301-400 Flashcards
Which protocols are referenced when creating multiprotocol permissions in an Isilon
implementation?
A. NFS and SMB only
B. FTP, NFS, and HTTP
C. HDFS, SMB, and FTP
D. REST and PAPI only
A. NFS and SMB only
You are configuring a five-node Isilon cluster with high-density, NL-Series nodes. You want to
minimize protection overhead and preserve the required MTTDL requirements.
Which protection level is most appropriate for this type of cluster?
A. 2X
B. N+1n
C. N+2n
D. N+2d:1n
D. N+2d:1n
What is a benefit of the Isilon Data Lake solutions?
60 / 99
A. Protects entirety of lake at same level
B. Scale-up approach for petabyte scale
C. Block-based storage for large databases
D. Stores data from multiple sources
D. Stores data from multiple sources
What is the size of the cloud data object on a Dell PowerScale cluster running OneFS 9.0?
A. 8 KB
B. 128 KB
C. 2 MB
D. 8 MB
C. 2 MB
Which type of node is designed for files that are accessed infrequently, or stored for archival
purposes?
A. NL-Series
B. S-Series
C. X-Series
D. Backup Accelerator
B. S-Series
Which operating system does NetWorker Virtual Edition use?
A. RHEL
B. SLES
C. Solaris
D. Windows
B. SLES
What is the recommended limit for Access zones in Dell EMC Isilon OneFS 8.0?
A. 50
B. 60
C. 70
D. Unlimited
D. Unlimited
What is the recommended best practice to delete a container from an Isilon Swift implementation?
A. Use the web administration interface
B. Use the rmdir command from the Isilon CLI
C. Use the DELETE operation to delete the container and its contents
D. Ensure the container is empty and then delete the container
D. Ensure the container is empty and then delete the container
In an Isilon environment, which physical configuration will enable the internal failover network?
A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches.
61 / 99
B. Both int-a and int-b ports of each node in the cluster must be physically connected to one switch.
C. Only int-a ports of each node in the cluster must be physically connected to one switch.
D. Only int-b ports of each node in the cluster must be physically connected to one switch.
A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches.
An organization wants to provide their client with read-only administrative access to their EMC Isilon
data cloud.
Which role would best provide the access required?
A. Audit Admin
B. Backup Admin
C. System Admin
D. Security Admin
A. Audit Admin
What is a minimum requirement to enable GNA in an Isilon cluster?
A. Four nodes within a cluster contain SSDs
B. L3 cache is enabled
C. 20% of the nodes contain SSDs
D. Total SSD space equals 1%
C. 20% of the nodes contain SSDs
What is a characteristic of static pools?
A. Will force an IP to remain on a NIC port even if a node fails
B. Can assign more than one IP per NIC port in the pool
C. When a node fails, will fail over IPs to the node with the lowest LNN
D. Must have the same number of IPs in the range as NIC ports in the pool
A. Will force an IP to remain on a NIC port even if a node fails
In an Isilon Hadoop configuration, what changes occur in the event there is a failure of an Isilon
node running as a NameNode?
A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be
preserved
B. Administrative intervention will be required to failover the NameNode
C. Affected node will be SmartFailed since metadata assigned to the failed NameNode can be
compromised
D. Administrator can configure a replacement NameNode; all metadata will be preserved
A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be
Which command(s) writes uncommitted data from NVRAM to disk on an EMC Isilon node?
A. isi_flush
B. isi devices
C. isi config»_space;> commit
D. isi_for_array -s isi update
A. isi_flush
What is a reason for implementing a scale-out NAS solution?
A. Solution needs to add capacity without adding compute power or bandwidth
B. Solution needs specialized controllers that will run in active-active mode
C. Performance of the solution needs to scale consistently to hundreds of petabytes
D. Components of the solution need to be distributed across different racks for redundancy
C. Performance of the solution needs to scale consistently to hundreds of petabytes
How many rack units are required in a Dell EMC Isilon Gen 6 chassis?
A. 1U only
B. 1U or 2U
C. 2U only
D. 4U
D. 4U
What is a benefit of using access zones on an EMC Isilon cluster?
