A backup administrator is tasked with verifying the compression savings of a PowerProtect DD3300
Which compression algorithm will they see enabled by default?
- A . LZ
- B . Gzfast
- C . LZW
- D . Gz
What is a characteristic of Dell Cloud Tier?
- A . Scales to the maximum capacity of the active tier
- B . The VTL vault cannot be stored in cloud tier storage
- C . NFS, HTTPS, and CIFS are supported for data movement
- D . Managed through a single namespace
What needs to be configured when implementing LACP on a PowerProtect DD appliance to gain access to the underlying aggregated link connection?
- A . DD Boost Interface Groups
- B . Physical network interface
- C . Virtual network interface
- D . NIC Teams
A customer’s Power Protect DD system is full. No data can be written or deleted from the system
Which two actions can the customer take to make capacity available on the system? (Select 2)
- A . Start file system cleaning
- B . Restart the file system
- C . Disable MTree replication
- D . Expire existing snapshots
- E . Remove core and autosupport files
Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)
- A . Dell NetWorker
- B . IBM Spectrum Protect
- C . Quest vRanger
- D . Dell PowerProtect Data Manager
- E . Veritas NetBackup
With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?
- A . Recording references to previous data and segmenting
- B . Segmenting fingerprinting, and sending the fingerprints
- C . Compressing segmenting, and fingerprinting
- D . Sending the data, segmenting, and compressing
Which are two attributes of PowerProtect High Availability? ( Select 2 )
- A . single set of shared storage is used
- B . Power Protect DD nodes are configured in active active mode
- C . supported only on DD9900 systems
- D . PowerPotect DD nodes should have dual heads
What is the maximum backup speed of PowerProtect DD Virtual Edition using Boost?
- A . 9.0 TB/h
- B . 2.5 TB/h
- C . 4.2 TB/h
- D . 7.0 TB/h
What is the correct practice when creating Fibre Chanel zones between PowerProtect DD and the media server?
- A . dual – initiator dual – target zoning
- B . single – initiator single – target zoning
- C . dual – initiator single – target zoning
- D . single – initiator dual – target zoning
What rule must be followed during an upgrade procedure with the FS25 expansion shelf?
- A . For high performance, the connections from a controller to FS25 shelves must be over FC cables
- B . FS25 shelf is cabled on a separate private chain
- C . FS25 shelf must be on the same chain with DS60
- D . ES40 SAS shelves are on the same chain as an FS25, the maximum number of shelves on that chain is five
A PowerProtect administrator wants to enable encryption on one of two existing cloud units.
Which statement is true regarding the encryption?
- A . Cloud tier encryption is provided only by the cloud storage
- B . Active tier encryption is required to enable encryption on the cloud tier
- C . Once data is in the cloud you cannot change the encryption status
- D . Encryption license is not required to enable cloud tier encryption
- E . Encryption can be enabled on each cloud unit individually
Which command is used to add storage to either the active or cloud tier?
- A . storage add disks
- B . enclosure add storage
- C . storage add cloud
- D . storage add´enclosure
What is a use case of BoostFS?
- A . To protect applications that do not support DD Boost
- B . To increase DD Boost throughput
- C . To enable snapshot on DD Boost data
- D . To implement DD Boost over Fibre Channel
For third party backup applications that do not natively support DD Boost where does the DD Boost plug – in need to installed?
- A . On each backup client
- B . On the Power Protect DD
- C . On the backup server
- D . On each media server
What is the maximum number of snapshots per MTree that can be stored on a PowerProtect DD?
- A . 100
- B . 32
- C . 128
- D . 75
A backup administrator is tasked with verifying the compression savings of a PowerProtect DD9900.
Which compression algorithm will they see enabled by default?
- A . lzw
- B . gzfast
- C . lz
- D . gz
During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x).
What metrics should be monitored to find the issue?
- A . Cleaning, NVRAM battery level, and link utilization
- B . Stream count, CPU utilization, and replication
- C . Stream count, disk reconstruction, and replication
- D . NVRAM battery level, link utilization, and disk reconstruction
Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?
- A . Dell NetWorker
- B . Dell Avamar
- C . IBM Spectrum Protect
- D . Veritas Backup Exec
What system role is required to create the second security officer for a PowerProtect DD?
- A . admin
- B . sysadmin
- C . limited-admin
- D . security officer
A customer needs a backup system to locally protect 200 TB of mission-critical, post-comp data.
What should be used to back up the system?
