A backup administrator is tasked with verifying the compression savings of a PowerProtect DD9900.
Which compression algorithm will they see enabled by default?
- A . lzw
- B . gzfast
- C . lz
- D . gz
During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x).
What metrics should be monitored to find the issue?
- A . Cleaning, NVRAM battery level, and link utilization
- B . Stream count, CPU utilization, and replication
- C . Stream count, disk reconstruction, and replication
- D . NVRAM battery level, link utilization, and disk reconstruction
Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?
- A . Dell NetWorker
- B . Dell Avamar
- C . IBM Spectrum Protect
- D . Veritas Backup Exec
What system role is required to create the second security officer for a PowerProtect DD?
- A . admin
- B . sysadmin
- C . limited-admin
- D . security officer
A customer needs a backup system to locally protect 200 TB of mission-critical, post-comp data.
What should be used to back up the system?
- A . Cloud Tier
- B . DDVE
- C . DD6900
- D . DD3300
- E . DD6400
If PowerProtect DD administrator issue a cifs share destroy command, what is the result?
- A . The CIFS share and contents of the share are deleted.
- B . The contents of the CIFS share are deleted.
- C . The CIFS share is deleted.
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape.
What is a consideration when configuring the tape size?
- A . Target single drives to write multiple streams
- B . Target multiple drives to write single stream
- C . Set retention periods for as long as possible
- D . Use smaller tapes for smaller datasets
What capabilities are enabled with Retention Lock Governance?
- A . Update or extend retention
File level retention policies
Rename MTree
Audit Logging - B . Rename MTree
File level retention policies
Secure Clock
CLI Support
Update or extend retention - C . File level retention policies
Rename MTree
Update or extend retention
CLI Support - D . Audit Logging
Update or extend retention
File level retention policies
Rename MTree
Secure Clock
An administrator is configuring an Azure cloud unit on their DD6900.
Which certificate must be imported before adding the cloud unit?
- A . GlobalSign Root R2
- B . GlobalSign Root R1
- C . S3 Flexible
- D . Baltimore CyberTrust Root CA
What is the default listen port used by PowerProtect DD systems for replication?
- A . 623
- B . 2051
- C . 135
- D . 9020
A technician is upgrading a DD9400 with a DS60 expansion shelf with 60 drives. In the GUI interface, only 30 drives are accessible.
What is causing these drives to be inaccessible?
- A . There are not enough cache drives on the DD9400 to support the extra capacity.
- B . A second SAS connection from DD9400 to DS60 is not activated.
- C . There are not enough spare drives.
- D . The capacity license applied is only for 30 drives.
Which PowerProtect DD feature protects data from accidental or malicious deletion during its retention time?
- A . Smart Scale
- B . Retention Lock
- C . Data Invulnerability Architecture
- D . Encryption
What is the maximum capacity for an on-premises DDVE with no cloud storage?
- A . 64 TB
- B . 96 TB
- C . 128 TB
- D . 256 TB
A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data.
What is the required action to achieve the customer’s goal?
- A . Encrypt and reupload the data
- B . Enable the encryption via cloud tier level
- C . Activate the Data at Rest encryption
- D . Turn off encryption and reenable
A systems administrator wants to change encryption.
Which user role is needed to log in, and what command must be run to enable the security policy?
- A . security officer user and run authentication policy set security-officer enabled
- B . sysadmin user and run authentication policy set security-officer enabled
- C . security officer user and run authorization policy set security-officer enabled
- D . sysadmin user and run authorization policy set security-officer enabled
What happens to the data when it is moved from the active tier to cloud tier?
- A . It is deduplicated and stored in object storage the native format
- B . It is compressed and stored as object storage in a new format
- C . It is compressed and stored in block storage in a new format
- D . It is deduplicated and stored in a file system in the native format
A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due to tampering of the system clock.
Which user role has the privilege required to enable the file system?
- A . Security Officer
- B . Admin
- C . Limited Admin
- D . Tenant Admin
A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack.
When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?
