What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?A . Production environment can use resources from Vault environmentB . Production environment is used to run the Cyber Recovery Management HostC . Vault and Production infrastructure must be managed by NOCD . Vault infrastructure is completely...
Which appliance is supported as the replication target in the CR Vault?
Which appliance is supported as the replication target in the CR Vault?A . DP4400B . DP5300C . DP8300D . DP8800View AnswerAnswer: C
Which Cyber Recovery REST API section allows a user to create log bundles?
Which Cyber Recovery REST API section allows a user to create log bundles?A . NotificationsB . ActionsC . SystemsD . AuthenticationView AnswerAnswer: A
What are the required components of a CR Vault Environment?
What are the required components of a CR Vault Environment?A . Power Protect DD, Dedicated Network, and CR management hostB . NTP, Cyber Recovery management host, and DNSC . Network connection, DNS, and Power Protect DDD . DNS, Power Protect DD, and NTPView AnswerAnswer: A
the NOC/SOC?
A customer wants to use the service of an external network operation center (NOC) /security operation center (SOC) to monitor the CR Vault environment What is the most secure solution if the customer wants to ensure that communication is only possible to the NOC/SOC?A . FirewallB . Dedicated Network LinkC...
What is the result of running the ie restart-r command?
What is the result of running the ie restart-r command?A . the Cyber Sense v App is restartedB . the Cyber Sense software is unpackedC . the docker containers are removed and createdD . the docker image is successfully loadedView AnswerAnswer: B
What is the result of running the ie restart-r command?
What is the result of running the ie restart-r command?A . the Cyber Sense v App is restartedB . the Cyber Sense software is unpackedC . the docker containers are removed and createdD . the docker image is successfully loadedView AnswerAnswer: B
Before performing a NetWorker recovery, what command needs to be run to determine the UID required?
Before performing a NetWorker recovery, what command needs to be run to determine the UID required?A . crcli policy show-n{Policy_Name}B . crcli policy show-p{Policy_Name}C . crcli policy get-n{Policy_Name}D . crcli policy get-p{Policy_Name}View AnswerAnswer: A
Which TCP port is used to upload or download the Docker container image?
Which TCP port is used to upload or download the Docker container image?A . 14779B . 14780C . 14777D . 14778View AnswerAnswer: C
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
What must be considered when planning and implementing a secure Cyber Recovery Vault solution?A . Production environment can use resources from Vault environmentB . Production environment is used to run the Cyber Recovery Management HostC . Vault and Production infrastructure must be managed by NOCD . Vault infrastructure is completely...