What is a consideration when configuring the tape size?
An organization uses tape libraries in their current backup infrastructure. They have purchased a PowerProtect DD system and plan to use VTL to move from tape. What is a consideration when configuring the tape size?A . Target single drives to write multiple streamsB . Target multiple drives to write single...
When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?
A PowerProtect DD appliance with two expansion shelves is being installed in a customer-provided rack. When cabling the controller to the shelves, what is connected to the host port on the last shelf in the chain?A . Expansion port of the upstream shelfB . Host port of the controllerC ....
Which user role is needed to log in, and what command must be run to enable the security policy?
A systems administrator wants to change encryption. Which user role is needed to log in, and what command must be run to enable the security policy?A . security officer user and run authentication policy set security-officer enabledB . sysadmin user and run authentication policy set security-officer enabledC . security officer...
Which command is used to start the initial CLI configuration wizard?
Which command is used to start the initial CLI configuration wizard?A . config setupB . install configC . configD . setupView AnswerAnswer: A
Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)
Which three backup applications are supported by the PowerProtect DD VTL? (Select 3)A . Dell NetWorkerB . IBM Spectrum ProtectC . Quest vRangerD . Dell PowerProtect Data ManagerE . Veritas NetBackupView AnswerAnswer: ADE
With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?
With DSP enabled on a PowerProtect DD appliance, which functions are performed on the backup host?A . Recording references to previous data and segmentingB . Segmenting fingerprinting, and sending the fingerprintsC . Compressing segmenting, and fingerprintingD . Sending the data, segmenting, and compressingView AnswerAnswer: B
What metrics should be monitored to find the issue?
During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor global compression rate (<1x). What metrics should be monitored to find the issue?A . Cleaning, NVRAM battery level, and link utilizationB . Stream count, CPU utilization, and replicationC . Stream count, disk reconstruction, and replicationD ....
What is a characteristic of Dell Cloud Tier?
What is a characteristic of Dell Cloud Tier?A . Scales to the maximum capacity of the active tierB . The VTL vault cannot be stored in cloud tier storageC . NFS, HTTPS, and CIFS are supported for data movementD . Managed through a single namespaceView AnswerAnswer: D
What is the correct practice when creating Fibre Chanel zones between PowerProtect DD and the media server?
What is the correct practice when creating Fibre Chanel zones between PowerProtect DD and the media server?A . dual - initiator dual - target zoningB . single - initiator single - target zoningC . dual - initiator single - target zoningD . single - initiator dual - target zoningView AnswerAnswer:...
What is a use case of BoostFS
What is a use case of BoostFSA . To protect applications that do not support DD BoostB . To increase DD Boost throughputC . To enable snapshot on DD Boost dataD . To implement DD Boost over Fibre ChannelView AnswerAnswer: A