Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Dell EMC

DEP-3CR1 Exam
PowerProtect Cyber Recovery (DC)

Questions & Answers


(Full Version)

Thank you for Purchasing DEP-3CR1 Exam


Questions and Answers PDF 1/17

Question: 1
Which combination of objects and jobs are within a policy?

A. PowerProtect DD storage and applications, synchronization, copy, and lock


B. PowerProtect applications and DD storage, synchronization, and lock
C. PowerProtect DD storage and applications, synchronization, copy, lock, and analysis
D. PowerProtect Data Manager and applications, synchronization, and copy

Answer: C
Explanation:

Question: 2
Which appliance is supported as the replication target in the CR Vault?

A. DP4400
B. DP5300
C. DP8300
D. DP8800

Answer: D
Explanation:

Question: 3
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?

A. Production environment can use resources from Vault environment


B. Production environment is used to run the Cyber Recovery Management Host
C. Vault and Production infrastructure must be managed by NOC
D. Vault infrastructure is completely isolated from the Production infrastructure

Answer: A
Explanation:

www.dumpsfire.com
Questions and Answers PDF 2/17

Question: 4

When is the lockbox passphrase required after the installation?

A. To reset the security officer's password and the root user password
B. To perform upgrades and recoveries from the vault
C. To perform recoveries from the vault and reset the root user password
D. To perform upgrades and reset the security officer's password

Answer: C
Explanation:

Question: 5
A customer wants to use the service of an external network operation center (NOC) / security
operation center (SOC) to monitor the CR Vault environment.
What is the most secure solution if the customer wants to ensure that communication is only
possible to the NOC/SOC?

A. Firewall
B. Dedicated Network Link
C. Data Diode
D. VPN Tunnel

Answer: B
Explanation:

Question: 6

Which Cyber Recovery REST API section allows a user to create log bundles?

A. Notifications
B. Actions
C. Systems
D. Authentication

Answer: A
Explanation:

Question: 7
Why is the AWS User Canonical ID needed when emailing CyberRecoveryCloudRequest@Dell.com?

A. For access to the Cloud Formation template


B. To assign the sales order number to your account
C. To determine the AWS region to deploy Cyber Recovery

www.dumpsfire.com
Questions and Answers PDF 3/17

D. For access to the Cyber Recovery AMI

Answer: C
Explanation:

Question: 8
Which backup storage systems are supported when a CR Vault solution needs to be implemented?

A. Production: Any storage Vault: Isilon or ECS


B. Production: PowerProtect DD Vault: PowerProtect DD
C. Production: Any disk storage Vault: Tape solution
D. Production: Isilon Vault: Any storage

Answer: A
Explanation:

Question: 9
Which script verifies that the system is ready for a CyberSense docker installation?

A. CheckEngine.sh
B. yum install docker-ce
C. crsetup.sh --check
D. repobundle-ie-docker-check

Answer: B
Explanation:

Question: 10

DRAG DROP
What is the correct sequence to install Cyber Recovery software on a physical host?

Answer:
Explanation:

www.dumpsfire.com
Questions and Answers PDF 4/17

Question: 11
A Cyber Recovery Administrator encounters a PowerProtect DD system that is offline and unavailable
in the CR system.
What are the steps to remove this asset?

A. From the CLI, look for the asset's UID, and run the command: crcli apps delete --uid
B. From the Cyber Recovery UI, select Asset, select the unavailable tab, then delete
C. From the CLI, look for the asset's nickname, and run the command: crcli dd delete –nickname
D. From the Cyber Recovery UI, select the asset checkbox, then delete

Answer: C
Explanation:

Question: 12

In CyberSense, which term defines the function that enables and optimizes the segments for analysis
and searching?

A. Index Job
B. Post Processing
C. Analysis
D. Segment

Answer: D
Explanation:

Question: 13
A customer is unable to deploy the CR Virtual Appliance. They currently use vCenter 6.5 and have 4
CPU, 8GB of memory, and 150GB of disk space available.
Why won't the virtual appliance deploy?

