1-100 Flashcards
A company’s Isilon cluster has reached the capacity limit. The cluster consists of eight H500 nodes in a
single node pool.
Which action can be taken to resolve the capacity issue while new nodes are being delivered?
A. Activate SmartPools
B. Enable GNA
C. Enable Spillover
D. Release VHS drives
A. Activate SmartPools
You are looking through the EMC Isilon Configuration Guide for client specific site data.
Which tab of the document contains this information?
A. Core
B. Topology
C. Design Intent
D. Customer Information
D. Customer Information
What is a characteristic of access tokens on a Dell EMC Isilon cluster?
A. Cannot contain both an SID and a UID
B. One token is generated for every Access zone
C. Generated when the client accesses the cluster
D. Requires the use of external authentication providers
C. Generated when the client accesses the cluster
A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file
pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the
administrator has some concerns about the available capacity on the H600 nodes.
Which feature should be configured to accept writes, even after the H600 nodes become full?
A. VHS
B. Spillover
C. SmartPools
D. GNA
B. Spillover
In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the
shares the client is able to view?
A. SmartConnect
B. Access zone
C. Access Control List
D. Mode bit
B. Access zone
You are looking through the EMC Isilon Configuration Guide for file sizes and workflows.
Which tab of the document contains this information?
2 / 99
A. Design Intent
B. Customer Information
C. Topology
D. Core
A. Design Intent
How many nodes should be set up to coordinate NTP for an Isilon cluster?
A. All nodes
B. Two only
C. Every node connected to the network
D. One only
D. One only
A systems administrator has an Isilon cluster with three X410 nodes in their environment. The default
protection setting is 2d:1n at the node pool level. Billions of very small image files, less than 50 KB size,
are stored on the cluster.
Recently, the administrator has seen an issue where the cluster’s used capacity is getting full. However,
the cumulative size of the files copied appears to be less.
What is a possible reason for the storage usage level?
A. Small files are stored with 4x mirror protection and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
C. Metadata of billions of files is consuming most of the capacity
D. Small files are spread across all nodes and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
A customer has SAP, Oracle, and file system information in a VMAX3. The customer is looking for a
backup solution to receive the least amount of RTO and RPO as possible.
Which solutions should be recommended?
A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
B. Protect Point, DD990, Snap VX, FAST.X, and Recover Point for XtremIO
C. Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
D. NetWorker, Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
A Dell EMC Isilon cluster with Gen 6 nodes has reached 90% capacity.
To increase the cluster’s capacity, what is the minimum number of Gen 6 nodes that can be added?
A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes
B. 2 nodes
What information does the isi statistics command display?
A. Protocol status, general performance, hardware condition, and critical alerts
3 / 99
B. General status, node management, Job Engine status, and drive statistics
C. Drive statistics, protocol status, node statistics, and hardware statistics
D. Drive status, hardware condition, critical alert, and protocol status
C. Drive statistics, protocol status, node statistics, and hardware statistics
You are using a RHEL server and mounting an export from an EMC Isilon cluster using NFSv3.
Where would the session or state information for the connection be maintained?
A. Client only
B. On all nodes in the cluster
C. Client-connected node only
D. Client and client-connected node
A. Client only
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What must be done to initially configure this cluster?
A. Establish a network connection to the management port on a backend switch
B. Run the cluster configuration wizard from a computer on the same network as the cluster
C. Connect a monitor, mouse, and keyboard to the utility node of the cluster
D. Establish a serial connection to the node designated as node 1
D. Establish a serial connection to the node designated as node 1
A company plans to build two Dell PowerScale clusters in an active-active disaster recovery
environment. The initial requirement is to have one access zone for their finance department.
Which recommended directory structure meets the requirement?
A. Cluster_A:
/ifs/finance
/ifs/finance
Cluster_B:
/ifs/finance
/ifs/finance
B. Cluster_A:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
Cluster_B:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
C. Cluster_A:
/ifs/cluster_a
/ifs/cluster_b
Cluster_B:
/ifs/cluster_a
/ifs/cluster_b
D. Cluster_A:
/ifs/finance/cluster_a
4 / 99
/ifs/finance/cluster_b
Cluster_B:
/ifs/finance/cluster_a
/ifs/finance/cluster_b
B. Cluster_A:
In an Isilon environment, which type of storage node is best suited for high throughput and high
concurrency using SATA drives?
