Commvault Cloud Technical Sales Professional - CCTSP25
//pre requisite: Commvault Cloud Sales Professional - CCSP25
Module 1
Introducing Operational Recovery
Module 1
Introducing Operational Recovery- Which add-on package provides secure, air-gapped cloud storage for your data backups ?
- Metallic Recovery Reserve
- HyperscaleX
- Cloud Deduplication Store
- Air Gap protect*
- What deployment options are available for Commvault Operational Recovery ?
- Physical
- Virtual
- SaaS-Delivered
- All of the above*
- What of the following are key capabilities of Operational Recovery ?
- Zero-Trust Architecture*
- Unified Management*
- Automated Recovery
- Security Insights*
- Threat Warning
- Which package focuses on providing essential data protection capabilities ?
- Operational Recovery*
- Autonomous recovery
- Cyber Recovery
Module 2
Why Commvault Operational Recovery- Which dashboard provides customers with quick and meaningful insights into threat levels and data protection security posture ?
- Virtualization
- Health
- SecurityIQ*
- Environment
- Which key areas does the Global Management interface highlight environmental scores ?
- Data Protection*
- Platform*
- Health
- Security Posture*
- Throughput
- Which security feature adds a necessary layer of protection by rendering valued business information unreadable unless unlocked with a proper key ?
- Multi-Factor Authentication
- Multi-Person Authorization
- Encryption*
- Compliance Lock
- When using a 3rd party key management store, encryption keys are no longer stored within Commvault. True or False ?
- False*
Module 3
Building Operational Recovery- Which feature can set certain files to be automatically erased from a laptop if it goes missing or remains offline for a specified number of days ?
- Periodic Document Encryption
- Secure Erase*
- Compliance Lock
- SecurityIQ
- Which feature can lock files or folders, requiring a user-defined passkey to access them ?
- Periodic Document Encryption*
- Secure Erase
- Compliance Lock
- SecurityIQ
- Which of the following workloads can be protected with Operational Recovery ?
- Office365
- Kubernetes
- Oracle EBS
- Azure SQL
- All of the above*
- With Microsoft365, who has responsibility for the data residing within Microsoft 365 ?
- Microsoft
- The Customer*
- Commvault
- Which of the following kubernetes components can be restored with Operational Recovery ?
- Deployments
- Manifest files
- Configuration Maps
- Persistent Volume Claims
- All of the above*
Module 4
Technical concepts of Operational Recovery- Which type of deduplication should be used to save bandwidth and transmission time ?
- Client-Side*
- Target-Side
- Both types save bandwidth and transmission time
- With a vault location, firewall rules ensure connections to production are in which direction ?
- Inbound
- Outbound*
- Bi-Directional
- What is the main component of the Control Plane ?
- Commserve*
- MediaAgent
- Storage
- Clients
- With Operational Recovery, which of the following can be used as storage targets ?
- Disk
- Tape
- Cloud
- HyperScaleX
- Air Gap Protect
- Which feature manages snapshot functionality across a wide variety of hardware storage platforms, allowing users to integrate and utilize snapshots ?
- Block-Level backup
- Intellisnap*
- Virtual Server Agent
- HyperscaleX
- What components can be found in the Data Plane ?
- Commserve
- MediaAgent*
- Storage*
- Clients
Module 5
Enhancing security with Commvault storage options- Which security feature enforces a write-once-read-many (WORM) policy on HyperScaleX storage ?
- Compliance Lock*
- Ransomware Lock
- Encryption
- Standard Resiliency provides the protection against the failure of how many disks ?
- 1
- 2*
- 3
- Which HyperScaleX appliance is ideal for enterprise environments that require greater scale and performance ?
- HS2300
- HS4300*
- Remote Office Appliance
- Which version of TLS does Air Gap Protect use for communication ?
- 1.1
- 1.2
- 1.3*
- 2
- What erase coding ratio is provided by Hyperscale X medium resiliency ?
- 4:2*
- 8:2
- 8:04
- True or False, The Remote Office Appliance provides scale-out storage, on a smaller scale to the HS2300 and HS4300 Appliances ?
- True*
- Which security feature locks data store access on data movers, preventing unauthorized access and protecting data from ransomware attacks ?
- Compliance Lock
- Ransomware Lock*
- Encryption
- High Resiliency mode allows for the failure of how many Nodes within a cluster ?
- 1
- 2*
- 3
Module 6
Introducing Autonomous Recovery- True or False --Clean Room testing is performed on the production network ?