A. Insufficient disk space


B. Insufficient memory
C. Unsupported vCenter version

www.dumpsfire.com
Questions and Answers PDF 5/17

D. Insufficient CPU

Answer: A
Explanation:

Question: 14
What is a prerequisite for Avamar backups to be restored in the vault?

A. Avamar security user must be created


B. Avamar must be configured to replicate to the PowerProtect DD
C. Avamar checkpoint on the PowerProtect DD must be enabled
D. Avamar hardening must be enabled

Answer: C
Explanation:

Question: 15
Which IDPA model is supported for the production environment and in the CR Vault?

A. DP3300
B. DP8800
C. DP5400
D. DP4400

Answer: A
Explanation:

Question: 16

A customer wants to recover the Avamar server inside the CR Vault. The checkpoint backup was
replicated to PowerProtect DD using the CR Application. While performing the rollback, the job
failed.
What is the reason?

A. Avamar server hostname and the DD Boost UID are the same as the Avamar production host
B. Avamar server host has a different IP address but the same hostname as the Avamar production
host
C. Avamar server hostname is the same as Production, but the DD Boost UID is different
D. Avamar server host has the same IP address and hostname as the Avamar production host

Answer: B
Explanation:

Question: 17

www.dumpsfire.com
Questions and Answers PDF 6/17

An administrator wants to create a read/write copy of the replicated data in the CR Vault.
Which task will accomplish the requirement?

A. Synchronization
B. Sandbox
C. Copy
D. Secure Copy

Answer: C
Explanation:

Question: 18

While performing the post-checks for a newly restored Avamar server from the CR Vault, which
Avamar command needs to be run to configure the Avamar management console?

A. mcserver.sh --mccli
B. avmaint –mccli
C. dpnctl_mccli
D. avsetup_mccli

Answer: D
Explanation:

Question: 19
Which feature can enable additional cyber resiliency measures to the Cyber recovery ecosystem?

A. Cloud tier
B. Retention Lock
C. DD Boost
D. Replication

Answer: C
Explanation:

Question: 20

What vault status is displayed if none of the PowerProtect DD systems in the CR Vault are able to
communicate with the Cyber Recovery software?

A. Unlocked
B. Unknown
C. Degraded
D. Locked

www.dumpsfire.com
Questions and Answers PDF 7/17

Answer: A
Explanation:

Question: 21

A customer environment has PowerProtect Data Manager with the Cyber Recovery Solution. They
want to perform a recovery test for the PowerProtect Data Manager data.
What options can be used to initiate the recovery session?

A. Cyber Recovery UI or PowerProtect Data Manager UI


B. CRCLI or PowerProtect Data Manager UI
C. Cyber Recovery UI or CRCLI
D. PowerProtect Data Manager CLI or Cyber Recovery UI

Answer: C
Explanation:

Question: 22
Which component can add advanced analytics to Cyber Recovery?

A. Dell EMC advanced analytics


B. PowerProtect Data Manager analytics embedded tool
C. NetWorker
D. CyberSense

Answer: A
Explanation:

Question: 23
What enables and disables the air gap in cyber Recovery?

A. Backup application admin


B. Cyber Recovery software
C. PowerProtect DD admin
D. Cyber Recovery policies

Answer: D
Explanation:

Question: 24
Before performing a NetWorker recovery, what command needs to be run to determine the UID
required?

www.dumpsfire.com
Questions and Answers PDF 8/17

A. crcli policy show -n{Policy_Name}


B. crcli policy show -p{Policy_Name}
C. crcli policy get -n{Policy_Name}
D. crcli policy get -p{Policy_Name}

Answer: A
Explanation:

Question: 25

What parameter is added to the command crsetup.sh to install Cyber Recovery on a VM?

A. start
B. run
C. deploy
D. install

Answer: A
Explanation:

Question: 26
What information is contained within the CR security guide?

A. Licensing, code integrity, security patches, and malware protection


B. Access control, log files, communication, and data security
C. Data security, access control, and manual vault security
D. Access control, log files, and manual vault security

Answer: A
Explanation:

Question: 27

What should the solution architect used to determine a customer's CyberSense server requirements
based on their environment?

