Exam4Training

DELL EMC D-PDD-DY-23 Dell PowerProtect DD Deploy 2023 Online Training

Question #1

A backup administrator is tasked with verifying the compression savings of a PowerProtect DD3300

Which compression algorithm will they see enabled by default

  • A . LZ
  • B . Gzfast
  • C . LZW
  • D . Gz

Reveal Solution Hide Solution

Correct Answer: B
Question #2

What is a characteristic of Dell Cloud Tier?

  • A . Scales to the maximum capacity of the active tier
  • B . The VTL vault cannot be stored in cloud tier storage
  • C . NFS, HTTPS, and CIFS are supported for data movement
  • D . Managed through a single namespace

Reveal Solution Hide Solution

Correct Answer: D
Question #3

What needs to be configured when implementing LACP on a PowerProtect DD appliance to gain access to the underlying aggregated link connection?

  • A . DD Boost Interface Groups
  • B . Physical network interface
  • C . Virtual network interface
  • D . NIC Teams

Reveal Solution Hide Solution

Correct Answer: C
Question #4

A customer’s Power Protect DD system is full. No data can be written or deleted from the system

Which two actions can the customer take to make capacity available on the system? (Select 2)

  • A . Start file system cleaning
  • B . Restart the file system
  • C . Disable MTree replication
  • D . Expire existing snapshots
  • E . Remove core and autosupport files

Reveal Solution Hide Solution

Correct Answer: AD
Question #5

Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)

  • A . Dell NetWorker
  • B . IBM Spectrum Protect
  • C . Quest vRanger
  • D . Dell PowerProtect Data Manager
  • E . Veritas NetBackup

Reveal Solution Hide Solution

Correct Answer: ADE
Question #6

With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?

  • A . Recording references to previous data and segmenting
  • B . Segmenting fingerprinting, and sending the fingerprints
  • C . Compressing segmenting, and fingerprinting
  • D . Sending the data, segmenting, and compressing

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Which are two attributes of PowerProtect High Availability? ( Select 2 )

  • A . single set of shared storage is used
  • B . Power Protect DD nodes are configured in active active mode
  • C . supported only on DD9900 systems
  • D . PowerPotect DD nodes should have dual heads

Reveal Solution Hide Solution

Correct Answer: BD
Question #8

What is the maximum backup speed of PowerProtect DD Virtual Edition using Boost

  • A . 9.0 TB/h
  • B . 2.5 TB/h
  • C . 4.2 TB/h
  • D . 7.0 TB/h

Reveal Solution Hide Solution

Correct Answer: D
Question #9

What is the correct practice when creating Fibre Chanel zones between PowerProtect DD and the media server?

  • A . dual – initiator dual – target zoning
  • B . single – initiator single – target zoning
  • C . dual – initiator single – target zoning
  • D . single – initiator dual – target zoning

Reveal Solution Hide Solution

Correct Answer: B
Question #10

What rule must be followed during an upgrade procedure with the FS25 expansion shelf?

  • A . For high performance, the connections from a controller to FS25 shelves must be over FC cables
  • B . FS25 shelf is cabled on a separate private chain
  • C . FS25 shelf must be on the same chain with DS60
  • D . ES40 SAS shelves are on the same chain as an FS25, the maximum number of shelves on that chain is five

Reveal Solution Hide Solution

Correct Answer: D

Question #11

A PowerProtect administrator wants to enable encryption on one of two existing cloud units.

Which statement is true regarding the encryption?

  • A . Cloud tier encryption is provided only by the cloud storage
  • B . Active tier encryption is required to enable encryption on the cloud tier
  • C . Once data is in the cloud you cannot change the encryption status
  • D . Encryption license is not required to enable cloud tier encryption
  • E . Encryption can be enabled on each cloud unit individually

Reveal Solution Hide Solution

Correct Answer: E
Question #12

Which command is used to add storage to either the active or cloud tier?

  • A . storage add disks
  • B . enclosure add storage
  • C . storage add cloud
  • D . storage add´enclosure

Reveal Solution Hide Solution

Correct Answer: B
Question #13

What is a use case of BoostFS

  • A . To protect applications that do not support DD Boost
  • B . To increase DD Boost throughput
  • C . To enable snapshot on DD Boost data
  • D . To implement DD Boost over Fibre Channel

Reveal Solution Hide Solution

Correct Answer: A
Question #14

For third party backup applications that do not natively support DD Boost where does the DD Boost plug – in need to installed?