A. Multi-tenancy
B. All users can share data access
C. Single tenancy
D. All groups can share data access
A. Multi-tenancy
What are characteristics of deduplication on an EMC Isilon cluster?
A. Asynchronous batch job
Does not dedupe blocks within files
Occurs within node pools
B. Runs during file write
Does not dedupe blocks within files
Occurs within individual tiers
C. Asynchronous batch job
Dedupes blocks within files
Occurs across node pools
D. Runs during file write
Dedupes blocks within files
Occurs across individual tiers
A. Asynchronous batch job
Which command can be used to test connectivity from a client to an Isilon cluster?
A. nslookup
B. netstat
C. ping
D. ifconfig
C. ping
In a Dell EMC Isilon environment, what is a characteristic of dynamic pools?
A. Fails over the IP addresses in a pool to the node with the lowest LNN if a node fails
B. Must have the same number of IP addresses in the range as NIC ports in the pool
C. Forces the IP addresses to stay with the same NIC port, even if a node fails
D. Can allocate more than one IP address per NIC port in the pool
D. Can allocate more than one IP address per NIC port in the pool
Which features are part of the traditional Hadoop NameNode?
A. Filesystem for the metadata
One physical server
B. Holds Metadata/location data for the cluster
Task Tracker
C. Filesystem for the metadata
Multiple NameNodes
D. One physical server
Task Tracker
A. Filesystem for the metadata
What is the correct sequence of phases taken in a full deduplication job?
A. 1. Index updating
2. Duplicate detection
3. Block sharing
4. Sampling
B. 1. Block sharing
2. Duplicate detection
3. Index updating
4. Sampling
C. 1. Duplicate detection
2. Sampling
3. Block sharing
4. Index updating
D. 1. Sampling
2. Duplicate detection
3. Block sharing
4. Index updating
D. 1. Sampling
An organization has a five-node standard Isilon cluster. Due to regulatory requirements, they need to
build a compliance mode cluster using the existing production hardware.
How can this be achieved?
A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster
B. SmartFail two of the nodes and use them to build a new compliance mode cluster
C. Add the SmartLock license to the existing cluster and create some compliance mode directories
D. Purchase a new cluster as there is no way to upgrade an existing cluster or reformat nodes
64 / 99
A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster
A Dell PowerScale cluster has six A200 nodes and the node pool data protection level is set to N+2.
The data access pattern is currently set to streaming.
If the data access pattern is changed to random, how many stripes for a 1 MB file are moved to other
drives?
A. 0
B. 2
C. 4
D. 6
D. 6
What is a major advantage of the DSP in version 7.1.1 and later?
A. The nodes remain online during the update process
B. The updated node remains offline during the process and joins the cluster after the update
C. It will update the node firmware non-disruptively
D. It automatically updates all drives simultaneously
A. The nodes remain online during the update process
A Dell PowerScale administrator wants to list the snapshots only for /ifs/data/stuGG7.
Where can they find the snapshots?
A. /ifs/.snapshot only
B. /ifs/data/stuGG7/.snapshot and /ifs/.snapshot
C. /ifs/data/stuGG7/.snapshot only
D. /ifs/data/stuGG7 and /ifs/.snapshot
A. /ifs/.snapshot only
What is used to reduce the time to ACK to the client for synchronous writes?
A. Endurant Cache
B. L1 Cache
C. FAST Cache
D. L2 Cache
A. Endurant Cache
An administrator wants to verify that a file has been moved from the Dell PowerScale cluster to the
cloud. The cluster is running Dell PowerScale OneFS 9.0.
Which command can the administrator use?
A. isi cloud pools view
B. isi sync target
C. isi filepool
D. isi get
D. isi get
What is required to perform management operations through the web administration interface?
65 / 99
A. An external IP address reachable over TCP port 8080
B. Direct serial connectivity to any node in the cluster
C. TCP port 23 open between Isilon and a remote management server
D. ConnectEMC services enabled on the cluster
A. An external IP address reachable over TCP port 8080
An implementation engineer has just joined an EMC Isilon cluster to an Active Directory (AD). The
System zone of the cluster is set to default settings.
Which AD group is automatically added to the Isilon cluster??s users group?