A. NL-Series
B. S-Series
C. X-Series
D. A100-Series
C. X-Series
What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?
A. 40 Gb InfiniBand ports
B. Decreased journal size for storage performance
C. Dedicated bootflash drives
D. NVRAM dependency
A. 40 Gb InfiniBand ports
Which command is used to enable Source-Based Routing in OneFS 8.2.0?
A. isi network groupnets modify –sbr=true
B. isi network subnets modify –sbr=true
C. isi network pools modify –sbr=true
D. isi network external modify –sbr=true
D. isi network external modify –sbr=true
What does the isi_upgrade_helper command provide?
A. Recommended sets of nodes capable of simultaneous node firmware upgrades
B. Recommended sets of nodes capable of simultaneous drive firmware upgrades
C. Recommended sets of nodes capable of simultaneous rollup patch upgrades
D. Recommended sets of nodes capable of simultaneous standard patch upgrades
A. Recommended sets of nodes capable of simultaneous node firmware upgrades
In an Isilon environment, what are the on-disk identity types that appear in the web administration
interface?
A. SMB, NFS, and Mixed
B. AD, LDAP, and NIS
C. GUID, SID, and Mixed
D. SID, UNIX, and Native
D. SID, UNIX, and Native
What does it mean if an EMC Isilon cluster is in a NANON state?
5 / 99
A. One or more nodes are missing Ethernet connections
B. One or more nodes are missing InfiniBand connections
C. One or more nodes have critical events
D. One or more nodes have been improperly shut down
A. One or more nodes are missing Ethernet connections
Based on the graphic, what is the correct port to attach to the internal network?
A. 1
B. 2
C. 3
D. 4
C. 3
A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site.
What is a key consideration regarding the SyncIQ functionality?
A. SyncIQ synchronous option must be configured
B. SyncIQ is only an asynchronous replication tool
C. SyncIQ source must be modified to replicate
D. SnapshotIQ must be purchased and the synchronous option configured
B. SyncIQ is only an asynchronous replication tool
What is responsible for handling the SMB protocol and managing the session, protocol negotiations,
and operations in One FS?
6 / 99
A. lsassd
B. lwsm
C. lwiod
D. srvsvc
C. lwiod
What are the steps to configure SmartLock on an EMC Isilon cluster in Compliance mode?
A. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
B. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
C. Boot cluster in Compliance mode
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode
In Dell EMC Isilon, what is the purpose of a maintenance release?
A. Address known issues and minor enhancements to the OS
B. Address known issues and minor enhancements to the firmware
C. Update internal and external NICs to address known issues
D. Update all internal components for known issues
A. Address known issues and minor enhancements to the OS
An Implementation Engineer has just joined an EMC Isilon cluster to an Active Directory (AD) domain.
The System zone of the cluster is set to default values.
Which AD object is automatically added to the cluster??s users group?
A. Anonymous
B. Authenticated users
C. Guest
D. Everyone
B. Authenticated users
Which type of issues are resolved by enabling Source-Based Routing on an Isilon cluster?
7 / 99
A. Asymmetric routing.
B. IP address space depletion.
C. TCP retransmission.
D. SmartConnect load balance.
A. Asymmetric routing.
A customer has purchased a license to allow multiple file pool policies to be applied to their multi-tier
cluster.
Which job, when run, enforces file pool policies, and applies any file pool policy changes to the data?
A. SyncIQ
B. Auto Balance
C. Smart Pools
D. Set Protect Plus
C. Smart Pools
What is the complete list of providers supported by a Dell EMC Isilon cluster?
A. LDAP, AD, NIS, and local and file providers
B. LDAP, NIS+, and file and local providers
C. AD, NIS+, local provider, and LDAP
D. AD, LDAP, and Microsoft Outlook provider
A. LDAP, AD, NIS, and local and file providers
An administrator is attempting an object-level restore of data from a Protect Point backup. However,
they are unable to see the desired objects through the Recovery server.
What is a possible cause for this problem?
