Halloween Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > DCS-SA > DES-DD33

DES-DD33 Specialist - Systems Administrator PowerProtect DD Exam Question and Answers

Question # 4

Which are supported compression algorithms in DDOS?

A.

lz, gz, and gzfast

B.

bmp, lz, and gz

C.

rle, lzw, and lz

D.

dsp, gz, and lz

Full Access
Question # 5

How can remote logging with a syslog server be configured on a PowerProtect DD system?

A.

Use the CLI command log host enable

B.

Use the DDSM to enable the remote logging

C.

Remote logging is enabled by default

D.

Use the DDMC to enable the remote logging

Full Access
Question # 6

An administrator wants to integrate a PowerProtect DD appliance into their current backup environment using CIFS, NFS, DD Boost, and VTL.

Which backup applications support these protocols?

A.

Commvault Simpana and Veritas Backup Exec

B.

Veritas NetBackup and Dell EMC NetWorker

C.

Dell EMC Avamar and Dell EMC NetWorker

D.

IBM Spectrum Protect and Veritas NetBackup

Full Access
Question # 7

What are some key benefits of performing backups and recoveries with a PowerProtect DD appliance?

A.

Increase in the overall size and scope

Elimination of physical tape

Fewer copies that need to be tracked

Increased speed of disaster recovery

B.

Reduction in the overall size and scope

Elimination of physical tape

Number of copies that do not need to be tracked

Increased speed of disaster recovery

C.

Reduction in the overall size and scope

Elimination of physical tape

Fewer copies that need to be tracked

Increased speed of disaster recovery

D.

Increase in the overall size and scope

Elimination of physical tape

Number of copies that do not need to be tracked

Increased speed of disaster recovery

Full Access
Question # 8

An administrator has retained snapshots for a single MTree and is trying to create a new one. An error message is received.

What is the reason for the failure?

A.

The maximum number of snapshots has been exceeded

B.

The DDOS needs to be upgraded

C.

The user does not have the permission to retain more snapshots

D.

There are not enough snapshot licenses

Full Access