A. Domain Users
B. Local Users
C. Everyone
D. Domain Admins
A. Domain Users
What is the benefit of sub pools within a node pool?
A. Drive loss protection is per sub pool
B. Increases the number of drives per node available for streaming writes
C. Enables multi-tenancy at the node pool level
D. Adds a more granular level of storage management
A. Drive loss protection is per sub pool
On which port will a NetWorker client listen?
A. 7934
B. 7937
C. 7944
D. 7947
B. 7937
Upon review of an existing Isilon cluster, a storage administrator discovers that the cluster is in
compliance mode. However, some files are beyond their maximum retention period but are not out of the
WORM state.
How can this condition be explained?
A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up
B. Files do not age out of compliance and the WORM state cannot be modified once written
C. Files were never updated to free up space
D. Users specified shorter individual retention periods than the directory configurations
A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up
Which benefit does GNA provide to a Dell EMC Isilon cluster?
A. Additional level of cache on SSDs used for metadata
B. Metadata read acceleration across the cluster
C. Namespace read/write acceleration across the cluster
D. Metadata read acceleration for only the Job Engine
66 / 99
B. Metadata read acceleration across the cluster
A storage administrator has an Isilon cluster consisting of 20 nodes. The nodes have identical
hardware and are members of a single node pool. All files are being protected at N+2d:1n.
What is the largest file that can be written in a single stripe on this cluster?
A. 1024 KB
B. 2048 KB
C. 2304 KB
D. 2560 KB
B. 2048 KB
In an Avamar client, what is used to identify unique data?
A. Summary Vectors
B. Containers
C. Fingerprints
D. Cache files
D. Cache files
What is the purpose of access zones?
A. Isolate data for multi-tenancy
Control who can access the data in each zone
B. Create configuration settings for authentication
Provide identity management services on a cluster
C. Configure authentication providers
Provision protocol directories
D. Create mode bits and access control lists
Control client access to files and directories
A. Isolate data for multi-tenancy
When a Gen 5 node loses power unexpectedly, which cache performs a vault to flash memory in a
Dell EMC Isilon environment?
A. NVRAM Cache
B. DNS Cache
C. Endurant Cache
D. L1 Cache
A. NVRAM Cache
You are configuring an NS record for an EMC Isilon cluster.
What is the best practice for naming the NS record?
A. Unique name
B. Same name as the A record
C. Same name as the cluster
D. Same name as the Smart Connect zone
B. Same name as the A record
A customer has NFSv3 and SMBv2 clients on the same network which need to access a Dell EMC
Isilon cluster.
Based on best practice, how should the cluster’s network settings be configured?
A. 1 subnet with 1 pool
B. 1 subnet with 2 pools
C. 2 subnets with 1 pool each
D. 2 subnets with 2 pools each
B. 1 subnet with 2 pools
What benefit does GNA provide to the cluster?
A. Metadata read acceleration across the cluster
B. Namespace read/write acceleration across the cluster
C. An additional level of cache on SSDs used for metadata
D. Metadata read acceleration specifically for the job engine
A. Metadata read acceleration across the cluster
What is provided by using link aggregation?
A. Failover mechanism for stateful protocols
B. Failover across EMC Isilon cluster nodes
C. Failover mechanism for stateless protocols
D. Increased overall throughput for a single client
A. Failover mechanism for stateful protocols
You configure DataIQ to monitor the Dell PowerScale cluster. You add a subdirectory to the OneFS
volume that DataIQ monitors. However, the subdirectory does not appear in the Data Management >
Browse page.
What action should you take to resolve this issue?
A. Include the subdirectories in the data management configuration file
B. Add a file type class to the PowerScale volume
C. Run a scan on the PowerScale volume
D. Adjust the scan exclusions on the Data Management Configuration page
C. Run a scan on the PowerScale volume
When a user accesses a file on a Dell PowerScale cluster, what does the cluster use to verify
authorization?
A. Active Directory call to LDAP
B. Configured authentication service
C. Access token
D. On-disk identity
C. Access token
A storage administrator wants to check the current firmware status of an EMC Isilon cluster as
quickly as possible.
