質問 # 23 What must be considered when planning and implementing a secure Cyber Recovery Vault solution?
A. Production environment is used to run the Cyber Recovery Management Host
B. Vault infrastructure is completely isolated from the Production infrastructure
C. Vault and Production infrastructure must be managed by NOC
D. Production environment can use resources from Vault environment
正解:D 質問 # 24 When is the lockbox passphrase required after the installation?
A. To reset the security officer's password and the root user password
B. To perform recoveries from the vault and reset the root user password
C. To perform upgrades and recoveries from the vault
D. To perform upgrades and reset the security officer's password
正解:B 質問 # 25 Which are components of PowerProtect Cyber Recovery?
A. NetWorker, PowerProtect Data Manager, and CyberSense
B. Avamar, PowerProtect Data Manager, and DP Search
C. DPA, NetWorker, and PowerProtect Data Manager
D. Avamar Virtual Edition (AVE), PowerProtect DD, and CyberSense
正解:A 質問 # 26 A company has DP8300 in the production environment. They would like to use the CR Vault. What is the most efficient solution to replicate data to the CR Vault?
A. Replicate data from Multi Node to Single Node, then replicate the MTree owned by single node to the CR Vault PowerProtect DD
B. Replicate the MTree owned by Multi Node Avamar directly to the CR Vault PowerProtect DD
C. Replicate to DP8300 in the CR Vault to protect applications
D. Multi Nodes are not supported by Cyber Recovery, and data cannot be protected in the CR Vault PowerProtect DD
正解:D 質問 # 27 A customer is unable to deploy the CR Virtual Appliance. They currently use vCenter 6.5 and have 4 CPU, 8GB of memory, and 150GB of disk space available. Why won't the virtual appliance deploy?