A. FTS device did not mount the static image
B. Recovery server is not zoned to the Data Domain
C. Static image was not copied to the VMAX3
D. VMAX3 did not mount the vdisk
D. VMAX3 did not mount the vdisk
A company has two Isilon clusters located in San Francisco, California. One cluster is the source and
the other is the target. For efficiency, the dataset is being replicated between the two clusters within the
same data center. The target cluster will be moved to the New York area as part of a disaster recovery
solution once the initial full copy is complete.
Once the cluster has been moved to New York, what will mitigate re-transmitting the entire dataset over
the WAN to the target cluster in the new location?
A. Enable target compare initial sync and then re-run the policy
B. Run a sync policy with excluded directories defined
C. Run a copy policy with excluded directories defined
D. Enable the policy to run on all nodes in the cluster
A. Enable target compare initial sync and then re-run the policy
You are looking through the EMC Isilon Configuration Guide for management IPs and DNS
8 / 99
information.
Which tab of the document contains this information?
A. Core
B. Design Intent
C. Customer Information
D. Topology
A. Core
Which information is required to join a Dell EMC Isilon cluster to an Active Directory (AD) domain?
A. AD domain name, computer account created, and domain account with rights to the Join domain
B. AD server name, cluster account created in an OU, and authentication account and password
C. AD server name, port number, and authentication account and password
D. AD domain name, domain account with rights to the Join domain, and domain account password
D. AD domain name, domain account with rights to the Join domain, and domain account password
A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be
replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes.
What refresh process is appropriate in this case?
A. Use SyncIQ to migrate the data from the old cluster to the new cluster
B. Add the new nodes to the existing cluster and use SmartPools to migrate the data
C. Add the new nodes one at a time and SmartFail out the old nodes
D. Downgrade the new nodes to the version of OneFS running on the old nodes
A. Use SyncIQ to migrate the data from the old cluster to the new cluster
A customer has a 5-node cluster in which the SIP is answering DNS queries from node 1.
If node 1 goes down, to which node, or LNN, would the SSIP service move?
A. 2
B. 3
C. 4
D. 5
D. 5
Which deduplication phase is excluded from the Dry Run process?
A. Commonality Detection
B. Sharing
C. Sampling
D. Index Updating
D. Index Updating
When a 104 K data file is written to disk with a protection level of N+2n, what is the protection
overhead of the total disk space consumed by the file?
A. 0.33
B. 0.5
C. 0.67
9 / 99
D. 0.8
C. 0.67
What is a benefit of using NANON?
A. Increased frontend I/O ports and aggregated cache
B. Increased number of connected frontend network ports
C. Increased capacity and aggregated cache
D. Increased bandwidth inside the cluster and GbE links
C. Increased capacity and aggregated cache
Which data access advantage does Dell EMC Isilon clusters provide when hosting Hadoop data?
A. Native Hadoop client access through SMB and NFSv3
B. Real-time data access with native Hadoop clients only
C. SMB and NFSv4 data access only
D. Multi-protocol data access, in place analytics
D. Multi-protocol data access, in place analytics
What is the required configuration for syslog forwarding?
A. Syslog forwarding works with config auditing only
B. Local server should be set up to deny remote logging
C. Remote server should be set up to allow remote logging
D. Syslog forwarding works with protocol auditing only
C. Remote server should be set up to allow remote logging
You have followed the configuration document and set up a new cluster in Compliance mode. You
meet with the customer to plan directory layout and configuration requirements.
What directory types will you be able to consider for this cluster?
A. Non-WORM and Compliance Smart Lock directories only
B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories
C. Compliance Smart Lock directories only
D. Enterprise Smart Lock and Compliance Smart Lock directories only
B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories
A new file pool policy is configured on a Dell PowerScale cluster to move all media files to A200
nodes. The previously written media files are located on H500 nodes.
What does the administrator need to run to apply the new file pool policy on the old media files?
A. SetProtectPlus job
B. MediaScan job
C. SmartPools job
D. MultiScan job
C. SmartPools job
Which type of information does the Isilon isi statistics command provide?
A. Job engine and critical alerts
10 / 99
B. Drive statistics and hardware condition
C. Protocol and node statistics
D. Drive replacement and node management
C. Protocol and node statistics
Which SSH Multi-Factor Authentication (MFA) service is supported by OneFS 8.2.0?