- A . Cloud Tier
- B . DDVE
- C . DD6900
- D . DD3300
- E . DD6400
If PowerProtect DD administrator issue a cifs share destroy command, what is the result?
- A . The CIFS share and contents of the share are deleted.
- B . The contents of the CIFS share are deleted.
- C . The CIFS share is deleted.
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape.
What is a consideration when configuring the tape size?
- A . Target single drives to write multiple streams
- B . Target multiple drives to write single stream
- C . Set retention periods for as long as possible
- D . Use smaller tapes for smaller datasets
What capabilities are enabled with Retention Lock Governance?
- A . Update or extend retention
File level retention policies
Rename MTree
Audit Logging - B . Rename MTree
File level retention policies
Secure Clock
CLI Support
Update or extend retention - C . File level retention policies
Rename MTree
Update or extend retention
CLI Support - D . Audit Logging
Update or extend retention
File level retention policies
Rename MTree
Secure Clock
An administrator is configuring an Azure cloud unit on their DD6900.
Which certificate must be imported before adding the cloud unit?
- A . GlobalSign Root R2
- B . GlobalSign Root R1
- C . S3 Flexible
- D . Baltimore CyberTrust Root CA
What is the default listen port used by PowerProtect DD systems for replication?
- A . 623
- B . 2051
- C . 135
- D . 9020
A technician is upgrading a DD9400 with a DS60 expansion shelf with 60 drives. In the GUI interface, only 30 drives are accessible.
What is causing these drives to be inaccessible?
- A . There are not enough cache drives on the DD9400 to support the extra capacity.
- B . A second SAS connection from DD9400 to DS60 is not activated.
- C . There are not enough spare drives.
- D . The capacity license applied is only for 30 drives.
Which PowerProtect DD feature protects data from accidental or malicious deletion during its retention time?
- A . Smart Scale
- B . Retention Lock
- C . Data Invulnerability Architecture
- D . Encryption
What is the maximum capacity for an on-premises DDVE with no cloud storage?
- A . 64 TB
- B . 96 TB
- C . 128 TB
- D . 256 TB
A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data.
What is the required action to achieve the customer’s goal?
- A . Encrypt and reupload the data
- B . Enable the encryption via cloud tier level
- C . Activate the Data at Rest encryption
- D . Turn off encryption and reenable
A systems administrator wants to change encryption.
Which user role is needed to log in, and what command must be run to enable the security policy?
- A . security officer user and run authentication policy set security-officer enabled
- B . sysadmin user and run authentication policy set security-officer enabled
- C . security officer user and run authorization policy set security-officer enabled
- D . sysadmin user and run authorization policy set security-officer enabled
What happens to the data when it is moved from the active tier to cloud tier?
- A . It is deduplicated and stored in object storage the native format
- B . It is compressed and stored as object storage in a new format
- C . It is compressed and stored in block storage in a new format
- D . It is deduplicated and stored in a file system in the native format
A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due to tampering of the system clock.
Which user role has the privilege required to enable the file system?
- A . Security Officer
- B . Admin
- C . Limited Admin
- D . Tenant Admin
A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack.
When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?
- A . Expansion port of the upstream shelf
- B . Host port of the controller
- C . Expansion port of the controller
- D . Host port of the downstream shelf
What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?
- A . Cleaning is run every 10 days when the system is over 30% capacity.
- B . Cleaning is run every 10 days using no more than 30% system resources.
- C . Cleaning is run every 10 days using more than 30% system resources.
- D . Cleaning is run every 10 days when the system is under 30% capacity.
Which deduplication steps are offloaded when DSP is used?
- A . Compress, Segment, and Filter
- B . Segment, Fingerprint, and Compress
- C . Fingerprint, Segment, and Filter
- D . Filter, Fingerprint, and Segment
A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization.
Upon further investigation, the administrator discovered expired files are still present on the appliance.
What is the most likely reason for this issue?
- A . The time of the file was set below the minimum retention period
- B . Retention Lock feature was disabled before the expiration date
- C . File system cleaning was disabled
- D . Backup application failed to delete the file after expiration
In PowerProtect DD, in which folder are core files, logfiles, and upgrade packages located?
- A . /backup
- B . /ddvar
- C . /data/col1
- D . /var
Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?
- A . VTL
- B . DDOS
- C . DD Boost
- D . CIFS
What is a requirement to use the PowerProtect DD HA feature?
