When should using Virtual Synthetic backups be considered?
A
A backup administrator needs to implement BoostFS for Windows.
What do they need to install on the Windows server? (Choose all that apply.)
B, C
Explanation:
For CIFS/NFS/DD BoostFS, the first consideration to address is what level of CIFS, NFS and DD BoostFS
sharing is wanted for the DD series appliances.
Reference:
https://www.delltechnologies.com/asset/en-us/products/data-protection/technical-
support/s-2416-dell-emc-powerprotect-dd-series-appliances-with-commvault-configuration-
guide.pdf
What is the maximum number of concurrently active MTrees that are supported on any
PowerProtect DD appliance with DDOS 7.3?
C
Explanation:
Reference:
https://www.delltechnologies.com/asset/en-us/products/data-protection/technical-
support/docu95865.pdf
Which NDMP device is supported on a PowerProtect DD appliance?
D
Explanation:
A system can present itself as a file server, offering NFS, CIFS access over Ethernet; as a virtual tape
library (VTL) over Fibre Channel; as an NDMP tape server over Ethernet; or as a disk target using
application specific interfaces like DD Boost. DD VTL is qualified with leading open systems and IBMi
enterprise backup applications.
Reference:
https://www.delltechnologies.com/asset/en-in/products/data-protection/technical-
support/h17926-dellemc-powerprotect-dd-ds.pdf
What is a requirement to configure the PowerProtect DD tape out to cloud feature?
A
How many hops should the fabric configuration be limited to when implementing the DD VTL?
B
Explanation:
Maximum number of hops is two, that is, three DD systems. Directory-to-MTree migration supports
backward compatibility up to two previous releases.
Reference:
https://www.delltechnologies.com/asset/en-us/products/data-protection/technical-
support/docu97051.pdf
What is a requirement to use the PowerProtect DD HA feature?
B
An administrator has retained snapshots for a single MTree and is trying to create a new one. An
error message is received.
What is the reason for the failure?
A
Explanation: The maximum number of snapshots allowed per MTree is 750. Warnings are sent when
the number of snapshots per MTree reaches 90% of the maximum allowed number (from 675 to 749
snapshots), and an alert is generated when the maximum number is reached. To clear the warning,
expire snapshots and then run the file system cleaning operation.
Note: To identify an MTree that is nearing the maximum number of snapshots, check the Snapshots
panel of the MTree page regarding viewing MTree snapshot information.
Reference:
https://www.delltechnologies.com/asset/en-us/products/data-protection/technical-
support/docu95865.pdf
A backup administrator wants to verify that quotas have been enabled on a PowerProtect DD
appliance.
Which command is used to verify that quotas are being enforced?
D
Reference:
https://www.dell.com/support/kbdoc/en-pk/000055400/data-domain-evt-quota-00001-
mtree-quota-soft-limit-reached
Following best practices for a PowerProtect DD CIFS environment, what is the recommended
SESSTIMEOUT value in seconds?
C
Explanation:
SESSTIMEOUT valuefromthedefault45secondsto3600seconds.
Reference:
https://pdfcoffee.com/emc-data-domain-networker-implementation-student-guide-pdf-free.html
What information does the daily Autosupport report contain?
B
Explanation:
The autosupport command manages system reports. Command options enable administrative users
to manage two reports that describe the state of a Data Domain system: the autosupport report and
the daily alert summary.
Reference:
https://www.delltechnologies.com/asset/en-us/products/data-protection/technical-
support/docu95816.pdf
Where can daily information on system and MTree capacity be found?
A
Reference:
https://education.dellemc.com/content/dam/dell-emc/documents/en-us/2013KS_Silva-
EMC_Data_Domain_Efficiency_Evaluation.pdf
Which DDOS role is used for scheduling and running the backup application in a secure multi-tenancy
environment?
D
A PowerProtect DD appliance has been installed at a companys location for several months and has
reached a steady state.
As a best practice, at what percentage of disk utilization should action be taken?
C
Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?
A
Explanation:
The Data Invulnerability Architecture is built into DDOS and DD series to provide the industrys best
defense against data loss.
Reference:
https://www.delltechnologies.com/asset/en-in/products/data-protection/technical-
support/h17926-dellemc-powerprotect-dd-ds.pdf