A. Duo
B. RSA
C. Okta
D. Yubico
A. Duo
A Dell EMC Isilon customer’s existing cluster has Gen 5 nodes. They are using both 1 GbE and 10
GbE connectivity options. The 1 GbE is configured with the management network.
The 10 GbE is connected to the data and replication network. The customer is planning to add new Gen
6 nodes to their cluster. They want to know the available options for front-end connectivity on Gen 6
nodes.
Which information should be provided to the customer?
A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes
10 GbE and 40 GbE front-end Ethernet options are only available in Gen 6 nodes
B. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are only available in Gen 6 nodes
C. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are available on both Gen 5 and Gen 6 nodes
D. 10 GbE and 40 GbE front-end Ethernet options are only available in Gen 5 nodes
1 GbE and 10 GbE front-end Ethernet options are available in Gen 6 nodes
A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes
How many Isilon Job Engine v2.0 components will be present on a single node?
A. One director
B. Two managers per job
C. Two workers per task
D. Three coordinators
A. One director
What can be determined when auditing is enabled on an EMC Isilon cluster?
A. Who made the change When the change was made If the change can be undone
B. When the change was made If the change can be undone If proper ITIL process was followed
C. Who observed the change When the change was made If the change can be undone
D. When the change was planned If the change can be undone If proper change control was followed
A. Who made the change When the change was made If the change can be undone
Which basic administration task can be performed using the front panel of an Isilon node?
A. Adding the node to a cluster
B. Creating a Smart Connect zone
C. Configuring an additional interface
11 / 99
D. Creating an access zone
A. Adding the node to a cluster
What must be done to configure cluster name resolution for SmartConnect?
A. Create the SSIP, add the DNS delegation, configure the subnet, and configure the node pool
B. Create a host A record, create an NS record, configure the subnet, and configure the pool
C. Create the SSIP, create an NS record, configure the subnet, and configure IPv6 and IPv4
D. Create a host A record, add the DNS delegation, configure the subnet, and configure IPv4
A. Create the SSIP, add the DNS delegation, configure the subnet, and configure the node pool
What is the recommended method when cabling an Isilon cluster with dual InfiniBand switches?
A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled
to the second switch.
B. All internal switch ports on odd-numbered nodes should be attached to switch one and all even
numbered nodes should be cabled to switch two.
C. All int-a switch ports should be cabled to the top row of switch ports on switch one and all int-b ports
should be cabled to the bottom row of ports of switch one. Once switch one is full, continue cabling on
switch two.
D. It does not matter which switch ports are used. Any internal switch port can be cabled to either of the
InfiniBand switches.
A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled
A company deployed an Isilon cluster that consists of eight nodes connected to a main production
subnet by all available 10GB ports. Later, the company decided to implement a disaster recovery
solution with a separate replication subnet. During the reconfiguration, one of the 10Gb ports from each
of the nodes 1-4 was moved into the new pool and SBR was activated.
After activating the replication policies, the administrator noticed that the main production ports on nodes
1-4 reached the bandwidth limit.
What is a possible reason for this behavior?
A. Default gateway for the replication subnet has a higher priority value.
B. Default gateway for the replication subnet is not specified.
C. Default gateway for the replication subnet has a lower priority value.
D. Main production ports have a smaller bandwidth limit than replication ports.
B. Default gateway for the replication subnet is not specified.
What does the ‘And’ condition provide in file pool policy filter use?
A. Increases the granularity of the file match criteria
B. Reduces the number of file pool policies
C. Combines multiple file pool policy filters with the same actions
D. Broadens the file pool policy match criteria
A. Increases the granularity of the file match criteria
What does the phrase “failover revert” mean?
A. Undoing a failover job in progress
12 / 99
B. Redirecting clients to the source cluster
C. Redirecting clients to the target cluster
D. Undoing a fail back job in progress
A. Undoing a failover job in progress
A customer would like to limit administrative access to a subset of cluster management capabilities.
What method would you implement to meet their requirements?
A. Create a custom role with only the required privileges
B. Use the BackupAdmin role and add the required privileges
C. Use the SecurityAdmin role to remove privileges from the SystemAdmin role
D. Use the root user to modify the Admin role with the required privileges
A. Create a custom role with only the required privileges
Which type of information does the Isilon isi status command provide?
