While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?
While performing the post-checks for a newly restored Avamar server from the CR Vault, which Avamar command needs to be run to configure the Avamar management console?A . mcserver.sh--mccliB . av maint-mccliC . dpnctl_mccliD . avsetup_mccliView AnswerAnswer: D
Which combination of objects and jobs are within a policy?
Which combination of objects and jobs are within a policy?A . Power Protect DD storage and applications, synchronization, copy, and lockB . Power Protect applications and DD storage, synchronization, and lockC . Power Protect DD storage and applications, synchronization, copy, lock, and analysisD . Power Protect Data Manager and applications,...
Which statement is true for a policy?
Which statement is true for a policy?A . Only multiple sequenced actions can be runB . Sync and Lock actions are unable to run concurrentlyC . Only single actions can be runD . A policy can only be modified by the cr so userView AnswerAnswer: B
Which operating system is supported when installing Cyber Recovery as an application?
Which operating system is supported when installing Cyber Recovery as an application?A . SUSE Linux Enterprise 12SP 3B . SUSE Linux Enterprise 12SP 5C . CentOS Linux 7SP 3D . CentOS Linux 7SP 5View AnswerAnswer: A
What are the possible connection states of the CR Vault?
What are the possible connection states of the CR Vault?A . Acked, Unlocked, Unknown, Secured, and DowngradedB . Open, Locked, Secured, Promoted, and UnknownC . Degraded, Down, Up, Running, and MaintenanceD . Locked, Unlocked, Unknown, Secured, and DegradedView AnswerAnswer: A
Which TCP port is used to upload or download the Docker container image?
Which TCP port is used to upload or download the Docker container image?A . 14779B . 14780C . 14777D . 14778View AnswerAnswer: C
What should the solution architect used to determine a customer's Cyber Sense server requirements based on their environment?
What should the solution architect used to determine a customer's Cyber Sense server requirements based on their environment?A . Index Engines siteB . Sizing CalculatorC . Workload calculatorD . Cyber Recovery product guideView AnswerAnswer: D
Which combination of objects and jobs are within a policy?
Which combination of objects and jobs are within a policy?A . Power Protect DD storage and applications, synchronization, copy, and lockB . Power Protect applications and DD storage, synchronization, and lockC . Power Protect DD storage and applications, synchronization, copy, lock, and analysisD . Power Protect Data Manager and applications,...
Which appliance is supported as the replication target in the CR Vault?
Which appliance is supported as the replication target in the CR Vault?A . DP4400B . DP5300C . DP8300D . DP8800View AnswerAnswer: C
When is the lockbox passphrase required after the installation?
When is the lockbox passphrase required after the installation?A . To reset the security officer's password and the root user passwordB . To perform upgrades and recoveries from the vaultC . To perform recoveries from the vault and reset the root user passwordD . To perform upgrades and reset the...