Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Why is the AWS User Canonical ID needed when emailing CyberRecoveryCloudRequest@Dell.com?

A.

For access to the Cloud Formation template

B.

To assign the sales order number to your account

C.

To determine the AWS region to deploy Cyber Recovery

D.

For access to the Cyber Recovery AMI

What is the result of running the ierestart -r command?

A.

the CyberSense vApp is restarted

B.

the CyberSense software is unpacked

C.

the docker containers are removed and created

D.

the docker image is successfully loaded

What occurs when the CyberSense license expires?

A.

CR software will completely stop

B.

CR software will stop creating the PIT

C.

Analyze operation will continue with a warning

D.

Analyze operation fails

What is a prerequisite for Avamar backups to be restored in the vault?

A.

Avamar security user must be created

B.

Avamar must be configured to replicate to the PowerProtect DD

C.

Avamar checkpoint on the PowerProtect DD must be enabled

D.

Avamar hardening must be enabled

Which operating system is supported when installing Cyber Recovery as an application?

A.

SUSE Linux Enterprise 12 SP3

B.

SUSE Linux Enterprise 12 SP5

C.

CentOS Linux 7 SP3

D.

CentOS Linux 7 SP5

What is the minimum number of Ethernet interfaces needed for Cyber Recovery?

A.

4

B.

3

C.

1

D.

2

A customer plans to have 1 policy which replicates data into the vault daily and takes a PIT copy, which is kept for 7 days and retention locked. The customer also plans to have one copy for the sandbox

environment to use for testing.

How many MTrees exist on the PowerProtect DD in the Vault?

A.

8

B.

4

C.

1

D.

3

Which script verifies that the system is ready for a CyberSense docker installation?

A.

CheckEngine.sh

B.

yum install docker-ce

C.

crsetup.sh --check

D.

repobundle-ie-docker-check

What is the purpose of Denial of Service attacks?

A.

launch the attack from many other host machines

B.

bring down a system to initiate another attack

C.

encrypt the data for ransom

D.

affect the system by a business competitor

Which statement is true for a policy?

A.

Only multiple sequenced actions can be run

B.

Sync and Lock actions are unable to run concurrently

C.

Only single actions can be run

D.

A policy can only be modified by the crso user