- False*
- True or False -- Clean Room Recovery offers a controlled environment for testing cyber recovery plans ?
- True*
- True or False -- Recovery Validation allows for a single test and validation of recovery points ?
- False*
- Which of the following is true regarding Autonomous Recovery ?
- It Scales easily to accommodate data growth*
- It does not provide Auto Scaling
- Power Management is handled by a third party application
- It requires multiple product points
- Which of the following replication types are supported with Autonomous Recovery ?
- Periodic Hot*
- Sustainable
- Periodic Warm*
- Continuous*
- Autonomous Recovery simplifies distaster recovery efforts through:
- Architectual Suggestions
- Compliance Reporting
- Efficient Cloud Data Movement*
- Security Mobility
- The Commvault Cloud Autonomous Recovery solution provides which of the following features ?
- AI Automation*
- Continuous Replication*
- Automated Failover*
- Organizational Compliance
Module 7
Why Autonomous Recovery- True or False -- Autonomous Recovery allows for seamless recovery operations ?
- True*
- The Commvault Cloud Autonomous Recovery package provides which of the following ?
- Data protection*
- Replication*
- Replication validation*
- Zero-sum data
- Autonomous Recovery provides which of the following to ensure data availability and protection ?
- Periodic replication for on prem environments*
- Sporadic replication for cloud environments
- Continuous replication for cloud environments*
- Sporadic replication for on-prem environments
- True or False -- Autonomous Recovery provides replication only for Virtual Machines ?
- False*
- Which cloud platforms does Commvault Cloud support ?
- CloudX
- Azure*
- AWS*
- Google*
Module 8
Technical concepts of replication and Auto Recovery- Virtual Machine auto recovery can be achieved through:
- Scatter replication
- Orchestrated recovery*
- periodic replication*
- continuous replication*
- Which of the following are true regarding Auto Recovery ?
- Minimizes Data Loss*
- Is difficult to configure
- Maximizes Uptime*
- Requires third Party software
- True or False -- The use of trace logs allows for near real-time replication of files within CDR ?
- False*
- Autonomous recovery replication options include but are not limited to which of the following ?
- CDR*
- VM Replication*
- Snapshot Replication*
- Application Replication*
- True or False -- Replication allows for duplication of data from a source to a destination ?
- True*
Module 9
Technical concepts of Application validation and Cleanroom- Which of the following is NOT true regarding Cleanroom utilization ?
- Used for spot checking VM data*
- Used for continuous cyber recovery plan testing
- Provides a single platform
- Allows end-to-end automation
- True or False - The Cleanroom solution prevents reinfection.
- True*
- True or False - Cleanrooms have secure network connectivity to other networks.
- False*
- True or False - Application validation ensures backups are available and can be restored in the event of a disaster.
- True*
- The isolated data center of the Clean Room feature can be used for which of the following ?
- Data Recovery Testing*
- Forensic Operations*
- Validation*
- Security Operations*
- Live mount validation allows for which of the following ?
- Incremental backup validation
- Full Backup Validation
- Automatic Validation
- Consensus Validation
Module 10
Building Cyber Resiliency- What are some examples of disaster recovery related scenarios ?
- Hardware failures*
- Fires at a datacenter*
- Malware spread
- Long-term power outages*
- What are some examples of cyber recovery related scenarios ?
- Human errors like accidental data deletion
- Ransomware attacks*
- Malware infections*
- Data breaches*
- Security teams that only practice disaster recovery plans, need to also practice what, in order to properly test their recovery plans ?
- Ransom negotiations
- Simulated network failures
- Recovery availability during power outages
- Cyber attack scenarios*
- Which solution package offers advanced data security and governance over your data ?
- Operational Recovery
- Autonomous Recovery
- Cyber Recovery*
- Cleanroom Recovery
- Commvault offers a comprehensive testing and failover technology that can help security teams mitigate cyber risk. What is the name of this offering ?
- Commvault Cleanroom Recovery*
- Commvault Isolated Recovery Environment
- Commvault Cybervault
- Commvault Cloud Test Bed
- Why should customers choose Commvault Cloud Cyber Recovery ?
- To have access to threat scanning technolgy to defend against threats within dormant data.
- To have access to a cyber deception and early warning technology
- To have access to AI-driven ransomware protection
- To drive easier cyber forensic opportunities
- All of the above*
Module 11
Remediating Risk with Risk Analysis- Commvault Cloud Risk Analysis features the ability to scan workloads from data sources at which locations ?
