What system role is required to create the second security officer for a PowerProtect DD?
A. limited-admin
B. security offic
C. sysadmin
D. admin
Which component executes the read/write requests in a backup environment consisting of a PowerProtect DD appliance and IBM Spectrum Protect?
A. Media Server
B. Media Agent
C. Spectrum Protect Server
D. Master Server
What is the preferred method to ensure backups are protected against deletion or corruption?
A. Dell EMC Cloud Tier
B. Encryption
C. Retention Lock
D. Data Invulnerability Architecture
What is the maximum capacity for a DDVE?
A. 64 TB
B. 96 TB
C. 128 TB
D. 256 TB
Which PowerProtect DD procedure uses the DoD/NIST standards to provide data security?
A. Data Sanitization
B. Encryption
C. End-to-End Verification
D. Replication Encryption
What are all the protocols that can be used to send data to a PowerProtect DD over Ethernet?
A. NDMP, NFS, VTL, and CIFS
B. DD Boost, VTL, CIFS, and NFS
C. CIFS, NFS, DD Boost, and NDMP
D. VTL, NFS, and NDMP
Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?
A. DDOS
B. CIFS
C. VTL
D. DD Boost
A PowerProtect DD appliance has been installed at a company's location for several months and has reached a steady state. As a best practice, at what percentage of disk utilization should action be taken?
A. 60%
B. 70%
C. 80%
D. 95%
Following best practices for a PowerProtect DD CIFS environment, what is the recommended SESSTIMEOUT value in seconds?
A. 2600
B. 3000
C. 3600
D. 4600
An administrator has retained snapshots for a single MTree and is trying to create a new one. An error message is received. What is the reason for the failure?
A. The maximum number of snapshots has been exceeded
B. The DDOS needs to be upgraded
C. The user does not have the permission to retain more snapshots
D. There are not enough snapshot licenses