D . sysadmin user and run authorization policy set security-officer enabled

Reveal Solution Hide Solution

Correct Answer: C
Question #17

What happens to the data when it is moved from the active tier to cloud tier?

  • A . It is deduplicated and stored in object storage the native format
  • B . It is compressed and stored as object storage in a new format
  • C . It is compressed and stored in block storage in a new format
  • D . It is deduplicated and stored in a file system in the native format

Reveal Solution Hide Solution

Correct Answer: A
Question #18

A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due to tampering of the system clock.

Which user role has the privilege required to enable the file system?

  • A . Security Officer
  • B . Admin
  • C . Limited Admin
  • D . Tenant Admin

Reveal Solution Hide Solution

Correct Answer: A
Question #19

A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack.

When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?

  • A . Expansion port of the upstream shelf
  • B . Host port of the controller
  • C . Expansion port of the controller
  • D . Host port of the downstream shelf

Reveal Solution Hide Solution

Correct Answer: A
Question #20

What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?

  • A . Cleaning is run every 10 days when the system is over 30% capacity.
  • B . Cleaning is run every 10 days using no more than 30% system resources.
  • C . Cleaning is run every 10 days using more than 30% system resources.
  • D . Cleaning is run every 10 days when the system is under 30% capacity.

Reveal Solution Hide Solution

Correct Answer: A

Question #21

Which deduplication steps are offloaded when DSP is used?

  • A . Compress, Segment, and Filter
  • B . Segment, Fingerprint, and Compress
  • C . Fingerprint, Segment, and Filter
  • D . Filter, Fingerprint, and Segment

Reveal Solution Hide Solution

Correct Answer: B
Question #22

A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization.

Upon further investigation, the administrator discovered expired files are still present on the appliance.

What is the most likely reason for this issue?

  • A . The time of the file was set below the minimum retention period
  • B . Retention Lock feature was disabled before the expiration date
  • C . File system cleaning was disabled
  • D . Backup application failed to delete the file after expiration

Reveal Solution Hide Solution

Correct Answer: D
Question #23

In PowerProtect DD, in which folder are core files, logfiles, and upgrade packages located?

  • A . /backup
  • B . /ddvar
  • C . /data/col1
  • D . /var

Reveal Solution Hide Solution

Correct Answer: B
Question #24

Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?

  • A . VTL
  • B . DDOS
  • C . DD Boost
  • D . CIFS

Reveal Solution Hide Solution

Correct Answer: B
Question #25

What is a requirement to use the PowerProtect DD HA feature?

  • A . Each head unit requires its own FS25 shelf
  • B . Head units and nodes require an active/active configuration
  • C . A single set of shared storage
  • D . Dual set of shared storage configuration

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which type of data replication can only be used with DD Boost on a PowerProtect DD appliance?

  • A . Collection
  • B . MTree
  • C . Encrypted replication
  • D . Managed File

Reveal Solution Hide Solution

Correct Answer: C
Question #27

When using the DD VTL Tape Out to Cloud feature, which status will the tape report on the backup server once the tape is ready for long-term retention?

  • A . Offsite
  • B . Archived
  • C . Mountable
  • D . Nonmountable

Reveal Solution Hide Solution

Correct Answer: D
Question #28

An engineer is deploying a PowerProtect DD6900 system. The installation includes ES40, and DS60 expansion shelves on the same chain.

What consideration should be made when configuring the hardware?

  • A . The maximum number of ES40 shelves is four
  • B . The maximum number of DS60 shelves is five
  • C . The maximum number of ES40 shelves is six
  • D . The maximum number of DS60 shelves is six

Reveal Solution Hide Solution

Correct Answer: A
Question #29

What would the log view command display if no log name is specified?

  • A . space.log
  • B . audit.log
  • C . debug/ddfs.info
  • D . messages

Reveal Solution Hide Solution

Correct Answer: D
Question #30

An engineer is deploying a new PowerProtect DD9900 system that includes ES40, DS60, and FS25 expansion shelves.

What should the engineer consider when cabling the hardware?

  • A . The FS25 shelf should be cabled on a separate chain
  • B . The DS60 shelf should be cabled on a separate chain
  • C . The FS25 shelf must be fully populated
  • D . The DS60 shelf must be populated with identical drives

Reveal Solution Hide Solution

Correct Answer: A

Question #31

Which is required to store and manage archive data on a single PowerProtect DD appliance to comply with regulatory standards?

  • A . Dell EMC Cloud Tier
  • B . Encryption for Data at Rest
  • C . Retention Lock Governance
  • D . Retention Lock Compliance

Reveal Solution Hide Solution

Correct Answer: D
Question #32

A customer needs a backup system to protect 100 TB of mission-critical data.

What should be used to back up the system?

  • A . cloud tier
  • B . DD6900
  • C . DD3300
  • D . DDVE

Reveal Solution Hide Solution

Correct Answer: A
Question #33

A Power Protect DD system is configured for VTL. The backup application requires a minimum tape capacity of 800 GB.

What is the minimum tape type to support this requirement?

  • A . LTO-5
  • B . LTO-3
  • C . LTO-2
  • D . LTO-4

Reveal Solution Hide Solution

Correct Answer: D
Question #34

An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from physical tape.

What is a consideration when configuring the tape size?

  • A . Use multiple drives to write multiple streams
  • B . Set retention periods for as long as possible
  • C . Target multiple drives to write single stream
  • D . Use larger tapes for multiple smaller datasets

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Which command allows a system administrator to monitor clients active in the past 15 minutes?