  • A . On each backup client
  • B . On the Power Protect DD
  • C . On the backup server
  • D . On each media server

Reveal Solution Hide Solution

Correct Answer: C
Question #15

What is the maximum number of snapshots per MTree that can be stored on a PowerProtect DD

  • A . 100
  • B . 32
  • C . 128
  • D . 75

Reveal Solution Hide Solution

Correct Answer: C
Question #16

A backup administrator is tasked with verifying the compression savings of a PowerProtect DD9900.

Which compression algorithm will they see enabled by default?

  • A . lzw
  • B . gzfast
  • C . lz
  • D . gz

Reveal Solution Hide Solution

Correct Answer: B
Question #17

During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x).

What metrics should be monitored to find the issue?

  • A . Cleaning, NVRAM battery level, and link utilization
  • B . Stream count, CPU utilization, and replication
  • C . Stream count, disk reconstruction, and replication
  • D . NVRAM battery level, link utilization, and disk reconstruction

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?

  • A . Dell NetWorker
  • B . Dell Avamar
  • C . IBM Spectrum Protect
  • D . Veritas Backup Exec

Reveal Solution Hide Solution

Correct Answer: A
Question #19

What system role is required to create the second security officer for a PowerProtect DD?

  • A . admin
  • B . sysadmin
  • C . limited-admin
  • D . security officer

Reveal Solution Hide Solution

Correct Answer: C
Question #20

A customer needs a backup system to locally protect 200 TB of mission-critical, post-comp data.

What should be used to back up the system?

  • A . Cloud Tier
  • B . DDVE
  • C . DD6900
  • D . DD3300
  • E . DD6400

Reveal Solution Hide Solution

Correct Answer: C

Question #21

If PowerProtect DD administrator issue a cifs share destroy command, what is the result?

  • A . The CIFS share and contents of the share are deleted.
  • B . The contents of the CIFS share are deleted.
  • C . The CIFS share is deleted.

Reveal Solution Hide Solution

Correct Answer: C
Question #22

An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape.

What is a consideration when configuring the tape size?

  • A . Target single drives to write multiple streams
  • B . Target multiple drives to write single stream
  • C . Set retention periods for as long as possible
  • D . Use smaller tapes for smaller datasets

Reveal Solution Hide Solution

Correct Answer: D
Question #23

What capabilities are enabled with Retention Lock Governance?

  • A . Update or extend retention
    File level retention policies
    Rename MTree
    Audit Logging
  • B . Rename MTree
    File level retention policies
    Secure Clock
    CLI Support
    Update or extend retention
  • C . File level retention policies
    Rename MTree
    Update or extend retention
    CLI Support
  • D . Audit Logging
    Update or extend retention
    File level retention policies
    Rename MTree
    Secure Clock

Reveal Solution Hide Solution

Correct Answer: C
Question #24

An administrator is configuring an Azure cloud unit on their DD6900.

Which certificate must be imported before adding the cloud unit?

  • A . GlobalSign Root R2
  • B . GlobalSign Root R1
  • C . S3 Flexible
  • D . Baltimore CyberTrust Root CA

Reveal Solution Hide Solution

Correct Answer: D
Question #25

What is the default listen port used by PowerProtect DD systems for replication?

  • A . 623
  • B . 2051
  • C . 135
  • D . 9020

Reveal Solution Hide Solution

Correct Answer: B
Question #26

A technician is upgrading a DD9400 with a DS60 expansion shelf with 60 drives. In the GUI interface, only 30 drives are accessible.

What is causing these drives to be inaccessible?

  • A . There are not enough cache drives on the DD9400 to support the extra capacity.
  • B . A second SAS connection from DD9400 to DS60 is not activated.
  • C . There are not enough spare drives.
  • D . The capacity license applied is only for 30 drives.

Reveal Solution Hide Solution

Correct Answer: D
Question #27

Which PowerProtect DD feature protects data from accidental or malicious deletion during its retention time?

  • A . Smart Scale
  • B . Retention Lock
  • C . Data Invulnerability Architecture
  • D . Encryption

Reveal Solution Hide Solution

Correct Answer: B
Question #28

What is the maximum capacity for an on-premises DDVE with no cloud storage?

  • A . 64 TB
  • B . 96 TB
  • C . 128 TB
  • D . 256 TB

Reveal Solution Hide Solution

Correct Answer: B
Question #29

What are the steps to configure the Retention Lock Compliance?

Reveal Solution Hide Solution

Correct Answer:


Question #30

A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data.

What is the required action to achieve the customer’s goal?

  • A . Encrypt and reupload the data
  • B . Enable the encryption via cloud tier level
  • C . Activate the Data at Rest encryption
  • D . Turn off encryption and reenable

Reveal Solution Hide Solution

Correct Answer: A

Question #31

A systems administrator wants to change encryption.

