What options can be used to initiate the recovery session?

A customer environment has Power Protect Data Manager with the Cyber Recovery Solution. They want to perform a recovery test for the Power Protect Data Manager data. What options can be used to initiate the recovery session?A . Cyber Recovery UI or Power Protect Data Manager UIB . CRCLI or...

November 28, 2023 No Comments READ MORE +

While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?

While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?A . mcserver.sh--mccliB . av maint-mccliC . dpnctl_mccliD . avsetup_mccliView AnswerAnswer: D

November 28, 2023 No Comments READ MORE +

What is the result of running the ie restart-r command?

What is the result of running the ie restart-r command?A . the Cyber Sense v App is restartedB . the Cyber Sense software is unpackedC . the docker containers are removed and createdD . the docker image is successfully loadedView AnswerAnswer: C

November 26, 2023 No Comments READ MORE +

Which Cyber Recovery REST API section allows a user to create log bundles?

Which Cyber Recovery REST API section allows a user to create log bundles?A . NotificationsB . ActionsC . SystemsD . AuthenticationView AnswerAnswer: C

November 26, 2023 No Comments READ MORE +

When is the lockbox passphrase required after the installation?

When is the lockbox passphrase required after the installation?A . To reset the security officer's password and the root user passwordB . To perform upgrades and recoveries from the vaultC . To perform recoveries from the vault and reset the root user passwordD . To perform upgrades and reset the...

November 25, 2023 No Comments READ MORE +

What are the required components of a CR Vault Environment?

What are the required components of a CR Vault Environment?A . Power Protect DD, Dedicated Network, and CR management hostB . NTP, Cyber Recovery management host, and DNSC . Network connection, DNS, and Power Protect DDD . DNS, Power Protect DD, and NTPView AnswerAnswer: A

November 24, 2023 No Comments READ MORE +

Which operating system is supported when installing Cyber Recovery as an application?

Which operating system is supported when installing Cyber Recovery as an application?A . SUSE Linux Enterprise 12SP 3B . SUSE Linux Enterprise 12SP 5C . CentOS Linux 7SP 3D . CentOS Linux 7SP 5View AnswerAnswer: B

November 24, 2023 No Comments READ MORE +

Which TCP port is used to upload or download the Docker container image?

Which TCP port is used to upload or download the Docker container image?A . 14779B . 14780C . 14777D . 14778View AnswerAnswer: A

November 23, 2023 No Comments READ MORE +

Which combination of objects and jobs are within a policy?

Which combination of objects and jobs are within a policy?A . Power Protect DD storage and applications, synchronization, copy, and lockB . Power Protect applications and DD storage, synchronization, and lockC . Power Protect DD storage and applications, synchronization, copy, lock, and analysisD . Power Protect Data Manager and applications,...

November 21, 2023 No Comments READ MORE +

Why won't the virtual appliance deploy?

A customer is unable to deploy the CR Virtual Appliance. They currently use v Center 6.5 and have 4 CPU, 8GB of memory, and 150GB of diskspace available. Why won't the virtual appliance deploy?A . Insufficient diskspaceB . Insufficient memoryC . Unsupported v Center versionD . Insufficient CPUView AnswerAnswer: A

November 21, 2023 No Comments READ MORE +