
CR parte 1 certificacion
Authored by yael perez
Instructional Technology
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which combination of objects and jobs are within a policy?
PowerProtect DD storage and applications, synchronization, copy, and lock
PowerProtect applications and DD storage, synchronization, and lock
PowerProtect DD storage and applications, synchronization, copy, lock, and analysis
PowerProtect Data Manager and applications, synchronization, and copy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which appliance is supported as the replication target in the CR Vault?
DP4400
DP5300
DP8300
DP8800
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what must be considered when planning and implementing a secure Cyber recovery voult solution
Production environment can use resources from Vault environment
Production environment is used to run the Cyber Recovery Management Host
Vault and Production infrastructure must be managed by NOC
Vault infrastructure is completely isolated from the Production infrastructure
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
when is the lockbox passphrase required after the installation?
To reset the security officer’s password and the root user password
To perform upgrades and recoveries from the vault
To perform recoveries from the vault and reset the root user password
To perform upgrades and reset the security officer’s password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a customer wants to use the service of an external networ operation center (NOC) / security operation center (SOC) to monitor the CR Vault enviroment what is the most secure solution if the customer wants to ensure that communication is only possible to the NOC/SOC?
Firewall
Dedicated Network Link
Data Diode
VPN Tunnel
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
which Cyber Recovery rest API Section allows a user to create log bundles?
Notifications
Actions
Systems
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
why is the AWS user Canonical ID needed when when emailing CyberRecoveryCloudRequest@Dell.com
For access to the Cloud Formation template
To assign the sales order number to your account
To determine the AWS region to deploy Cyber Recovery
For access to the Cyber Recovery AMI
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?