- A . Each head unit requires its own FS25 shelf
- B . Head units and nodes require an active/active configuration
- C . A single set of shared storage
- D . Dual set of shared storage configuration
Which type of data replication can only be used with DD Boost on a PowerProtect DD appliance?
- A . Collection
- B . MTree
- C . Encrypted replication
- D . Managed File
When using the DD VTL Tape Out to Cloud feature, which status will the tape report on the backup server once the tape is ready for long-term retention?
- A . Offsite
- B . Archived
- C . Mountable
- D . Nonmountable
An engineer is deploying a PowerProtect DD6900 system. The installation includes ES40, and DS60 expansion shelves on the same chain.
What consideration should be made when configuring the hardware?
- A . The maximum number of ES40 shelves is four
- B . The maximum number of DS60 shelves is five
- C . The maximum number of ES40 shelves is six
- D . The maximum number of DS60 shelves is six
What would the log view command display if no log name is specified?
- A . space.log
- B . audit.log
- C . debug/ddfs.info
- D . messages
An engineer is deploying a new PowerProtect DD9900 system that includes ES40, DS60, and FS25 expansion shelves.
What should the engineer consider when cabling the hardware?
- A . The FS25 shelf should be cabled on a separate chain
- B . The DS60 shelf should be cabled on a separate chain
- C . The FS25 shelf must be fully populated
- D . The DS60 shelf must be populated with identical drives
Which is required to store and manage archive data on a single PowerProtect DD appliance to comply with regulatory standards?
- A . Dell EMC Cloud Tier
- B . Encryption for Data at Rest
- C . Retention Lock Governance
- D . Retention Lock Compliance
A customer needs a backup system to protect 100 TB of mission-critical data.
What should be used to back up the system?
- A . cloud tier
- B . DD6900
- C . DD3300
- D . DDVE
A Power Protect DD system is configured for VTL. The backup application requires a minimum tape capacity of 800 GB.
What is the minimum tape type to support this requirement?
- A . LTO-5
- B . LTO-3
- C . LTO-2
- D . LTO-4
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from physical tape.
What is a consideration when configuring the tape size?
- A . Use multiple drives to write multiple streams
- B . Set retention periods for as long as possible
- C . Target multiple drives to write single stream
- D . Use larger tapes for multiple smaller datasets
Which command allows a system administrator to monitor clients active in the past 15 minutes?
- A . nfs show stats
- B . nfs show clients
- C . nfs show detailed-stats
- D . nfs show active
A PowerProtect DD appliance has been installed at a company’s location for several months and has reached a steady state.
As a best practice, at what percentage of disk utilization should action be taken?
- A . 60%
- B . 70%
- C . 80%
- D . 95%
Which command is used to start the initial CLI configuration wizard?
- A . config setup
- B . install config
- C . config
- D . setup
When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?
- A . 512
- B . 1024
- C . 2048
- D . 4096
What is the maximum capacity for a DDVE?
- A . 64 TB
- B . 96 TB
- C . 128 TB
- D . 256 TB
Refer to the exhibit.
Match each action to its call-out location. Select and Place:
When selecting a PowerProtect DD model, which standard practices should be used to conservatively calculate capacity and throughput?
- A . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of average backup / Backup window time
Allow for a minimum 20% buffer in both capacity and throughput - B . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of largest backup / Backup window time
Allow for a minimum 10% buffer in both capacity and throughput - C . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of average backup / Backup window time
Allow for a minimum 10% buffer in both capacity and throughput - D . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of largest backup / Backup window time
Allow for a minimum 20% buffer in both capacity and throughput
When using CIFS from a PowerProtect DD system, what should be changed on a Windows machine?
- A . SMBTimeout to 7200 seconds
- B . CIFSTimeout to 3600 seconds
- C . SESSTIMEOUT to 7200 seconds
- D . SESSTIMEOUT to 3600 seconds
A backup administrator is tasked with monitoring PowerProtect DD capacity metrics. The administrator is backing up 2 TB of data daily with a reduction rate at 5x. After data reduction, subsequent full backups compress down to 100 GB.
The initial backup requires 400 GB with a 10 percent increase in the data each day. Each incremental backup is 200 GB. After data reduction, each incremental backup is 20 GB.
What is the weekly burn rate (GB) after four daily incremental backups and one weekly backup?
- A . 180
- B . 200
- C . 400
- D . 440
What are some possible network bottlenecks for a PowerProtect DD?