68 / 99
Which command should you run to non-disruptively check this information?
A. isi firmware status
B. isi devices
C. isi_for_array isi firmware status
D. isi_for_array isi devices
A. isi firmware status
A customer has implemented SyncIQ as part of their DR strategy. They are now implementing
SmartLock for data retention as part of their continued migration to EMC Isilon as their big data NAS
storage provider.
What advice should be provided to the customer regarding SmartLock directories and SyncIQ?
A. Only non-WORM directories can be failed over and failed back
B. Only non-WORM and Enterprise SmartLock directories can be failed over and failed back
C. Enterprise SmartLock directories can be synchronized to Compliance SmartLock directories
D. Compliance SmartLock directories can be synchronized to Enterprise SmartLock directories
A. Only non-WORM directories can be failed over and failed back
What is the minimum required information to create an SMB share?
A. Specific share permissions
B. Access zone
C. Export name
D. Description
B. Access zone
Refer to the exhibit.
What is the actual protection level of the FEATURE.wmv file?
A. N+2n
B. N+1
C. N+2d:1n
D. N+2
A. N+2n
What is the maximum object size supported by a Dell PowerScale OneFS S3 bucket?
A. 8 TB
B. 16 TB
C. 32 TB
D. 64 TB
B. 16 TB
A Dell EMC Isilon user is restricted by a 40 GB quota that includes data protection overhead in its
69 / 99
disk usage calculations.
If the cluster is configured with a 2x data protection level and the user writes a 10 GB file to the cluster,
how much space is consumed?
A. 10 GB
B. 20 GB
C. 30 GB
D. 40 GB
B. 20 GB
A company has an 8-node F800 Dell PowerScale cluster with two Z9100 Dell Ethernet back-end
switches running on OneFS 8.2.0. The company is planning to add 72 H500 nodes to the cluster.
What is the minimum number of additional switches needed to support the configuration?
A. 5
B. 6
C. 10
D. 12
C. 10
During a Dell PowerScale OneFS rolling upgrade, which protocols offer continuous availability
functionality?
A. NFSv3 and SMB 2.0
B. NFSv4 and SMB 3.0
C. SMB 2.0 and SMB 3.0
D. SMB 2.0 and NFSv4
B. NFSv4 and SMB 3.0
A customer has Smart Failed out a node named “node-1”, and replaced it with another. The new
node has identified itself as “node-8”.
Which command(s) would allow the customer to change the identity of the new node to “node-1”?
A. isi firmware update
B. isi update
C. isi devices
D. isi config
»> lnnset
D. isi config
Which feature of the SMB protocol can be used to adjust protocol overhead?
A. Change notify
B. Stateless
C. Credit limits
D. Stateful
A. Change notify
What type of identity information is stored in an access token?
70 / 99
A. Primary and secondary identities
B. Kerberos tokens
C. Primary identities only
D. Secondary identities only
A. Primary and secondary identities
Which protocol connections could seamlessly fail over to another node if an EMC Isilon node
became unavailable?
A. NFSv4
B. NFSv3
C. HDFS
D. SMBv2.1
B. NFSv3
In a Dell EMC Isilon environment, what is provided by using the “and” condition in a file pool policy
filter?
A. Increases the granularity of the file match criteria
B. Reduces the number of file pool policies
C. Combines multiple file pool policy filters with the same actions
D. Broadens the file pool policy match criteria
A. Increases the granularity of the file match criteria
An Internet hosting company has customers requesting a total of 200 TB of storage. The hosting
company currently has 50 TB of storage available.
What should be implemented to satisfy customer requirements?
A. Thin provisioning
B. Soft user quotas
C. Default group quotas
D. Advisory user quotas
A. Thin provisioning
A given node pool consists of hard drives only (no SSDs).
How many drives are included, per node, in a sub pool?
A. 2
B. 3
C. 6
D. 12
C. 6
Which interface on an Isilon cluster represents an aggregation of interfaces ext3 and ext4?
A. ext-agg-2
B. lagg-2
C. ext-agg-3
D. ext-agg
71 / 99
A. ext-agg-2
What is a valid hierarchical structure in the Isilon Job Engine v2.0?
