DRAG DROP
Refer to the exhibit.
Match each action to its call-out location.
Select and Place:
When using CIFS from a PowerProtect DD system, what should be changed on a Windows machine?
A. SMBTimeout to 7200 seconds
B. CIFSTimeout to 3600 seconds
C. SESSTIMEOUT to 7200 seconds
D. SESSTIMEOUT to 3600 seconds
An administrator is configuring a Google Cloud Provider cloud unit on their DD9900. Which certificate must be imported before adding the cloud unit?
A. S3 Flexible
B. Root CA
C. GlobalSign Root R1
D. GlobalSign Root R2
Which protocol is used for communications between a PowerProtect DD appliance and cloud tier to Dell EMC ECS?
A. SSH
B. SSL
C. FTP
D. HTTPS
A backup administrator has enabled the Retention Lock feature on their PowerProtect DD appliance. Over time, the administrator noticed an increase in file system utilization. Upon further investigation, the administrator discovered expired files are still present on the appliance.
What is the most likely reason for this issue?
A. The time of the file was set below the minimum retention period
B. Retention Lock feature was disabled before the expiration date
C. File system cleaning was disabled
D. Backup application failed to delete the file after expiration
Which component of PowerProtect DD is Data Invulnerability Architecture a feature of?
A. VTL
B. DDOS
C. DD Boost
D. CIFS
Which command is used to start the initial CLI configuration wizard?
A. config setup
B. install config
C. config
D. setup
An engineer is configuring a PowerProtect DD system for VTL using Fibre Channel. How should the zones be configured?
A. Hard zones
B. Single initiator, multi target
C. Single initiator, single target
D. Soft zones
An administrator monitors the performance statistics of a PowerProtect DD appliance. Low disk-write rates are shown, and the network inbound traffic is high. What is the most likely cause of this behavior?
A. NVRAM failure
B. Disk failure
C. Expired segments
D. Known segments