- A . Configuration, wire speeds, switches and routers
- B . Connectivity, routing protocols, and configuration
- C . Connectivity, firewalls, and routing protocols
- D . Routing protocols, switches and routers, and wire speeds
An administrator has observed degraded read and write throughput performance with their CIFS share.
What can the administrator disable to address the issue?
- A . Server Signing
- B . Restrict anonymous connection
- C . TCP window size
- D . Log level
What is one advantage of using PowerProtect DD instead of backing up to other disk-based file systems?
- A . Data is stored locally on the client for fast restore.
- B . Only deduplicated data is sent across the network.
- C . Only deduplicated blocks of data are needed for full recovery.
- D . Data can be restored to any client operating system.
Which types of replication are supported in a PowerProtect DD appliance?
- A . Collection, Directory, MTree, Pool, and Managed File
- B . Synchronous, Collection, MTree, Managed File, and Directory
- C . MTree, Collection, and Directory only
- D . Asynchronous, Collection, Directory, and MTree
After adding expansion shelves, an administrator verifies the state of the new disks with the command disk show state is unknown.
Which command will make these disks available?
- A . disk rescan command for each unknown disk
- B . disk unfail command for all unknown disks available
- C . disk rebuild command for all unknown disks available
- D . disk unfail command for each unknown disk individually
Which method can be used to configure remote logging with syslog?
- A . The DD System Manager Maintenance > Logs page
- B . The REST API query in /nwrestapi/v3/global/alerts
- C . The log host command
- D . The log change command
What are the terminal emulation settings that are used to establish serial communication with a PowerProtect DD system?
- A . BAUD Rate: 116200
Data Bits: 8
Stop Bits: 1
Parity: Even
Flow Control: Xon/XOFF - B . BAUD Rate: 115200
Data Bits: 8
Stop Bits: 1
Parity: None
Flow Control: None - C . BAUD Rate: 115200
Data Bits: 1
Stop Bits: 2
Parity: None
Flow Control: None - D . BAUD Rate: 116200
Data Bits: 1
Stop Bits: 2
Parity: Odd
Flow Control: Xon/XOFF
An administrator is using a BoostFS agent running on both Linux and Microsoft Windows servers.
What is the benefit of using BoostFS?
- A . More data compression
- B . Capacity efficiency
- C . Link aggregation with dynamic interface groups
- D . Backup window and replication improve
What three steps are required to integrate the PowerProtect DD appliance into the IBM Spectrum Protect environment using the NFS protocol on a Linux server? (Select 3)
- A . Install the Spectrum Protect application.
- B . Install Spectrum Protect Agent to Client Node.
- C . Configure the Spectrum Protect server for backups with an NFS mount export.
- D . Configure the PowerProtect DD appliance for NFS networking.
- E . Configure NFS share on Client Node side.
What is the order of steps to configure DD Boost on a PowerProtect DD appliance?
A customer needs to use DD Retention Lock Compliance to ensure that data integrity is maintained.
Which PowerProtect DD systems meet the customer’s requirement?
- A . DD3300, DD6900, and DD9400
- B . DDVE, DD3300, and DD6900
- C . DD6900, DDVE, and DD9400
- D . DD9400, DDVE, and DD9900
An administrator is scaling Cloud Tier for a DD9900 by adding a second cloud unit.
What is the required amount of metadata storage (TB)?
- A . 120
- B . 240
- C . 300
- D . 500
Which are supported compression algorithms in DDOS?
- A . lz, gz, and gzfast
- B . dsp, gz, and lz
- C . rle, lzw, and lz
- D . bmp, lz, and gz
Which protocols are supported by PowerProtect DD appliances for data movement to the Cloud Tier?
- A . CIFS, NFS, and DD Boost
- B . VTL, CIFS, and NFS
- C . DD Boost and CIFS only
- D . NFS and CIFS only
A company is using Amazon Web Services as a cloud provider and needs to create a cloud unit.
Which certificate must be imported to the PowerProtect DD appliance?
- A . AWS Root CA certificate
- B . Baltimore CyberTrust Root CA certificate
- C . Digicert High Assurance Root CA certificate
- D . Dell EMC Root certificate
A storage administrator finished the zoning between the PowerProtect DD and the NetWorker backup server.
How can they verify that the zoning was completed properly and the server HBA are visible?
- A . scsitarget initiator show list
- B . scsitarget show initiator list
- C . scsitarget show initiator
- D . scsitarget initiator list
Which port/protocol is used when using a syslog server to monitor a PowerProtect DD system?
