What happens to the data when it is moved from the active tier to cloud tier?
What happens to the data when it is moved from the active tier to cloud tier?A . It is deduplicated and stored in object storage the native formatB . It is compressed and stored as object storage in a new formatC . It is compressed and stored in block storage...
Which command is used to add storage to either the active or cloud tier?
Which command is used to add storage to either the active or cloud tier?A . storage add disksB . enclosure add storageC . storage add cloudD . storage add´enclosureView AnswerAnswer: B
Which are two attributes of PowerProtect High Availability? ( Select 2 )
Which are two attributes of PowerProtect High Availability? ( Select 2 )A . single set of shared storage is usedB . Power Protect DD nodes are configured in active active modeC . supported only on DD9900 systemsD . PowerPotect DD nodes should have dual headsView AnswerAnswer: BD
Which user role has the privilege required to enable the file system?
A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due to tampering of the system clock. Which user role has the privilege required to enable the file system?A . Security OfficerB . AdminC . Limited AdminD . Tenant AdminView AnswerAnswer: A
What is a consideration when configuring the tape size?
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape. What is a consideration when configuring the tape size?A . Target single drives to write multiple streamsB . Target multiple drives to write single...
When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?
A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack. When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?A . Expansion port of the upstream shelfB . Host port of the controllerC ....
Which user role is needed to log in, and what command must be run to enable the security policy?
A systems administrator wants to change encryption. Which user role is needed to log in, and what command must be run to enable the security policy?A . security officer user and run authentication policy set security-officer enabledB . sysadmin user and run authentication policy set security-officer enabledC . security officer...
Which command is used to start the initial CLI configuration wizard?
Which command is used to start the initial CLI configuration wizard?A . config setupB . install configC . configD . setupView AnswerAnswer: A
Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)
Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)A . Dell NetWorkerB . IBM Spectrum ProtectC . Quest vRangerD . Dell PowerProtect Data ManagerE . Veritas NetBackupView AnswerAnswer: ADE
With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?
With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?A . Recording references to previous data and segmentingB . Segmenting fingerprinting, and sending the fingerprintsC . Compressing segmenting, and fingerprintingD . Sending the data, segmenting, and compressingView AnswerAnswer: B