Professional Documents
Culture Documents
DEP 3CR1 Full File
DEP 3CR1 Full File
DEP-3CR1 Exam
PowerProtect Cyber Recovery (DC)
Question: 1
Which combination of objects and jobs are within a policy?
Answer: C
Explanation:
Question: 2
Which appliance is supported as the replication target in the CR Vault?
A. DP4400
B. DP5300
C. DP8300
D. DP8800
Answer: D
Explanation:
Question: 3
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
Answer: A
Explanation:
www.dumpsfire.com
Questions and Answers PDF 2/17
Question: 4
A. To reset the security officer's password and the root user password
B. To perform upgrades and recoveries from the vault
C. To perform recoveries from the vault and reset the root user password
D. To perform upgrades and reset the security officer's password
Answer: C
Explanation:
Question: 5
A customer wants to use the service of an external network operation center (NOC) / security
operation center (SOC) to monitor the CR Vault environment.
What is the most secure solution if the customer wants to ensure that communication is only
possible to the NOC/SOC?
A. Firewall
B. Dedicated Network Link
C. Data Diode
D. VPN Tunnel
Answer: B
Explanation:
Question: 6
Which Cyber Recovery REST API section allows a user to create log bundles?
A. Notifications
B. Actions
C. Systems
D. Authentication
Answer: A
Explanation:
Question: 7
Why is the AWS User Canonical ID needed when emailing CyberRecoveryCloudRequest@Dell.com?
www.dumpsfire.com
Questions and Answers PDF 3/17
Answer: C
Explanation:
Question: 8
Which backup storage systems are supported when a CR Vault solution needs to be implemented?
Answer: A
Explanation:
Question: 9
Which script verifies that the system is ready for a CyberSense docker installation?
A. CheckEngine.sh
B. yum install docker-ce
C. crsetup.sh --check
D. repobundle-ie-docker-check
Answer: B
Explanation:
Question: 10
DRAG DROP
What is the correct sequence to install Cyber Recovery software on a physical host?
Answer:
Explanation:
www.dumpsfire.com
Questions and Answers PDF 4/17
Question: 11
A Cyber Recovery Administrator encounters a PowerProtect DD system that is offline and unavailable
in the CR system.
What are the steps to remove this asset?
A. From the CLI, look for the asset's UID, and run the command: crcli apps delete --uid
B. From the Cyber Recovery UI, select Asset, select the unavailable tab, then delete
C. From the CLI, look for the asset's nickname, and run the command: crcli dd delete –nickname
D. From the Cyber Recovery UI, select the asset checkbox, then delete
Answer: C
Explanation:
Question: 12
In CyberSense, which term defines the function that enables and optimizes the segments for analysis
and searching?
A. Index Job
B. Post Processing
C. Analysis
D. Segment
Answer: D
Explanation:
Question: 13
A customer is unable to deploy the CR Virtual Appliance. They currently use vCenter 6.5 and have 4
CPU, 8GB of memory, and 150GB of disk space available.
Why won't the virtual appliance deploy?
www.dumpsfire.com
Questions and Answers PDF 5/17
D. Insufficient CPU
Answer: A
Explanation:
Question: 14
What is a prerequisite for Avamar backups to be restored in the vault?
Answer: C
Explanation:
Question: 15
Which IDPA model is supported for the production environment and in the CR Vault?
A. DP3300
B. DP8800
C. DP5400
D. DP4400
Answer: A
Explanation:
Question: 16
A customer wants to recover the Avamar server inside the CR Vault. The checkpoint backup was
replicated to PowerProtect DD using the CR Application. While performing the rollback, the job
failed.
What is the reason?
A. Avamar server hostname and the DD Boost UID are the same as the Avamar production host
B. Avamar server host has a different IP address but the same hostname as the Avamar production
host
C. Avamar server hostname is the same as Production, but the DD Boost UID is different
D. Avamar server host has the same IP address and hostname as the Avamar production host
Answer: B
Explanation:
Question: 17
www.dumpsfire.com
Questions and Answers PDF 6/17
An administrator wants to create a read/write copy of the replicated data in the CR Vault.
Which task will accomplish the requirement?
A. Synchronization
B. Sandbox
C. Copy
D. Secure Copy
Answer: C
Explanation:
Question: 18
While performing the post-checks for a newly restored Avamar server from the CR Vault, which
Avamar command needs to be run to configure the Avamar management console?
A. mcserver.sh --mccli
B. avmaint –mccli
C. dpnctl_mccli
D. avsetup_mccli
Answer: D
Explanation:
Question: 19
Which feature can enable additional cyber resiliency measures to the Cyber recovery ecosystem?
A. Cloud tier
B. Retention Lock
C. DD Boost
D. Replication
Answer: C
Explanation:
Question: 20
What vault status is displayed if none of the PowerProtect DD systems in the CR Vault are able to
communicate with the Cyber Recovery software?
A. Unlocked
B. Unknown
C. Degraded
D. Locked
www.dumpsfire.com
Questions and Answers PDF 7/17
Answer: A
Explanation:
Question: 21
A customer environment has PowerProtect Data Manager with the Cyber Recovery Solution. They
want to perform a recovery test for the PowerProtect Data Manager data.
What options can be used to initiate the recovery session?
Answer: C
Explanation:
Question: 22
Which component can add advanced analytics to Cyber Recovery?