- A . Expansion port of the upstream shelf
- B . Host port of the controller
- C . Expansion port of the controller
- D . Host port of the downstream shelf
What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?
- A . Cleaning is run every 10 days when the system is over 30% capacity.
- B . Cleaning is run every 10 days using no more than 30% system resources.
- C . Cleaning is run every 10 days using more than 30% system resources.
- D . Cleaning is run every 10 days when the system is under 30% capacity.
Which deduplication steps are offloaded when DSP is used?
- A . Compress, Segment, and Filter
- B . Segment, Fingerprint, and Compress
- C . Fingerprint, Segment, and Filter
- D . Filter, Fingerprint, and Segment
A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization.
Upon further investigation, the administrator discovered expired files are still present on the appliance.
What is the most likely reason for this issue?
- A . The time of the file was set below the minimum retention period
- B . Retention Lock feature was disabled before the expiration date
- C . File system cleaning was disabled
- D . Backup application failed to delete the file after expiration
In PowerProtect DD, in which folder are core files, logfiles, and upgrade packages located?
- A . /backup
- B . /ddvar
- C . /data/col1
- D . /var
Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?
- A . VTL
- B . DDOS
- C . DD Boost
- D . CIFS
What is a requirement to use the PowerProtect DD HA feature?
- A . Each head unit requires its own FS25 shelf
- B . Head units and nodes require an active/active configuration
- C . A single set of shared storage
- D . Dual set of shared storage configuration
Which type of data replication can only be used with DD Boost on a PowerProtect DD appliance?
- A . Collection
- B . MTree
- C . Encrypted replication
- D . Managed File
When using the DD VTL Tape Out to Cloud feature, which status will the tape report on the backup server once the tape is ready for long-term retention?
- A . Offsite
- B . Archived
- C . Mountable
- D . Nonmountable
An engineer is deploying a PowerProtect DD6900 system. The installation includes ES40, and DS60 expansion shelves on the same chain.
What consideration should be made when configuring the hardware?
- A . The maximum number of ES40 shelves is four
- B . The maximum number of DS60 shelves is five
- C . The maximum number of ES40 shelves is six
- D . The maximum number of DS60 shelves is six
What would the log view command display if no log name is specified?
- A . space.log
- B . audit.log
- C . debug/ddfs.info
- D . messages
An engineer is deploying a new PowerProtect DD9900 system that includes ES40, DS60, and FS25 expansion shelves.
What should the engineer consider when cabling the hardware?
- A . The FS25 shelf should be cabled on a separate chain
- B . The DS60 shelf should be cabled on a separate chain
- C . The FS25 shelf must be fully populated
- D . The DS60 shelf must be populated with identical drives
Which is required to store and manage archive data on a single PowerProtect DD appliance to comply with regulatory standards?
- A . Dell EMC Cloud Tier
- B . Encryption for Data at Rest
- C . Retention Lock Governance
- D . Retention Lock Compliance
A customer needs a backup system to protect 100 TB of mission-critical data.
What should be used to back up the system?
- A . cloud tier
- B . DD6900
- C . DD3300
- D . DDVE
A Power Protect DD system is configured for VTL. The backup application requires a minimum tape capacity of 800 GB.
What is the minimum tape type to support this requirement?
- A . LTO-5
- B . LTO-3
- C . LTO-2
- D . LTO-4
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from physical tape.
What is a consideration when configuring the tape size?
- A . Use multiple drives to write multiple streams
- B . Set retention periods for as long as possible
- C . Target multiple drives to write single stream
- D . Use larger tapes for multiple smaller datasets
Which command allows a system administrator to monitor clients active in the past 15 minutes?
- A . nfs show stats
- B . nfs show clients
- C . nfs show detailed-stats
- D . nfs show active
A PowerProtect DD appliance has been installed at a company’s location for several months and has reached a steady state.
As a best practice, at what percentage of disk utilization should action be taken?
- A . 60%
- B . 70%
- C . 80%
- D . 95%
Which command is used to start the initial CLI configuration wizard?