A. Jobs contain phases
B. Tasks contain phases
C. Tasks contain jobs
D. Items contain tasks
A. Jobs contain phases
What security settings are used to calculate effective permissions for Windows clients when
accessing a Windows share?
A. Combination of share permissions File or folder ACL
B. Combination of local security policies File or folder ACL
C. Combination of share permissions only
D. Windows group policy settings only
A. Combination of share permissions File or folder ACL
What is the minimum number of H400 nodes with OneFS 8.2.0 required to create a new Dell
PowerScale cluster?
A. 3
B. 4
C. 5
D. 6
B. 4
A storage administrator has configured two SmartConnect zones on an Isilon cluster labeled ZoneA
and ZoneB. Source-Based Routing has been enabled on the cluster.
How will the outgoing network packets from the cluster be routed back to the requesting IP?
A. Both zones will use the source IP to route the packets.
B. Both zones will use the highest priority default gateway.
C. ZoneB will route all packets through ZoneA.
D. ZoneA will route all packets through ZoneB.
A. Both zones will use the source IP to route the packets.
What is the state of the source data when a failover to the target cluster has been completed?
A. Read only
B. Read/Write
C. Files marked as locked by One FS
D. Retention rules are applied
B. Read/Write
A Dell EMC Isilon administrator wants to configure SnapshotIQ for optimal efficiency for writes after
a change is made.
Which information should be provided to the administrator?
72 / 99
A. Redirect on Write should always be used
B. Optimizing writes is configurable through sysctl
C. Copy on Write should always be used
D. OneFS optimizes writes by default
D. OneFS optimizes writes by default
A storage administrator is planning to perform a node firmware update on an EMC Isilon cluster.
What should you do before installing a new firmware package?
A. Remove any previously installed firmware package
B. Remove any previously installed drive firmware
C. Reboot each node before updating the firmware
D. Remove any previously installed node firmware
A. Remove any previously installed firmware package
A Dell PowerScale OneFS administrator wants to perform a HealthCheck evaluation.
Which command should they use?
A. isi services healthcheck
B. isi monitor healthcheck
C. isi healthcheck run
D. isi healthcheck schedules
C. isi healthcheck run
How many Dell EMC Isilon clusters are supported on a single pair of back-end InfiniBand or
Ethernet switches?
A. 1
B. 2
C. 3
D. 4
A. 1
A storage administrator needs to enable FTP service on an Isilon cluster to allow internal customers
to upload files to the company. However, the administrator does not want to create individual user names
and passwords for each internal customer.
A. Configure LDAP to support anonymous access
B. Enable FTP server-to-server transfers
C. Enable FTP anonymous access
D. Configure Active Directory to support anonymous access
C. Enable FTP anonymous access
A storage administrator is migrating existing Microsoft Windows file data to an Isilon cluster. The
administrator discovered that two servers are using the same share name in the environment.
Which access zone feature will help in implementing this migration?
A. Each SMB share can be represented with a unique name
B. Each NFS export can be represented with a unique name
73 / 99
C. Each access zone will contain all available SMB shares by default
D. Each access zone will contain all available authentication providers by default
A. Each SMB share can be represented with a unique name
What is the recommended best practice when setting snapshot deletion schedules?
A. Determined by your RTO and RPO SLAs
B. Set to six times the length of the snapshot policy period
C. Set to delete after the next snapshot is taken
D. Set to one year after the snapshot is taken
A. Determined by your RTO and RPO SLAs
A company wishes to test automated fail back between two EMC Isilon clusters.
What requirements must be met before the test can occur?
A. The same version of OneFS must be running on source and target clusters
B. The same number of network connections must exist on source and target clusters
C. Both clusters must be running OneFS version 7.0 or greater
D. Both clusters must have exactly the same type and number of nodes
C. Both clusters must be running OneFS version 7.0 or greater
A company has completed DR testing and wishes to quickly reset a cluster via SyncIQ failback for
SmartLock directories.
What is the quickest way to return a node or group of nodes to an unconfigured state?
A. si_reformat_node
B. Reformat the nodes with a USB stick
C. isi config
»> shutdown all
D. SmartFail the nodes out individually
A. si_reformat_node
When using the same Active Directory domain for multiple access zones on an Isilon cluster, which
configuration must be considered?