A. Protocol and node statistics
B. General status and client connections
C. Drive statistics and hardware condition
D. Job engine and critical alerts
D. Job engine and critical alerts
In a Dell PowerScale SyncIQ environment, which action requires a SnapshotIQ license?
A. Saving historical snapshots on the target
B. Reading the target, read-only instance
C. Failing over to the target or disaster recovery cluster
D. System-created snapshot of the source data
A. Saving historical snapshots on the target
What are the benefits of Isilon Scale-Out NAS versus Scale-Up NAS technology?
A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
B. Block-based storage, file system upper limit 10 PB, nodes contain all components, and RAID
protection
C. Block-based storage, file system upper limit 20 PB+, nodes contain all components, and more
granular file protection
D. File-based storage, file system upper limit 16 TB, quick scalability, and volume level RAID protection
A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
What is the recommended maximum number of configured SyncIQ policies, per source cluster?
A. 50
B. 500
C. 1,000
D. 2,000
C. 1,000
When configuring an NFS export on an Isilon cluster, what is the default mapping for the root
13 / 99
account?
A. Root-to-nobody
B. Root-to-root
C. Root-to-admin
D. User-defined during cluster setup
A. Root-to-nobody
A UNIX user is accessing a file through an NFS export on an Isilon cluster. The user is successfully
authenticated through the LDAP server.
In addition to file permissions, what else must be considered to determine the degree of file access the
user will receive?
A. User’s access token.
B. Whether the SmartConnect pool is set to `static’.
C. User SID-defined in the ID Mapper database.
D. User’s access zone.
A. User’s access token.
Within OneFS, at which level is the data layout managed?
A. File pool
B. Node
C. Cluster
D. Node pool
A. File pool
When using automatic home directory creation for SMB shares, which variable is used for the
NetBIOS domain name?
A. %D
B. %N
C. %S
D. %Z
A. %D
What are sources form which an Isilon cluster can obtain authentication data about a user attempting
to access the cluster?
A. NIS+, HTTP, and NIS
B. FTP, filedb, and samdb
C. LDAP, NIS, and filedb
D. HHTP, LDAP, and samdb
C. LDAP, NIS, and filedb
Which cache type is used for read-ahead caching on behalf of other nodes?
A. L1
B. L2
C. L3
14 / 99
D. Endurant
B. L2
You have configured two new subnets: one for NFS and one for SMB. You have enabled VLAN tag 20
for NFS and VLAN tag 30 for SMB and added the interfaces to the network pools. The ext-1 interface
from each node is assigned an address and is active. However, you are unable to ping the gateway on
the two subnets.
What action should you take to resolve this issue?
A. Configure link aggregation on the network switch and each network pool
B. Configure NS records in DNS for the network pools
C. Configure Source-Based Routing for each subnet created
D. Configure trunk ports on the switch for each network interface
D. Configure trunk ports on the switch for each network interface
Which job scans the cluster to look for orphaned or leaked inodes or blocks?
A. Collect
B. Auto Balance
C. Flex Protect
D. Media Scan
A. Collect
Which command shows individual drive status?
A. isi devices
B. isi_hw_status
C. isi_gconfig
D. isi networks
A. isi devices
How is Hadoop managed in an Isilon environment?
A. Files are stored in a specialized HDFS-compatible file system format on the Isilon cluster
B. HDFS data is on Isilon; computations are handled by Hadoop
C. HDFS Data is on Hadoop; computations are handled by Isilon
D. MapReduce on the Isilon cluster allows data to be distributed across both platforms
B. HDFS data is on Isilon; computations are handled by Hadoop
Which OneFS daemon is responsible for generating each user’s identity token?
A. lsassd
B. lwiod
C. srvscd
netlogon
A. lsassd
What is an Ancestry Event on an Isilon cluster?
A. First instance of a coalesced event.
15 / 99
B. ID that an event had prior to being quieted.
C. An event that has been canceled.
D. An event that affects multiple nodes.
A. First instance of a coalesced event.
Which group of authentication sources is completely supported by OneFS?
A. RSA and AD
B. LDAP and AD
C. Smart Card and LDAP
D. NIS+ and LDAP
B. LDAP and AD
Which feature(s) is supported in NFSv3?