Which user role is needed to log in, and what command must be run to enable the security policy?

  • A . security officer user and run authentication policy set security-officer enabled
  • B . sysadmin user and run authentication policy set security-officer enabled
  • C . security officer user and run authorization policy set security-officer enabled
  • D . sysadmin user and run authorization policy set security-officer enabled

Reveal Solution Hide Solution

Correct Answer: C
Question #32

What happens to the data when it is moved from the active tier to cloud tier?

  • A . It is deduplicated and stored in object storage the native format
  • B . It is compressed and stored as object storage in a new format
  • C . It is compressed and stored in block storage in a new format
  • D . It is deduplicated and stored in a file system in the native format

Reveal Solution Hide Solution

Correct Answer: A
Question #33

A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due to tampering of the system clock.

Which user role has the privilege required to enable the file system?

  • A . Security Officer
  • B . Admin
  • C . Limited Admin
  • D . Tenant Admin

Reveal Solution Hide Solution

Correct Answer: A
Question #34

A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack.

When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?

  • A . Expansion port of the upstream shelf
  • B . Host port of the controller
  • C . Expansion port of the controller
  • D . Host port of the downstream shelf

Reveal Solution Hide Solution

Correct Answer: A
Question #35

What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?

  • A . Cleaning is run every 10 days when the system is over 30% capacity.
  • B . Cleaning is run every 10 days using no more than 30% system resources.
  • C . Cleaning is run every 10 days using more than 30% system resources.
  • D . Cleaning is run every 10 days when the system is under 30% capacity.

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Which deduplication steps are offloaded when DSP is used?

  • A . Compress, Segment, and Filter
  • B . Segment, Fingerprint, and Compress
  • C . Fingerprint, Segment, and Filter
  • D . Filter, Fingerprint, and Segment

Reveal Solution Hide Solution

Correct Answer: B
Question #37

A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization.

Upon further investigation, the administrator discovered expired files are still present on the appliance.

What is the most likely reason for this issue?

  • A . The time of the file was set below the minimum retention period
  • B . Retention Lock feature was disabled before the expiration date
  • C . File system cleaning was disabled
  • D . Backup application failed to delete the file after expiration

Reveal Solution Hide Solution

Correct Answer: D
Question #38

In PowerProtect DD, in which folder are core files, logfiles, and upgrade packages located?

  • A . /backup
  • B . /ddvar
  • C . /data/col1
  • D . /var

Reveal Solution Hide Solution

Correct Answer: B
Question #39

Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?

  • A . VTL
  • B . DDOS
  • C . DD Boost
  • D . CIFS

Reveal Solution Hide Solution

Correct Answer: B
Question #40

What is a requirement to use the PowerProtect DD HA feature?

  • A . Each head unit requires its own FS25 shelf
  • B . Head units and nodes require an active/active configuration
  • C . A single set of shared storage
  • D . Dual set of shared storage configuration

Reveal Solution Hide Solution

Correct Answer: D

Question #41

Which type of data replication can only be used with DD Boost on a PowerProtect DD appliance?

  • A . Collection
  • B . MTree
  • C . Encrypted replication
  • D . Managed File

Reveal Solution Hide Solution

Correct Answer: C
Question #42

When using the DD VTL Tape Out to Cloud feature, which status will the tape report on the backup server once the tape is ready for long-term retention?

  • A . Offsite
  • B . Archived
  • C . Mountable
  • D . Nonmountable

Reveal Solution Hide Solution

Correct Answer: D
Question #43

An engineer is deploying a PowerProtect DD6900 system. The installation includes ES40, and DS60 expansion shelves on the same chain.

What consideration should be made when configuring the hardware?

  • A . The maximum number of ES40 shelves is four
  • B . The maximum number of DS60 shelves is five
  • C . The maximum number of ES40 shelves is six
  • D . The maximum number of DS60 shelves is six

Reveal Solution Hide Solution

Correct Answer: A
Question #44

What would the log view command display if no log name is specified?

  • A . space.log
  • B . audit.log
  • C . debug/ddfs.info
  • D . messages

Reveal Solution Hide Solution

Correct Answer: D
Question #45

An engineer is deploying a new PowerProtect DD9900 system that includes ES40, DS60, and FS25 expansion shelves.

What should the engineer consider when cabling the hardware?

  • A . The FS25 shelf should be cabled on a separate chain
  • B . The DS60 shelf should be cabled on a separate chain
  • C . The FS25 shelf must be fully populated
  • D . The DS60 shelf must be populated with identical drives

Reveal Solution Hide Solution

Correct Answer: A
Question #46

Which is required to store and manage archive data on a single PowerProtect DD appliance to comply with regulatory standards?