- A . 514/UDP
- B . 2051/TCP
- C . 514/TCP
- D . 2051/UDP
What action needs to be taken to create the iDRAC users on the Compliance Retention Lock PowerProtect DD?
- A . user create idrac [username]
- B . Use the iDRAC GUI
- C . user add [username] role idrac
- D . user idrac create
An engineer is attempting to add an ES40 shelf to a PowerProtect DD9400. The system currently has one DS60 and four ES40 shelves on the same chain. The system does not recognize the additional shelf.
Why has this occurred?
- A . The maximum number of shelves on the chain is exceeded
- B . An active tier license must be added for additional storage
- C . ES40 and DS60 shelves must be placed on separate chains
- D . The system capacity license is insufficient
An administrator notices that several disks on a shelf show as unknown.
What should be done to resolve this issue?
- A . Enter the disk unfail command for the unknown disks
- B . Enter the storage add enclosure command
- C . Ensure the expansion shelf is cabled properly
- D . Cycle the power on the newly added expansion shelf
Which command displays the RAID group information for the active tier of each shelf?
- A . raid show info
- B . storage show all
- C . filesys show info
- D . raid show all
A customer needs help deploying a shared PowerProtect DD. They ask for best practices when configuring SMT.
What network-related attributes must they configure to increase the security of each tenant unit?
- A . – Tenant unit Hostname
– Local Data Access IP addresses
– Remote Data Access IP Addresses
– Default Gateway - B . – Tenant Unit IP Addresses
– Tenant Unit Firewall Ports
– Remote Data Access IP
– Addresses Default Gateway - C . – Local Data Access IP addresses
– Remote Data Access IP Addresses
– Default Gateway
– Tenant Unit Firewall Ports - D . – Remote Data Access IP
– Addresses Default Gateway
– Tenant Unit Virtual Interfaces
– Tenant Unit Hostname
A backup administrator is investigating the File System Log of their source DD9900. They noticed an error on the file system and quickly corrected the issue. However, 30 minutes after making the fix, the error status has not changed.
Why is the error still appearing in the File System Log?
- A . System status messages are updated every 45 minutes
- B . Corrected errors do not reappear in logs
- C . System status messages are updated hourly
- D . System status messages are only available through CLI
An administrator recognizes poor network performance when using CIFS shares from a PowerProtect DD system. The network link utilization is under 100%.
What is the most likely cause of this issue?
- A . TCP window size too small
- B . TCP timeout too small
- C . TCP timeout too large
- D . TCP window size too large
Refer to the exhibit.
To which shelf and port should SAS HBA slot 1 port B be connected?
- A . Shelf 04 BH
- B . Shelf 01 BH
- C . Shelf 04 BE
- D . Shelf 01 BE
What is the maximum number of supported tape drives that can be configured using PowerProtect DD with at least 60 CPU cores?
- A . 526
- B . 512
- C . 1080
- D . Unlimited
What rule must be followed during an upgrade procedure with the FS25 expansion shelf?
- A . FS25 shelf is cabled on a separate private chain
- B . For high performance, the connections from a controller to FS25 shelves must be over FC cables
- C . FS25 shelf must be on the same chain with DS60
- D . If ES40 SAS shelves are on the same chain as an FS25, the maximum number of shelves on that chain is five
A backup administrator needs to add capacity to a file system. After the installation of an ES40, they need to verify the total amount of data stored before data reduction.
Which command would be used to verify this information?
- A . filesys status
- B . filesys show summary
- C . enclosure show summary
- D . filesys show space
A company has implemented many-to-one replication between PowerProtect DD appliances.
Which types of replication are supported by this topology?
- A . Directory and MTree
- B . MTree and Collection
- C . Collection and Directory
- D . Managed File and MTree
In a PowerProtect DD backup environment, what is used for writing to and reading from the backup targets in Veritas Backup Exec?
- A . Storage Node
- B . Master Server
- C . Media Agents
- D . Media Server
A PowerProtect DD with two ES40 expansion shelves was just installed. An error message is received.
What is the most likely reason?
- A . The controller HBA port connects to the host port of an expansion shelf
- B . The expansion port on the shelf connects downstream to the host port of the next shelf
- C . The host port on the expansion shelf connects upstream to the controller
- D . The expansion port on the last shelf connects back to the controller
What does the system setup wizard require to set up a VTL on a PowerProtect DD system?
- A . DHCP
- B . Gateway IP
- C . HBA
- D . WWPNs