  • A . nfs show stats
  • B . nfs show clients
  • C . nfs show detailed-stats
  • D . nfs show active

Reveal Solution Hide Solution

Correct Answer: D
Question #36

A PowerProtect DD appliance has been installed at a company’s location for several months and has reached a steady state.

As a best practice, at what percentage of disk utilization should action be taken?

  • A . 60%
  • B . 70%
  • C . 80%
  • D . 95%

Reveal Solution Hide Solution

Correct Answer: A
Question #37

Which command is used to start the initial CLI configuration wizard?

  • A . config setup
  • B . install config
  • C . config
  • D . setup

Reveal Solution Hide Solution

Correct Answer: A
Question #38

When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?

  • A . 512
  • B . 1024
  • C . 2048
  • D . 4096

Reveal Solution Hide Solution

Correct Answer: D
Question #39

What is the maximum capacity for a DDVE?

  • A . 64 TB
  • B . 96 TB
  • C . 128 TB
  • D . 256 TB

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Refer to the exhibit.

Match each action to its call-out location. Select and Place:

Reveal Solution Hide Solution

Correct Answer:


Question #41

When selecting a PowerProtect DD model, which standard practices should be used to conservatively calculate capacity and throughput?

  • A . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of average backup / Backup window time
    Allow for a minimum 20% buffer in both capacity and throughput
  • B . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of largest backup / Backup window time
    Allow for a minimum 10% buffer in both capacity and throughput
  • C . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of average backup / Backup window time
    Allow for a minimum 10% buffer in both capacity and throughput
  • D . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of largest backup / Backup window time
    Allow for a minimum 20% buffer in both capacity and throughput

Reveal Solution Hide Solution

Correct Answer: D
Question #42

When using CIFS from a PowerProtect DD system, what should be changed on a Windows machine?

  • A . SMBTimeout to 7200 seconds
  • B . CIFSTimeout to 3600 seconds
  • C . SESSTIMEOUT to 7200 seconds
  • D . SESSTIMEOUT to 3600 seconds

Reveal Solution Hide Solution

Correct Answer: D
Question #43

A backup administrator is tasked with monitoring PowerProtect DD capacity metrics. The administrator is backing up 2 TB of data daily with a reduction rate at 5x. After data reduction, subsequent full backups compress down to 100 GB.

The initial backup requires 400 GB with a 10 percent increase in the data each day. Each incremental backup is 200 GB. After data reduction, each incremental backup is 20 GB.

What is the weekly burn rate (GB) after four daily incremental backups and one weekly backup?

  • A . 180
  • B . 200
  • C . 400
  • D . 440

Reveal Solution Hide Solution

Correct Answer: A
Question #44

What are some possible network bottlenecks for a PowerProtect DD?

  • A . Configuration, wire speeds, switches and routers
  • B . Connectivity, routing protocols, and configuration
  • C . Connectivity, firewalls, and routing protocols
  • D . Routing protocols, switches and routers, and wire speeds

Reveal Solution Hide Solution

Correct Answer: D
Question #45

An administrator has observed degraded read and write throughput performance with their CIFS share.

What can the administrator disable to address the issue?

  • A . Server Signing
  • B . Restrict anonymous connection
  • C . TCP window size
  • D . Log level

Reveal Solution Hide Solution

Correct Answer: A
Question #46

What is one advantage of using PowerProtect DD instead of backing up to other disk-based file systems?

  • A . Data is stored locally on the client for fast restore.
  • B . Only deduplicated data is sent across the network.
  • C . Only deduplicated blocks of data are needed for full recovery.
  • D . Data can be restored to any client operating system.

Reveal Solution Hide Solution

Correct Answer: B
Question #47

Which types of replication are supported in a PowerProtect DD appliance?

  • A . Collection, Directory, MTree, Pool, and Managed File
  • B . Synchronous, Collection, MTree, Managed File, and Directory
  • C . MTree, Collection, and Directory only
  • D . Asynchronous, Collection, Directory, and MTree

Reveal Solution Hide Solution

Correct Answer: C
Question #48

After adding expansion shelves, an administrator verifies the state of the new disks with the command disk show state is unknown.

Which command will make these disks available?

  • A . disk rescan command for each unknown disk
  • B . disk unfail command for all unknown disks available
  • C . disk rebuild command for all unknown disks available
  • D . disk unfail command for each unknown disk individually

Reveal Solution Hide Solution

Correct Answer: D
Question #49

Which method can be used to configure remote logging with syslog?

  • A . The DD System Manager Maintenance > Logs page
  • B . The REST API query in /nwrestapi/v3/global/alerts
  • C . The log host command
  • D . The log change command

Reveal Solution Hide Solution

Correct Answer: C
Question #50

What are the terminal emulation settings that are used to establish serial communication with a PowerProtect DD system?

  • A . BAUD Rate: 116200
    Data Bits: 8
    Stop Bits: 1
    Parity: Even
    Flow Control: Xon/XOFF
  • B . BAUD Rate: 115200
    Data Bits: 8
    Stop Bits: 1
    Parity: None
    Flow Control: None
  • C . BAUD Rate: 115200
    Data Bits: 1
    Stop Bits: 2
    Parity: None
    Flow Control: None
  • D . BAUD Rate: 116200
    Data Bits: 1
    Stop Bits: 2
    Parity: Odd
    Flow Control: Xon/XOFF

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version