  • A . Dell EMC Cloud Tier
  • B . Encryption for Data at Rest
  • C . Retention Lock Governance
  • D . Retention Lock Compliance

Reveal Solution Hide Solution

Correct Answer: D
Question #47

A customer needs a backup system to protect 100 TB of mission-critical data.

What should be used to back up the system?

  • A . cloud tier
  • B . DD6900
  • C . DD3300
  • D . DDVE

Reveal Solution Hide Solution

Correct Answer: A
Question #48

A Power Protect DD system is configured for VTL. The backup application requires a minimum tape capacity of 800 GB.

What is the minimum tape type to support this requirement?

  • A . LTO-5
  • B . LTO-3
  • C . LTO-2
  • D . LTO-4

Reveal Solution Hide Solution

Correct Answer: D
Question #49

An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from physical tape.

What is a consideration when configuring the tape size?

  • A . Use multiple drives to write multiple streams
  • B . Set retention periods for as long as possible
  • C . Target multiple drives to write single stream
  • D . Use larger tapes for multiple smaller datasets

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Which command allows a system administrator to monitor clients active in the past 15 minutes?

  • A . nfs show stats
  • B . nfs show clients
  • C . nfs show detailed-stats
  • D . nfs show active

Reveal Solution Hide Solution

Correct Answer: D

Question #51

A PowerProtect DD appliance has been installed at a company’s location for several months and has reached a steady state.

As a best practice, at what percentage of disk utilization should action be taken?

  • A . 60%
  • B . 70%
  • C . 80%
  • D . 95%

Reveal Solution Hide Solution

Correct Answer: A
Question #52

Which command is used to start the initial CLI configuration wizard?

  • A . config setup
  • B . install config
  • C . config
  • D . setup

Reveal Solution Hide Solution

Correct Answer: A
Question #53

When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?

  • A . 512
  • B . 1024
  • C . 2048
  • D . 4096

Reveal Solution Hide Solution

Correct Answer: D
Question #54

What is the maximum capacity for a DDVE?

  • A . 64 TB
  • B . 96 TB
  • C . 128 TB
  • D . 256 TB

Reveal Solution Hide Solution

Correct Answer: B
Question #55

Refer to the exhibit.

Match each action to its call-out location. Select and Place:

Reveal Solution Hide Solution

Correct Answer:


Question #56

When selecting a PowerProtect DD model, which standard practices should be used to conservatively calculate capacity and throughput?

  • A . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of average backup / Backup window time
    Allow for a minimum 20% buffer in both capacity and throughput
  • B . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of largest backup / Backup window time
    Allow for a minimum 10% buffer in both capacity and throughput
  • C . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of average backup / Backup window time
    Allow for a minimum 10% buffer in both capacity and throughput
  • D . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
    Throughput: Size of largest backup / Backup window time
    Allow for a minimum 20% buffer in both capacity and throughput

Reveal Solution Hide Solution

Correct Answer: D
Question #57

When using CIFS from a PowerProtect DD system, what should be changed on a Windows machine?

  • A . SMBTimeout to 7200 seconds
  • B . CIFSTimeout to 3600 seconds
  • C . SESSTIMEOUT to 7200 seconds
  • D . SESSTIMEOUT to 3600 seconds

Reveal Solution Hide Solution

Correct Answer: D
Question #58

A backup administrator is tasked with monitoring PowerProtect DD capacity metrics. The administrator is backing up 2 TB of data daily with a reduction rate at 5x. After data reduction, subsequent full backups compress down to 100 GB.

The initial backup requires 400 GB with a 10 percent increase in the data each day. Each incremental backup is 200 GB. After data reduction, each incremental backup is 20 GB.

What is the weekly burn rate (GB) after four daily incremental backups and one weekly backup?

  • A . 180
  • B . 200
  • C . 400
  • D . 440

Reveal Solution Hide Solution

Correct Answer: A
Question #59

What are some possible network bottlenecks for a PowerProtect DD?

  • A . Configuration, wire speeds, switches and routers
  • B . Connectivity, routing protocols, and configuration
  • C . Connectivity, firewalls, and routing protocols
  • D . Routing protocols, switches and routers, and wire speeds

Reveal Solution Hide Solution

Correct Answer: D
Question #60

An administrator has observed degraded read and write throughput performance with their CIFS share.

What can the administrator disable to address the issue?

  • A . Server Signing
  • B . Restrict anonymous connection
  • C . TCP window size
  • D . Log level

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version