- A . config setup
- B . install config
- C . config
- D . setup
When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?
- A . 512
- B . 1024
- C . 2048
- D . 4096
What is the maximum capacity for a DDVE?
- A . 64 TB
- B . 96 TB
- C . 128 TB
- D . 256 TB
Refer to the exhibit.
Match each action to its call-out location. Select and Place:
When selecting a PowerProtect DD model, which standard practices should be used to conservatively calculate capacity and throughput?
- A . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of average backup / Backup window time
Allow for a minimum 20% buffer in both capacity and throughput - B . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of largest backup / Backup window time
Allow for a minimum 10% buffer in both capacity and throughput - C . Capacity: First full backup + First incremental backup + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of average backup / Backup window time
Allow for a minimum 10% buffer in both capacity and throughput - D . Capacity: First full backup + Incremental backups + (Weekly cycle * Number of weeks data is retained)
Throughput: Size of largest backup / Backup window time
Allow for a minimum 20% buffer in both capacity and throughput
When using CIFS from a PowerProtect DD system, what should be changed on a Windows machine?
- A . SMBTimeout to 7200 seconds
- B . CIFSTimeout to 3600 seconds
- C . SESSTIMEOUT to 7200 seconds
- D . SESSTIMEOUT to 3600 seconds
A backup administrator is tasked with monitoring PowerProtect DD capacity metrics. The administrator is backing up 2 TB of data daily with a reduction rate at 5x. After data reduction, subsequent full backups compress down to 100 GB.
The initial backup requires 400 GB with a 10 percent increase in the data each day. Each incremental backup is 200 GB. After data reduction, each incremental backup is 20 GB.
What is the weekly burn rate (GB) after four daily incremental backups and one weekly backup?
- A . 180
- B . 200
- C . 400
- D . 440
What are some possible network bottlenecks for a PowerProtect DD?
- A . Configuration, wire speeds, switches and routers
- B . Connectivity, routing protocols, and configuration
- C . Connectivity, firewalls, and routing protocols
- D . Routing protocols, switches and routers, and wire speeds
An administrator has observed degraded read and write throughput performance with their CIFS share.
What can the administrator disable to address the issue?
- A . Server Signing
- B . Restrict anonymous connection
- C . TCP window size
- D . Log level
What is one advantage of using PowerProtect DD instead of backing up to other disk-based file systems?
- A . Data is stored locally on the client for fast restore.
- B . Only deduplicated data is sent across the network.
- C . Only deduplicated blocks of data are needed for full recovery.
- D . Data can be restored to any client operating system.
Which types of replication are supported in a PowerProtect DD appliance?
- A . Collection, Directory, MTree, Pool, and Managed File
- B . Synchronous, Collection, MTree, Managed File, and Directory
- C . MTree, Collection, and Directory only
- D . Asynchronous, Collection, Directory, and MTree
After adding expansion shelves, an administrator verifies the state of the new disks with the command disk show state is unknown.
Which command will make these disks available?
- A . disk rescan command for each unknown disk
- B . disk unfail command for all unknown disks available
- C . disk rebuild command for all unknown disks available
- D . disk unfail command for each unknown disk individually
Which method can be used to configure remote logging with syslog?
- A . The DD System Manager Maintenance > Logs page
- B . The REST API query in /nwrestapi/v3/global/alerts
- C . The log host command
- D . The log change command
What are the terminal emulation settings that are used to establish serial communication with a PowerProtect DD system?
- A . BAUD Rate: 116200
Data Bits: 8
Stop Bits: 1
Parity: Even
Flow Control: Xon/XOFF - B . BAUD Rate: 115200
Data Bits: 8
Stop Bits: 1
Parity: None
Flow Control: None - C . BAUD Rate: 115200
Data Bits: 1
Stop Bits: 2
Parity: None
Flow Control: None - D . BAUD Rate: 116200
Data Bits: 1
Stop Bits: 2
Parity: Odd
Flow Control: Xon/XOFF