A. Dynamic failover
B. Stateful failover
C. ACLs and ACEs
D. Shares mounted separately
A. Dynamic failover
By default, what does EMC Isilon search for when looking up user ID mappings?
A. Same name in file provider
B. Presence of a UID/GID
C. Same name in LDAP
D. uidAttribute is AD
B. Presence of a UID/GID
Which feature distinguishes SMBv2 from SMBv1?
A. Endurant file handler
B. Stateless protocol
C. Change notification
D. Packet signing
A. Endurant file handler
An organization has two different Isilon clusters:
- Six-node cluster in London, England
- Eight-node cluster in Paris, France
They are using SynclQ to replicate between the clusters. Each site has access zones configured and
SmartConnect Advanced is licensed.
The organization is actively engaged in a failover from Paris to London. During testing, they realize that
users from the Sales department in Paris are receiving authentication errors from the London cluster.
Which step should be taken to troubleshoot this issue?
A. Verify that the Sales access zones for Paris are configured on the London cluster
B. Verify that the Sales access zones for London are configured on the Paris cluster
C. Verify that the SmartConnect zone for Sales in Paris is set to the system access zone
16 / 99
D. Verify that the London cluster retained the Paris user list
A. Verify that the Sales access zones for Paris are configured on the London cluster
Which client connection policy is the default?
A. Round Robin
B. Connection Count
C. Network Throughput
D. CPU Utilization
A. Round Robin
A service provider has an Avamar server supporting many of their customer’s backup requirements.
They need to create customized reports for each customer for billing purposes. Currently, existing
reports on Avamar do not meet this requirement.
How can the service provider generate customized reports?
A. Configure Crystal Reports to extract data using Avamar MCCLI
B. Configure Microsoft Excel to access the Avamar MySQL database
C. Use Backup and Recovery Manager to track backup capacity usage per customer
D. Use Data Protection Advisor to access the Avamar PostgreSQL database
D. Use Data Protection Advisor to access the Avamar PostgreSQL database
Which type of administrator commands does configuration auditing track?
A. PAPI-enabled commands
B. Commands run by the ??root? user
C. Commands run by the SystemAdmin and CompAdmin users only
D. All UNIX, isi, isi_ and sudo commands
A. PAPI-enabled commands
A Dell EMC Isilon administrator wants to create file pool policies using templates available in the
operating system.
Which management interface is used to create these templates?
A. GUI only
B. GUI and CLI
C. CLI only
D. Windows MMC
A. GUI only
Which capabilities are enabled after activating an Isilon SnapshotIQ license?
A. Create and schedule snapshots, and modify SnapshotIQ settings
B. View and delete snapshots, and access snapshot data
C. View, create, and schedule snapshots, and access snapshot data
D. Create snapshot schedules, access snapshot data, and delete snapshots
A. Create and schedule snapshots, and modify SnapshotIQ settings
What client protocols are supported to provide access to EMC Isilon clusters?
17 / 99
A. SMB, NFS, HTTP, FTP, and HDFS
B. AFP, CIFS, NFS, TCP, and UDP
C. SMB, NFS, HTTP, FTP, and SMTP
D. TFTP, CIFS, NFS, SSL, and TCP
A. SMB, NFS, HTTP, FTP, and HDFS
While troubleshooting issues with a new directory services added to an Isilon cluster, which command
should be used to ensure the configured base DN is correct?
A. tcpdump
B. nslookup
C. ldapsearch
D. netstat
C. ldapsearch
Which job is a data distribution job on an Isilon cluster?
A. FlexProtect
B. Collect
C. MediaScan
D. TreeDelete
A. FlexProtect
Which two security roles are required for full administrative privileges when managing an Isilon
cluster?
A. Security Admin and System Admin
B. System Admin and Audit Admin
C. Security Admin and Backup Admin
D. Backup Admin and Audit Admin
A. Security Admin and System Admin
What is EMC best practice for creating more than one snapshot per directory?