Answer: A
Explanation:
Question: 23
What enables and disables the air gap in cyber Recovery?
Answer: D
Explanation:
Question: 24
Before performing a NetWorker recovery, what command needs to be run to determine the UID
required?
www.dumpsfire.com
Questions and Answers PDF 8/17
Answer: A
Explanation:
Question: 25
What parameter is added to the command crsetup.sh to install Cyber Recovery on a VM?
A. start
B. run
C. deploy
D. install
Answer: A
Explanation:
Question: 26
What information is contained within the CR security guide?
Answer: A
Explanation:
Question: 27
What should the solution architect used to determine a customer's CyberSense server requirements
based on their environment?
A. IndexEngines site
B. Sizing Calculator
C. Workload calculator
D. Cyber Recovery product guide
Answer: D
Explanation:
www.dumpsfire.com
Questions and Answers PDF 9/17
Question: 28
Answer: A
Explanation:
Question: 29
What occurs when the CyberSense license expires?
Answer: C
Explanation:
Question: 30
By default, what is the only connection between the production PowerProtect DD and the CR Vault
PowerProtect DD?
A. Backup link
B. Managment link
C. DD Boost link
D. MTree replication link
Answer: A
Explanation:
Question: 31
What is the grace period of the CyberSense license?
A. 90 days
B. 30 days
C. 60 days
D. 45 days
www.dumpsfire.com
Questions and Answers PDF 10/17
Answer: A
Explanation:
Question: 32
What is the minimum number of Ethernet interfaces needed for Cyber Recovery?
A. 4
B. 3
C. 1
D. 2
Answer: B
Explanation:
Question: 33
Which TCP port is used to upload or download the Docker container image?
A. 14779
B. 14780
C. 14777
D. 14778
Answer: C
Explanation:
Question: 34
Which are components of PowerProtect Cyber Recovery?
Answer: A
Explanation:
Question: 35
www.dumpsfire.com
Questions and Answers PDF 11/17
Answer: A
Explanation:
Question: 36
Where is the CyberSense feature installed in a Cyber Recovery environment?
Answer: B
Explanation:
Question: 37
A. 5
B. 2
C. 7
D. 4
Answer: C
Explanation:
Question: 38
For which two default user accounts does a Cyber Recovery virtual appliance deployment require an
administrator to reset a password?
www.dumpsfire.com
Questions and Answers PDF 12/17
Answer: D
Explanation:
Question: 39
What are the possible connection states of the CR Vault?
Answer: A
Explanation:
Question: 40
Which Cyber Recovery component is used to detect, diagnose, and accelerate recovery within the
Vault?
Answer: B
Explanation:
Question: 41
Which application object is required to analyze the data inside the CR Vault?
A. CyberSense
B. Avamar
C. NetWorker
D. PowerProtect Data Manager
Answer: A
Explanation:
Question: 42
How much swap space is required for a host running CyberSense with 128 GB of memory?
A. 320 GB
B. 448 GB
www.dumpsfire.com
Questions and Answers PDF 13/17
C. 832 GB
D. 576 GB
Answer: A
Explanation:
Question: 43
Which statement is true for a policy?
Answer: B
Explanation:
Question: 44
A company has DP8300 in the production environment. They would like to use the CR Vault.
What is the most efficient solution to replicate data to the CR Vault?
Answer: C
Explanation:
Question: 45
A customer plans to have 1 policy which replicates data into the vault daily and takes a PIT copy,
which is kept for 7 days and retention locked. The customer also plans to have one copy for the
sandbox
A. 8
B. 4
C. 1
D. 3
www.dumpsfire.com
Questions and Answers PDF 14/17
Answer: A
Explanation:
Question: 46
What is the result of running the ierestart -r command?
Answer: B
Explanation:
Question: 47
Where can workarounds on the current CR application be found?
A. User Guide
B. Release Notes
C. Product Guide
D. Installation Guide
Answer: D
Explanation:
Question: 48
What is the minimum CyberSense network configuration required when connecting to a
PowerProtect DD system?
A. One 1 GB NIC
B. One 10 GB MC
C. Two 1 GB NIC
D. Two 10 GB NIC
Answer: A
Explanation:
Question: 49
For which task is the lockbox passphrase required?
A. Perform upgrades
www.dumpsfire.com
Questions and Answers PDF 15/17
Answer: C
Explanation:
Question: 50
Which are valid components of a Cyber Recovery policy?
A. Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization,
copy, and lock
B. Objects like PowerStore and Backup software applications. Jobs such as synchronization, copy, and
lock
C. Objects like PowerProtect DD and Backup software applications. Jobs such as backup, restore, and
cleaning
D. Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization,
copy, and governance
Answer: A
Explanation:
Question: 51
Which service is needed inside the CR Vault?
A. DNS
B. NTP
C. SNMP
D. Active Directory
Answer: A
Explanation:
Question: 52
What is the purpose of Denial of Service attacks?
Answer: A
Explanation:
www.dumpsfire.com
Questions and Answers PDF 16/17
Question: 53
A. Create a Sandbox
B. Initiate an analysis in CR
C. Perform a PIT Copy
D. Discover CR in NetWorker UI
Answer: D
Explanation:
Question: 54
How many PIT copies can a sandbox contain?
A. 10
B. 1
C. 2
D. 5
Answer: B
Explanation:
www.dumpsfire.com
Questions and Answers PDF 17/17
www.dumpsfire.com