Search Header Logo

CR parte 1 certificacion

Authored by yael perez

Instructional Technology

Professional Development

Used 3+ times

CR parte 1 certificacion
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which combination of objects and jobs are within a policy?

PowerProtect DD storage and applications, synchronization, copy, and lock

PowerProtect applications and DD storage, synchronization, and lock

PowerProtect DD storage and applications, synchronization, copy, lock, and analysis

PowerProtect Data Manager and applications, synchronization, and copy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which appliance is supported as the replication target in the CR Vault?

DP4400

DP5300

DP8300

DP8800

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what must be considered when planning and implementing a secure Cyber recovery voult solution

Production environment can use resources from Vault environment

Production environment is used to run the Cyber Recovery Management Host

Vault and Production infrastructure must be managed by NOC

Vault infrastructure is completely isolated from the Production infrastructure

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

when is the lockbox passphrase required after the installation?

To reset the security officer’s password and the root user password

To perform upgrades and recoveries from the vault

To perform recoveries from the vault and reset the root user password

To perform upgrades and reset the security officer’s password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a customer wants to use the service of an external networ operation center (NOC) / security operation center (SOC) to monitor the CR Vault enviroment what is the most secure solution if the customer wants to ensure that communication is only possible to the NOC/SOC?

Firewall

Dedicated Network Link

Data Diode

VPN Tunnel

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which Cyber Recovery rest API Section allows a user to create log bundles?

Notifications

Actions

Systems

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

why is the AWS user Canonical ID needed when when emailing CyberRecoveryCloudRequest@Dell.com

For access to the Cloud Formation template

To assign the sales order number to your account

To determine the AWS region to deploy Cyber Recovery

For access to the Cyber Recovery AMI

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?