A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more
frequently; use longer expiration periods assigned to snapshots that are generated less frequently
B. Create snapshots with longer expiration periods assigned to snapshots that are generated more
frequently; use shorter expiration periods assigned to snapshots that are generated less frequently
C. Only create snapshots with shorter expiration periods assigned to snapshots that are generated more
frequently
D. Only create snapshots with longer expiration periods assigned to snapshots that are generated less
frequently
A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more
A storage administrator has an Isilon cluster consisting of 10 nodes with identical hardware and are
members of a single node pool. A 1024Kb file stored on that cluster is protected at N+3n.
What is the total number of copies of the file’s metadata?
A. 3
18 / 99
B. 4
C. 6
D. 5
B. 4
By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to “Native”
and a user has a synthetic UID?
A. RID
B. GID
C. SID
D. UID
C. SID
In a Dell EMC Isilon environment, which SyncIQ option can be used to copy the SmartLink file to
another cluster that supports CloudPools?
A. Deny
B. Stub
C. Allow
D. Force
D. Force
Isilon SmartLock Compliance clock has drifted from the system clock.
How can the difference between compliance and system clocks be corrected?
A. Compliance clock drifts towards system clock automatically
B. Compliance clock drift correction is not allowed
C. Administrative user ??root? can manually adjust the compliance clock
D. Administrative user ??compadmin? can manually adjust the compliance clock
A. Compliance clock drifts towards system clock automatically
Which Dell EMC Isilon cluster quota events can be triggered for a hard quota?
A. Soft quota write access denied, grace period expired, write access denied, and report generation
failed
B. Limit exceeded, limit remains exceeded, grace period expired, and report generation failed
C. Limit exceeded, grace period expired, write access denied, and advisory limit exceeded
D. Limit exceeded, limit remains exceeded, and write access denied
D. Limit exceeded, limit remains exceeded, and write access denied
Which job gathers data for InsightIQ?
A. IndexUpdate
B. Collect
C. Aenalys
D. FSAnalyze
D. FSAnalyze
An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional,
the administrator wants to create specific administrative accounts for specific cluster management
activities in different access zones. An administrator of one zone should be able to view or configure
objects in a different zone.
Which action will address the administrator??s requirements?
A. Create ZRBAC role for each zone administrator.
B. Create ZRBAC role for the administrator on all access zone.
C. Create a separate management subnet for each administrator.
D. Create an unique role in the System zone for each administrator.
A. Create ZRBAC role for each zone administrator.
What NFS protocols are supported by OneFS v7.2?
A. NFSv3 and NFSv4
B. NFSv2 and NFSv3
C. NFSv2 and NFSv4
D. NFSv4 and NFSv4.1
A. NFSv3 and NFSv4
What is the maximum number of active Swift connections on a 5-node Isilon cluster?
A. 250
B. 500
C. 750
D. 1000
C. 750
When using NIC aggregation, which configuration is supported in a Dell PowerScale Gen 6
environment?
A. ext-1 and ext-2 of node 1 aggregated together
B. ext-1 of node 1 and ext-2 of node 2 aggregated together
C. ext-agg of node 1 and ext-agg of node 2 aggregated together
D. ext-1 of node 1 and ext-1 of node 2 aggregated together
A. ext-1 and ext-2 of node 1 aggregated together
What protection level will guard against three simultaneous node failures anywhere across an EMC
Isilon cluster?
A. N+4d:2n
B. N+3n
C. N+3d:1n1d
D. N+3d:1n
B. N+3n
In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access
auditing capability
A. NFS, SMB, and HDFS
20 / 99
B. NFS, FTP, and SWIFT
C. NFS, SMB, and SWIFT
D. NFS, FTP, and HDFS
A. NFS, SMB, and HDFS
Which semi-automated process with SyncIQ has the capability to interrupt sync jobs in progress?
A. Failover
B. Fail back
C. Continuous mode
D. Initial sync compare
A. Failover
A Dell EMC Isilon customer is using scripts based on PAPI to automate some of their storage
administration tasks. The cluster is running OneFS 7.2. The PAPI script is using the isi config command,
but it returns an error.
A. OneFS blocked the use of the isi config command
B. isi config command is not a PAPI-aware command
C. isi config command is not a OneFS command
D. PAPI only uses job engine commands
C. isi config command is not a OneFS command
Which component is passive during LACP communication between the cluster and the Ethernet
switch?
A. MAC address
B. Isilon
C. Switch
D. Smart Connect zone
B. Isilon