Which user role is needed to log in, and what command must be run to enable the security policy?
A systems administrator wants to change encryption. Which user role is needed to log in, and what command must be run to enable the security policy?A . security officer user and run authentication policy set security-officer enabledB . sysadmin user and run authentication policy set security-officer enabledC . security officer...
Which command is used to start the initial CLI configuration wizard?
Which command is used to start the initial CLI configuration wizard?A . config setupB . install configC . configD . setupView AnswerAnswer: A
What is the required action to achieve the customer's goal?
A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons, encryption will be applied to the data. What is the required action to achieve the customer's goal?A . Encrypt and reupload the dataB . Enable the encryption via cloud tier levelC . Activate...
What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?
What is the result of using the filesys clean skip schedule estimate-percent-used 30 days 10 command?A . Cleaning is run every 10 days when the system is over 30% capacity.B . Cleaning is run every 10 days using no more than 30% system resources.C . Cleaning is run every 10...
Which deduplication steps are offloaded when DSP is used?
Which deduplication steps are offloaded when DSP is used?A . Compress, Segment, and FilterB . Segment, Fingerprint, and CompressC . Fingerprint, Segment, and FilterD . Filter, Fingerprint, and SegmentView AnswerAnswer: B
If PowerProtect DD administrator issue a cifs share destroy command, what is the result?
If PowerProtect DD administrator issue a cifs share destroy command, what is the result?A . The CIFS share and contents of the share are deleted.B . The contents of the CIFS share are deleted.C . The CIFS share is deleted.View AnswerAnswer: C
Which command allows a system administrator to monitor clients active in the past 15 minutes?
Which command allows a system administrator to monitor clients active in the past 15 minutes?A . nfs show statsB . nfs show clientsC . nfs show detailed-statsD . nfs show activeView AnswerAnswer: D
Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?
Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?A . Dell NetWorkerB . Dell AvamarC . IBM Spectrum ProtectD . Veritas Backup ExecView AnswerAnswer: A
When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?
When accessing an NFS share from a PowerProtect DD appliance, what is the maximum Mount Limit value for restore instances recommended by IBM Spectrum Protect?A . 512B . 1024C . 2048D . 4096View AnswerAnswer: D
What is the weekly burn rate (GB) after four daily incremental backups and one weekly backup?
A backup administrator is tasked with monitoring PowerProtect DD capacity metrics. The administrator is backing up 2 TB of data daily with a reduction rate at 5x. After data reduction, subsequent full backups compress down to 100 GB. The initial backup requires 400 GB with a 10 percent increase in...