A. IndexEngines site
B. Sizing Calculator
C. Workload calculator
D. Cyber Recovery product guide

Answer: D
Explanation:

www.dumpsfire.com
Questions and Answers PDF 9/17

Question: 28

What are the required components of a CR Vault Environment?

A. PowerProtect DD, Dedicated Network, and CR management host


B. NTP, Cyber Recovery management host, and DNS
C. Network connection, DNS, and PowerProtect DD
D. DNS, PowerProtect DD, and NTP

Answer: A
Explanation:

Question: 29
What occurs when the CyberSense license expires?

A. CR software will completely stop


B. CR software will stop creating the PIT
C. Analyze operation will continue with a warning
D. Analyze operation fails

Answer: C
Explanation:

Question: 30

By default, what is the only connection between the production PowerProtect DD and the CR Vault
PowerProtect DD?

A. Backup link
B. Managment link
C. DD Boost link
D. MTree replication link

Answer: A
Explanation:

Question: 31
What is the grace period of the CyberSense license?

A. 90 days
B. 30 days
C. 60 days
D. 45 days

www.dumpsfire.com
Questions and Answers PDF 10/17

Answer: A
Explanation:

Question: 32

What is the minimum number of Ethernet interfaces needed for Cyber Recovery?

A. 4
B. 3
C. 1
D. 2

Answer: B
Explanation:

Question: 33
Which TCP port is used to upload or download the Docker container image?

A. 14779
B. 14780
C. 14777
D. 14778

Answer: C
Explanation:

Question: 34
Which are components of PowerProtect Cyber Recovery?

A. NetWorker, PowerProtect Data Manager, and CyberSense


B. Avamar Virtual Edition (AVE), PowerProtect DD, and CyberSense
C. Avamar, PowerProtect Data Manager, and DP Search
D. DPA, NetWorker, and PowerProtect Data Manager

Answer: A
Explanation:

Question: 35

Which operating system is supported when installing Cyber Recovery as an application?

A. SUSE Linux Enterprise 12 SP3


B. SUSE Linux Enterprise 12 SP5
C. CentOS Linux 7 SP3

www.dumpsfire.com
Questions and Answers PDF 11/17

D. CentOS Linux 7 SP5

Answer: A
Explanation:

Question: 36
Where is the CyberSense feature installed in a Cyber Recovery environment?

A. In the same host as the Cyber Recovery software.


B. In a dedicated Red Hat Enterprise Linux host in the vault.
C. In a shared CentOS host in the vault.
D. In a dedicated CentOS host in the production side.

Answer: B
Explanation:

Question: 37

An enterprise customer needs a Cyber Recovery solution to be implemented. As an outcome from a


previous workshop, the following backup environment needs to be protected to the CR Vault.
Location 1: 4 PowerProtect DDs
Location 2: 4 PowerProtect DDs
Location 3: 2 PowerProtect DDs
Location 4: 2 PowerProtect DDs
The customer wants to implement a CR Vault in a 5th location.
How many Cyber Recovery systems must be installed at a minimum level?

A. 5
B. 2
C. 7
D. 4

Answer: C
Explanation:

Question: 38

For which two default user accounts does a Cyber Recovery virtual appliance deployment require an
administrator to reset a password?

A. cyber-security-admin and crso


B. root and admin
C. admin and cyber-security-admin
D. crso and root

www.dumpsfire.com
Questions and Answers PDF 12/17

Answer: D
Explanation:

Question: 39
What are the possible connection states of the CR Vault?

A. Acked, Unlocked, Unknown, Secured, and Downgraded


B. Open, Locked, Secured, Promoted, and Unknown
C. Degraded, Down, Up, Running, and Maintenance
D. Locked, Unlocked, Unknown, Secured, and Degraded

Answer: A
Explanation:

Question: 40
Which Cyber Recovery component is used to detect, diagnose, and accelerate recovery within the
Vault?

A. Secure Data Isolation


B. Cyber Recovery Vault
C. CyberSense
D. Sandbox

Answer: B
Explanation:

Question: 41
Which application object is required to analyze the data inside the CR Vault?