- Only data at rest in the cloud
- Only live data sources on-premises
- Both live data and at rest in the cloud
- Both live data and at rest in the cloud or on-prem*
- What is the purpose of defining custom entities or utilizing preconfigured entities in Risk Analysis ?
- To target specific kind of workloads
- To classify and identify sensitive information during scanning*
- To define a set of users that can review results of scanned information
- To customize the display of sensitive data visualizations
- Which of the following remediation actions can be performed on scanned sensitive data ?
- Move data to external share(s) for review*
- Set retention on sensitive data resting on servers*
- Securely remove data from source workloads and/or protected data*
- Move data to another existing Plan
- Commvault Cloud Risk Analysis allows organizations to perform which three actions against their sensitive data ?
- Discover
- Encrypt
- Classify
- Protect
- All remediation actions available for scanned data can be performed on both a bulk and invididual basis.
- True*
- After analyzing data for sensitivity, where will the populated information be located ?
- Data Insights Dashboard*
- Sensitive Overview Dashboard
- Risk Assessment Dashboard
- Threat Survey Dashboard
- The Commvault Cloud Cyber Recovery solution offers a search platform that assists authorized users in searching and validating a chain of custody to ensure the integrity of relevant data. What is the name of this tool ?
- Commvault Cloud Discovery Tool (not worked)
- Commvault Cloud Compliance Search
- Commvault Cloud Unified Search (not worked)
- Commvault Cloud Search Engine
- What types of unique risks do organizations with hybrid workloads face when managing personally identifiable information (PII) data ?
- Increased personnel costs
- Data breaches
- Ransomware attacks
- Non-compliance
Module 12
Stopping threats with Threatwise- What happens when an attacker trips a Commvault Cloud Threat sensor ?
- Commvault employees are notified in order to contact the customer to inform them of the breach
- Real time warnings are sent to defined key stakeholders and security systems*
- Access to all configured critical assets are shut out immediately from the location of the sensor
- Multiple fake assets are generated immediately in rapid succession to confuse the attacker
- What component of the Commvault Cloud Threatwise architecure allows the deployment of additional Threatwise components, reporting information to the TSOC ?
- The Threatwise Appliance*
- The Hub
- Full System Sensors
- The TSOC Deployment Console
- What advantages do Commvault Cloud Full System Sensors offer that are not found in standard threat sensors ?
- They emulate entire workstations*
- They have the ability to stop the cyber threat or attacker from pursuing further reconnaissance by isolating them within the network segment they're on*
- They allow other threat sensors to proxy to the full system sensor for a more advanced cyber deception interaction
- They can offer much more detailed information about the threat actor's location when tripped*
- What is the name of the Threatwise technology that offers intelligent feedback and guidance to recommend optimal placement of threat sensors ?
- Threatwise Guide
- Threatwise Council
- Threatwise Advisor*
- Commvault Zoneguard
- What do Commvault Cloud Threatwise Sensors set out to emulate to provide cyber deception coverage ?
- Advanced honeypots*
- A fully imaged and interactable Windows server
- Real devices on a network
- None of the above
- What is the name of the web based interface that runs in the cloud, providing user access to their Commvault Cloud cyber deception solution ?
- Commvault Cloud Data Insights
- Threatwise Security Operations Console (TSOC)*
- Cyber Deception Command Center
- Sensor Insight Console
- Commvault Cloud offers a patented cyber deception technology using what form of technology ?
- Sensors that act as decoys and provide early warnings when triggered*
- A means to create fake user accounts that only appear to have high-level access privileges within the network
- A deployable misleading attack surface that has false vulnerabilities to engage attackers
- An AI-powered deceptive incident response solution that engages threat actors into a believable exchange
Module 13
Introducing Anomaly framework with Threatscan predict- What powers Commvault Cloud's Anomaly Framework during backups ?
- Machine learning*
- Quantum computing
- Blockchain Technology
- Natural Language Processing
- Threat Scan servers can be deployed in which of the following locations ?
- On-Premises*
- In the Cloud*
- Dark Sites (Offline environment)
- Isolated Recovery Environments*
- The Commvault Cloud Anomaly Framework is active during which phases of data protection ?
- Pre-Backup
- During backups
- Post backups
- Before and after backups
- Before, during, and after backups*
- Commvault Cloud Threat Scan has the capability of analyzing data planes storing data in the cloud and on prem.
- True*
- Commvault Cloud Threat Scan is a key piece of the anomaly framework that acts on data during which phase of backup operations ?
- Pre-backup (not worked)
- During backups
- Post backups
- Before, during, or after protection operations