What system role is required to create the second security officer for a PowerProtect DD?

What system role is required to create the second security officer for a PowerProtect DD?A . adminB . sysadminC . limited-adminD . security officerView AnswerAnswer: C

May 3, 2025 No Comments READ MORE +

Which are two attributes of PowerProtect High Availability? ( Select 2 )

Which are two attributes of PowerProtect High Availability? ( Select 2 )A . single set of shared storage is usedB . Power Protect DD nodes are configured in active active modeC . supported only on DD9900 systemsD . PowerPotect DD nodes should have dual headsView AnswerAnswer: BD

May 3, 2025 No Comments READ MORE +

What are some possible network bottlenecks for a PowerProtect DD?

What are some possible network bottlenecks for a PowerProtect DD?A . Configuration, wire speeds, switches and routersB . Connectivity, routing protocols, and configurationC . Connectivity, firewalls, and routing protocolsD . Routing protocols, switches and routers, and wire speedsView AnswerAnswer: D

May 2, 2025 No Comments READ MORE +

Which command allows a system administrator to monitor clients active in the past 15 minutes?

Which command allows a system administrator to monitor clients active in the past 15 minutes?A . nfs show statsB . nfs show clientsC . nfs show detailed-statsD . nfs show activeView AnswerAnswer: D

April 30, 2025 No Comments READ MORE +

What metrics should be monitored to find the issue?

During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x). What metrics should be monitored to find the issue?A . Cleaning, NVRAM battery level, and link utilizationB . Stream count, CPU utilization, and replicationC . Stream count, disk reconstruction, and replicationD ....

April 27, 2025 No Comments READ MORE +

What is the required action to achieve the customer's goal?

A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data. What is the required action to achieve the customer's goal?A . Encrypt and reupload the dataB . Enable the encryption via cloud tier levelC . Activate...

April 27, 2025 No Comments READ MORE +

Which command will make these disks available?

After adding expansion shelves, an administrator verifies the state of the new disks with the command disk show state is unknown. Which command will make these disks available?A . disk rescan command for each unknown diskB . disk unfail command for all unknown disks availableC . disk rebuild command for...

April 27, 2025 No Comments READ MORE +

Why has this occurred?

An engineer is attempting to add an ES40 shelf to a PowerProtect DD9400. The system currently has one DS60 and four ES40 shelves on the same chain. The system does not recognize the additional shelf. Why has this occurred?A . The maximum number of shelves on the chain is exceededB...

April 26, 2025 No Comments READ MORE +

Which types of replication are supported by this topology?

A company has implemented many-to-one replication between PowerProtect DD appliances. Which types of replication are supported by this topology?A . Directory and MTreeB . MTree and CollectionC . Collection and DirectoryD . Managed File and MTreeView AnswerAnswer: A

April 26, 2025 No Comments READ MORE +

What is a consideration when configuring the tape size?

An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from physical tape. What is a consideration when configuring the tape size?A . Use multiple drives to write multiple streamsB . Set retention periods for as...

April 24, 2025 No Comments READ MORE +