A. CyberSense
B. Avamar
C. NetWorker
D. PowerProtect Data Manager

Answer: A
Explanation:

Question: 42
How much swap space is required for a host running CyberSense with 128 GB of memory?

A. 320 GB
B. 448 GB

www.dumpsfire.com
Questions and Answers PDF 13/17

C. 832 GB
D. 576 GB

Answer: A
Explanation:

Question: 43
Which statement is true for a policy?

A. Only multiple sequenced actions can be run


B. Sync and Lock actions are unable to run concurrently
C. Only single actions can be run
D. A policy can only be modified by the crso user

Answer: B
Explanation:

Question: 44

A company has DP8300 in the production environment. They would like to use the CR Vault.
What is the most efficient solution to replicate data to the CR Vault?

A. Replicate to DP8300 in the CR Vault to protect applications


B. Replicate the MTree owned by Multi Node Avamar directly to the CR Vault PowerProtect DD
C. Multi Nodes are not supported by Cyber Recovery, and data cannot be protected in the CR Vault
PowerProtect DD
D. Replicate data from Multi Node to Single Node, then replicate the MTree owned by single node to
the CR Vault PowerProtect DD

Answer: C
Explanation:

Question: 45
A customer plans to have 1 policy which replicates data into the vault daily and takes a PIT copy,
which is kept for 7 days and retention locked. The customer also plans to have one copy for the
sandbox

environment to use for testing.


How many MTrees exist on the PowerProtect DD in the Vault?

A. 8
B. 4
C. 1
D. 3

www.dumpsfire.com
Questions and Answers PDF 14/17

Answer: A
Explanation:

Question: 46
What is the result of running the ierestart -r command?

A. the CyberSense vApp is restarted


B. the CyberSense software is unpacked
C. the docker containers are removed and created
D. the docker image is successfully loaded

Answer: B
Explanation:

Question: 47
Where can workarounds on the current CR application be found?

A. User Guide
B. Release Notes
C. Product Guide
D. Installation Guide

Answer: D
Explanation:

Question: 48
What is the minimum CyberSense network configuration required when connecting to a
PowerProtect DD system?

A. One 1 GB NIC
B. One 10 GB MC
C. Two 1 GB NIC
D. Two 10 GB NIC

Answer: A
Explanation:

Question: 49
For which task is the lockbox passphrase required?

A. Perform upgrades

www.dumpsfire.com
Questions and Answers PDF 15/17

B. Upgrade license capacity


C. Recover connectivity to the CR Vault
D. Reset fingerprint

Answer: C
Explanation:

Question: 50
Which are valid components of a Cyber Recovery policy?

A. Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization,
copy, and lock
B. Objects like PowerStore and Backup software applications. Jobs such as synchronization, copy, and
lock
C. Objects like PowerProtect DD and Backup software applications. Jobs such as backup, restore, and
cleaning
D. Objects like PowerProtect DD and Backup software applications. Jobs such as synchronization,
copy, and governance

Answer: A
Explanation:

Question: 51
Which service is needed inside the CR Vault?

A. DNS
B. NTP
C. SNMP
D. Active Directory

Answer: A
Explanation:

Question: 52
What is the purpose of Denial of Service attacks?

A. launch the attack from many other host machines


B. bring down a system to initiate another attack
C. encrypt the data for ransom
D. affect the system by a business competitor

Answer: A
Explanation:

www.dumpsfire.com
Questions and Answers PDF 16/17

Question: 53

What must be done prior to restoring NetWorker data in the CR Vault?

A. Create a Sandbox
B. Initiate an analysis in CR
C. Perform a PIT Copy
D. Discover CR in NetWorker UI

Answer: D
Explanation:

Question: 54
How many PIT copies can a sandbox contain?

A. 10
B. 1
C. 2
D. 5

Answer: B
Explanation:

www.dumpsfire.com
Questions and Answers PDF 17/17

Thank You for your purchase


Dell EMC DEP-3CR1 Exam Question & Answers
PowerProtect Cyber Recovery Exam Exam

www.dumpsfire.com

You might also like