Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

Download DELL EMC D-PDD-DY-23 Exam Dumps For Best Preparation
1 / 5
Exam : D-PDD-DY-23
Title :
https://www.passcert.com/D-PDD-DY-23.html
Dell Technologies
PowerProtect DD Deploy
2023
Download DELL EMC D-PDD-DY-23 Exam Dumps For Best Preparation
2 / 5
1.A backup administrator is tasked with verifying the compression savings of a PowerProtect DD9900.
Which compression algorithm will they see enabled by default?
A. lzw
B. gzfast
C. lz
D. gz
Answer: B
2.During a normal workday an administrator notices poor performance (<1MB/s) in combination with poor
global compression rate (<1x).
What metrics should be monitored to find the issue?
A. Cleaning, NVRAM battery level, and link utilization
B. Stream count, CPU utilization, and replication
C. Stream count, disk reconstruction, and replication
D. NVRAM battery level, link utilization, and disk reconstruction
Answer: B
3.Which backup application can back up data to a PowerProtect DD system using DD Boost over FC?
A. Dell NetWorker
B. Dell Avamar
C. IBM Spectrum Protect
D. Veritas Backup Exec
Answer: A
4.What system role is required to create the second security officer for a PowerProtect DD?
A. admin
B. sysadmin
C. limited-admin
D. security officer
Answer: C
5.A customer needs a backup system to locally protect 200 TB of mission-critical, post-comp data.
What should be used to back up the system?
A. Cloud Tier
B. DDVE
C. DD6900
D. DD3300
E. DD6400
Answer: C
6.If PowerProtect DD administrator issue a cifs share destroy command, what is the result?
A. The CIFS share and contents of the share are deleted.
B. The contents of the CIFS share are deleted.
C. The CIFS share is deleted.
Download DELL EMC D-PDD-DY-23 Exam Dumps For Best Preparation
3 / 5
Answer: C
7.An organization uses tape libraries in their current backup infrastructure. They have purchased a
PowerProtect DD system and plan to use VTL to move from tape.
What is a consideration when configuring the tape size?
A. Target single drives to write multiple streams
B. Target multiple drives to write single stream
C. Set retention periods for as long as possible
D. Use smaller tapes for smaller datasets
Answer: D
8.What capabilities are enabled with Retention Lock Governance?
A. Update or extend retention
File level retention policies
Rename MTree
Audit Logging
B. Rename MTree
File level retention policies
Secure Clock
CLI Support
Update or extend retention
C. File level retention policies
Rename MTree
Update or extend retention
CLI Support
D. Audit Logging
Update or extend retention
File level retention policies
Rename MTree
Secure Clock
Answer: C
9.An administrator is configuring an Azure cloud unit on their DD6900.
Which certificate must be imported before adding the cloud unit?
A. GlobalSign Root R2
B. GlobalSign Root R1
C. S3 Flexible
D. Baltimore CyberTrust Root CA
Answer: D
10.What is the default listen port used by PowerProtect DD systems for replication?
A. 623
B. 2051
C. 135
Download DELL EMC D-PDD-DY-23 Exam Dumps For Best Preparation
4 / 5
D. 9020
Answer: B
11.A technician is upgrading a DD9400 with a DS60 expansion shelf with 60 drives. In the GUI interface,
only 30 drives are accessible.
What is causing these drives to be inaccessible?
A. There are not enough cache drives on the DD9400 to support the extra capacity.
B. A second SAS connection from DD9400 to DS60 is not activated.
C. There are not enough spare drives.
D. The capacity license applied is only for 30 drives.
Answer: D
12.Which PowerProtect DD feature protects data from accidental or malicious deletion during its retention
time?
A. Smart Scale
B. Retention Lock
C. Data Invulnerability Architecture
D. Encryption
Answer: B
13.What is the maximum capacity for an on-premises DDVE with no cloud storage?
A. 64 TB
B. 96 TB
C. 128 TB
D. 256 TB
Answer: B
14.What are the steps to configure the Retention Lock Compliance?
Answer:
Download DELL EMC D-PDD-DY-23 Exam Dumps For Best Preparation
5 / 5
15.A customer has stored the data that is in the cloud using PowerProtect DD. For security reasons,
encryption will be applied to the data.
What is the required action to achieve the customer's goal?
A. Encrypt and reupload the data
B. Enable the encryption via cloud tier level
C. Activate the Data at Rest encryption
D. Turn off encryption and reenable
Answer: A
16.A systems administrator wants to change encryption.
Which user role is needed to log in, and what command must be run to enable the security policy?
A. security officer user and run authentication policy set security-officer enabled
B. sysadmin user and run authentication policy set security-officer enabled
C. security officer user and run authorization policy set security-officer enabled
D. sysadmin user and run authorization policy set security-officer enabled
Answer: C
17.What happens to the data when it is moved from the active tier to cloud tier?
A. It is deduplicated and stored in object storage the native format
B. It is compressed and stored as object storage in a new format
C. It is compressed and stored in block storage in a new format
D. It is deduplicated and stored in a file system in the native format
Answer: A
18.A company has DD Retention Lock Compliance enabled on an MTree. The file system is disabled due
to tampering of the system clock.
Which user role has the privilege required to enable the file system?
A. Security Officer
B. Admin
C. Limited Admin
D. Tenant Admin
Answer: A