101-200 Flashcards
Which component is passive during LACP communication between the cluster and the Ethernet
switch?
A. MAC address
B. Isilon
C. Switch
D. Smart Connect zone
B. Isilon
Which Isilon Job Engine v2.0 component(s) should always be present on every node?
A. Three coordinators
B. Two managers per job
C. Two workers per task
D. One director
D. One director
Recently, an EMC Isilon cluster was upgraded from version 7.0.2.8 to version 7.0.2.9.
What is included in this degree of upgrade?
A. Maintenance release, new features, and functions
B. Code patch and functionality enhancements
C. Major functionality enhancements
D. Maintenance release and a substantial product upgrade
B. Code patch and functionality enhancements
What are the methods to join a node to an Isilon cluster?
A. Configuration wizard, SSH connection, or CLI only
B. Serial connection, Configuration wizard, or CLI only
C. Front panel display, serial cable, or Configuration wizard only
D. Front panel display, Configuration wizard, WebUI, or CLI only
D. Front panel display, Configuration wizard, WebUI, or CLI only
Which solution meets the SaaS criteria for a customer that is under-staffed and is having difficulty
managing their infrastructure?
A. Mozy
B. NetWorker
C. Isilon
D. Recover Point
A. Mozy
In a EMC Dell Isilon environment, can different node types be combined into a single tier?
A. Yes; only during a cluster upgrade
B. Yes; only for disaster recovery configuration purposes
C. No; different node types can never be combined
D. Yes; only if they have similar performance characteristics
D. Yes; only if they have similar performance characteristics
What is the result of mapping POSIX mode bits to a Microsoft Windows ACL on an Isilon cluster?
A. No ownership information is lost.
B. Process creates a real ACL.
C. Security of the file may be increased.
D. Multiple user ACEs are collapsed into a single ACE.
A. No ownership information is lost.
What is a benefit of storing Hadoop data on an Isilon cluster versus a traditional Hadoop
environment?
A. In-place analytics
B. Requires 3X data mirroring
C. NameNode resides on a single node
D. Nodes do both computation and storage
A. In-place analytics
How is InsightIQ changed when FSA is enabled?
A. When enabled, a Job runs on the cluster and collects InsightIQ data
B. By default, it runs every hour and monitors cluster performance
C. Enabled on a VM or physical server and helps plan SmartPools and file system use
D. FSAnalyze queries results from the last InsightIQ run and populates file system reports
A. When enabled, a Job runs on the cluster and collects InsightIQ data
What are the minimum requirements needed to enable the Global Namespace Acceleration setting?
A. 2.0% of disk capacity must be SSD
5% of the nodes must contain SSDs
SmartPools license
B. 2.5% of the disks capacity must be SSD
SmartPools license
C. 1.5% of disk capacity must be SSD
20% of the nodes must contain SSDs
D. 20% of the number of disks must be SSDs
C. 1.5% of disk capacity must be SSD
When will snapshots with no expiration date be removed from the cluster?
A. Manually removed by the cluster administrator
B. Upper limit of allowable snapshots is reached
C. Cluster free space is less than reserved snapshot space
D. Node pool containing the snapshots is full
A. Manually removed by the cluster administrator
Which quota type provides a grace period?
A. Hard
B. Group
C. Advisory
D. Soft
D. Soft
What are the recommended methods for connecting to an EMC Isilon cluster to perform a firmware
update?
A. PAPI and serial console port
B. Telnet and SSH
C. PAPI and Telnet
D. Serial console port and SSH
D. Serial console port and SSH
What is a characteristic of snapshots?
A. Snapshot creation time is based on the depth of the directory tree
B. Initial snapshot size is based upon the size of files inside the directory
C. Snapshots are created almost instantaneously
D. During snapshot creation, all pointers to files are moved to the snapshot
C. Snapshots are created almost instantaneously
Which CLI command(s) is used to identify how many snapshots are currently on disk?
A. isi snapshot snapshots view
B. isi snapshot schedules
C. isi snapshot settings
23 / 99
D. isi snapshot snapshots list
D. isi snapshot snapshots list
What actions can be specified as part of a file pool policy?
A. Snapshot storage target
Data access pattern
Sub pool target
B. SSD strategy
Spillover target
Requested protection level
C. Data storage target
Requested protection level
Data access pattern
D. Data storage target
Write performance optimization
L3 Cache enablement
C. Data storage target
In a Dell EMC Isilon environment, which file pool policy job is used to apply the default file pool
policy when SmartPools is unlicensed?
A. SetProtectPlus
B. SmartPools
C. FlexProtect
D. SmartPoolsTree
A. SetProtectPlus
Where is an Isilon Gen 6 node boot drive located?
A. On the cache SSD drive at the back of the node
B. On the mirrored journal drive
C. On the node??s data drives
D. On the bootflash drive inside the node
C. On the node??s data drives
A systems administrator is migrating existing Microsoft Windows file data to an access zone on the
Dell PowerScale cluster. The administrator discovers that two servers are using the same share name in
the environment.
How can the administrator overcome this migration challenge?
A. Add the two AD authentication providers in the access zone to isolate access to the shares
B. Configure unique SMB shares in the access zone for each share to be migrated
C. Create identical SMB shares in the access zones and change the names when the migration
completes
D. Merge each share to be migrated into an single SMB share in the access zone
B. Configure unique SMB shares in the access zone for each share to be migrated
How does an Isilon cluster account for the ownership of a file where on-disk identity has been set to
native?
A. All files in exports can only be owned by a UID
B. A file will be owned by a user’s real SID if no real UID exists for that user
C. User identities must be defined through external authentication providers
D. All files in shares can only be owned by an SID
B. A file will be owned by a user’s real SID if no real UID exists for that user
Traditional NAS storage architectures deploy simple two-way failover between two controllers in
storage systems, such as highly available configurations.
How is the Isilon architecture different in terms of system resiliency and availability?
A. OneFS enables each node to have a designated partner node for simple failover between the pair.
B. Use of client-side drivers can enable failover to other nodes.
C. Isilon clustered architecture deploys standby failover nodes to ensure the highest available solution.
D. OneFS enables each node to be a peer to any other node in an Isilon cluster. Any node can take over
for any other node.
A. OneFS enables each node to have a designated partner node for simple failover between the pair.
When modifying a job, which task can an Isilon administrator perform?
A. Modify job priorities
B. Modify job events
C. Pause or stop jobs
D. Modify job history
A. Modify job priorities
What configuration is required for clients to have the same user identity on both source and target
clusters?
A. Both clusters must be connected to the same LDAP and AD servers
B. Both clusters must have the same SMB shares and NFS exports
C. The SyncIQ policy must be a ‘copy’ policy
D. The SyncIQ policy must be a ‘sync’ policy
A. Both clusters must be connected to the same LDAP and AD servers
An existing EMC Isilon customer must comply with SEC regulations; they require that their cluster be
changed to Compliance mode.
How can this best be accomplished?
A. Engage Professional Services to guide the change
B. License SmartLock and configure it to activate Compliance mode
C. Upgrade OneFS to a newer version
D. Select Compliance mode from the web administration interface
A. Engage Professional Services to guide the change