Question 01 / 10
Which of the following is not a recommended data source for Hyper Backup?
A.Backing up Synology applications
B.Encrypted shared folders
C.USB drives
Correct!
Here's why:
Incorrect
The correct answer is: C
While Hyper Backup is capable of backing up from USB storage devices, it is not a recommended way to do so. Hyper Backup performs backup tasks based on a schedule, which is usually not suitable for external devices that are often removed.
Instead, use USB Copy.
As the name implies, USB Copy is designed specifically to handle data backup tasks from USB devices, such as importing media from SD cards (through a USB reader) and copying data to or from USB drives.
USB Copy supports multiple backup strategies, such as multi-versioning, mirroring, and incremental.
Question 02 / 10
When removing a backup task from Hyper Backup, will the data already backed up at the destination be deleted?
A.Yes
B.No
Correct!
Here's why:
Incorrect
The correct answer is: B
In previous versions of Hyper Backup, you would be asked if you wanted to delete the data at the destination when removing the backup task.
This prompt has recently been removed to reduce the risk of accidental deletion.
Question 03 / 10
Which of the following items can be protected by Hyper Backup but not Snapshot Replication?
A.Shared folders
B.iSCSI LUNs
C.Package databases
Correct!
Here's why:
Incorrect
The correct answer is: C
With Snapshot Replication, you are able to schedule snapshots and replication of data in shared folders and iSCSI LUNs. The replication destination can either be a different local volume or a remote Synology NAS. To backup installed packages, Hyper Backup is required.
Question 04 / 10
To protect your data against corruption, which of the following is an important procedure to follow?
A.Schedule regular data scrubbing
B.Turn off Synology NAS when it's not in use
C.Limit one volume to one storage pool
Correct!
Here's why:
Incorrect
The correct answer is: A
When using Btrfs, your Synology NAS is able to protect your data against bit rot and other forms of data degradation that may occur silently. Data Scrubbing is a crucial aspect of maintaining data integrity, and must be scheduled to run on a regular basis (once every few months).
Question 05 / 10
You are concerned about a publicized security incident. What can you do to minimize the impact of it?
A.Notify Synology PSIRT
B.Submit a technical support request
C.Post your findings on a forum to discuss with other experts
Correct!
Here's why:
Incorrect
The correct answer is: B
For our users, you should first check if our security advisory has posted a resolution (better yet, subscribe to security newsletters!). If you need assistance with a workaround, contact our technical support teams.
Since 2017, Synology has worked together with security researchers to proactively improve the security of our products. Synology’s Security Bounty Program is designed to give recognition and monetary rewards to researchers that have identified potential vulnerabilities and have worked with us in a responsible way to ensure the safety of our customers. Synology's Product Security Incident Response Team (PSIRT) is responsible for running the bounty program and coordinating responses towards security-related incidents.
Question 06 / 10
What is the maximum file size limit for a single file to be backed up to Synology C2?
A.No limit
B.32 GB
C.1 TB
Correct!
Here's why:
Incorrect
The correct answer is: A
There is no file size limit for a single file to be backed up. However, different C2 Backup plans come with different storage sizes. Choose a plan that suits your backup needs and upgrade your plan during the subscription period if more space is needed.
Question 07 / 10
Which of the following will be triggered if you reset your Synology device?
A.Storage space will be formatted.
B.The admin account will return to the default value.
C.Encrypted folders will be mounted.
Correct!
Here's why:
Incorrect
The correct answer is: B
Once you reset your Synology NAS, the following configurations will be changed:
- Default "admin" account will be reset to default values.
- UI management port will be reset to 5000/5001.
- IP, DNS, gateway, and other net interfaces will be reset to DHCP.
- PPPoE will be disabled.
- Auto block will be disabled.
- Firewall rules will be disabled.
- Encrypted folders will be unmounted and automatic mount on startup will be disabled.
- High-availability cluster will be removed.
- Virtual Machine Manager cluster will be removed.
However, storage pools and the data on each volume will remain intact.
Question 08 / 10
Why would you see a "not secure" warning in your browser when connecting to your NAS?
A.The QuickConnect address is not secure.
B.You lack a certificate from a trusted certificate authority.
C.You are connecting via IPv4 and not IPv6.
Correct!
Here's why:
Incorrect
The correct answer is: B
Certificates are used to prove the identity of a website. For example, when you are connecting to https://synology.com, your browser will indicate that the connection is secure. You can view the certificate for the site, indicating that it is valid for synology.com. Only specific agencies are able to assign these certificates, which enables applications, such as your browser, to be able to verify the validity and authenticity of them.
The warning appears when you connect to a website using HTTPS, but the site does not have a valid certificate, or when you are connecting via an IP address.
To solve this, you will need to use QuickConnect or by using your own domain or DDNS address together with Let's Encrypt to obtain a certificate.
Question 09 / 10
A ransomware-infected computer on the network has recently encrypted shared folders that it had access to. Those folders had scheduled snapshots that were retained for several weeks. Can you restore that data to a non-encrypted state?
A.Yes - but with potential data loss
B.Yes - with no data loss
Correct!
Here's why:
Incorrect
The correct answer is: A
Ransomware that encrypts your files are unable to directly go after snapshots. However, there are a few things that you need to keep in mind.
First, to successfully recover your files, you must have made a snapshot before encryption occurred. Depending on the frequency of snapshots taken, some data loss may occur depending on when was the last time those files were modified.
Second, depending on the number of snapshots you have chosen to retain, together with the frequency of snapshots being taken, you have a limited window of time to restore those files.
You can set up different policies for each shared folder. For example, a folder with important and often modified files can have a snapshot taken every 30 minutes, while retaining the last 1,024 snapshots. This gives you 21 days worth of restore points at 30-minute intervals. You are able to schedule snapshots down to 5 minute intervals and set retention policies based on maximum snapshots or GFS.
Question 10 / 10
What is the most efficient way to offload media from an USB drive onto a NAS?
A.Set up an incremental USB Copy task and then plug the drive in
B.Move the data into a folder that is synchronized with Synology Drive on a PC
C.Create a task in Hyper Backup to automatically back up from drive when plugged in
Correct!
Here's why:
Incorrect
The correct answer is: A
USB Copy can be configured to automatically back up files on USB drives and SD cards (through a card reader). Three modes are offered, multi-version, mirroring, and incremental.
Multi-versioned: Each time the task runs, a folder will be created and named with the run time. All source files will be fully copied to the destination.
Mirroring: Each time the task runs, all changes made in the source folder will be copied to the destination, making the destination folder a complete mirror copy of the source.
Incremental: Each time the task runs, newly added and modified source files will be copied to the destination.
Tip: Incremental is best suited for offloading photo/video content from cameras. Enable automatic copying to simplify your workload, especially with multiple cards.