A. Each access zone requires a unique Active Directory domain
B. All configured access zones will use the system zone’s configured Active Directory domain
C. Each individual access zone must be configured with the Active Directory domain
D. Each access zone must be configured using the same Smart Connect zone and pool
C. Each individual access zone must be configured with the Active Directory domain
Which RBAC role is required for an administrator to assign other administrators, roles, and
priviledges?
A. SecurityAdmin
B. AuditAdmin
C. SystemAdmin
D. BackupAdmin
A. SecurityAdmin
Where is the boot drive located on a Dell PowerScale Gen 6 node?
A. Cache SSD at the back of the node
B. Bootflash drive inside the node
C. Data drives of the node
D. Mirrored journal drive
C. Data drives of the node
Which OneFS 8.0 feature can be added to an NFSv4 export to assist with seamless failover in the
event of a disconnect?
A. Transparent failover
B. Stateless connection
C. Stateful connection
D. Continuous availability
C. Stateful connection
What NIC ports could be used in a valid NIC aggregation configuration?
A. ext-1, ext-2, ext-3, and ext-4
B. ext-1, ext-2, 10gige-1, and 10gige-2
C. ext-1 and 10gige-1 only
D. 10gige-1, 10gige-2, 10gige-3, and 10gige-4
A. ext-1, ext-2, ext-3, and ext-4
What is the minimum number of SSIPs required for an EMC Isilon cluster?
A. 1 per cluster
B. 1 per pool
C. 1 per subnet
D. 1 per node
A. 1 per cluster
An administrator wants to configure antivirus scanning on an Isilon cluster.
What is the best way to accomplish this task?
A. Isilon web administration interface => Data Protection => Antivirus, and then click “Add an ICAP
Server”.
B. Install the antivirus client on all nodes in the cluster.
C. Install the antivirus client on the logical node number in the cluster.
D. Isilon web administration interface => Data Protection, and then click “Install Antivirus Client”.
A. Isilon web administration interface => Data Protection => Antivirus, and then click “Add an ICAP
A customer has created multiple file pool policies on their cluster. Many of the file pool policies
include the same filtering criteria.
What determines which file pool policy is applied to the file?
A. The first matching policy in top-down order
B. The first matching policy in bottom-up order
75 / 99
C. File name matches are applied first, followed by File location matches
D. File time matches are applied first, followed by File name matches
A. The first matching policy in top-down order
An RHEL client is connecting to an EMC Isilon cluster using NFSv3.
How is client response traffic routed out of the cluster?
A. Highest priority gateway
B. 1 GigE NICs on node with highest LNN
C. 10 GigE NICs on node with lowest node ID
D. Lowest priority gateway
A. Highest priority gateway
A company has a Dell PowerScale cluster with Gen 6 nodes. Due to performance issues, they have
added four H400 nodes and created a new node pool. The administrator wants to enable metadata
read/write acceleration for the SSDs.
However, they are not able to do so.
What is the reason for this issue?
A. L3 cache is enabled on the new node pool and uses all SSDs
B. L3 cache is disabled on the new node pool; therefore, acceleration is not available
C. Metadata read/write acceleration needs to be enabled in the CLI
D. Only metadata read acceleration is supported with Gen 6 H400 nodes
A. L3 cache is enabled on the new node pool and uses all SSDs
Refer to the exhibit:
A storage administrator has an Isilon cluster with the following:
- Five S210 nodes
- Eight X200 nodes
- Eight NL400 nodes
The cluster default protection level is set to N+2n and the administrator has configured the listed file pool
policies. A video capture station saves a new file to /ifs/content/ project as intro.mov.
Which node pool is the intro.mov file written to and which protection level is applied?
A. NL400_Pool at N+3n protection
B. S210 _Pool at N+2n protection
C. X200_Pool at N+2n protection
D. X200_Pool at N+3n protection
76 / 99
A. NL400_Pool at N+3n protection
Before deploying a new EMC Isilon cluster you decide to confirm the details of the installation with
the customer. The customer would like to make a change to the subnet pools in the configuration guide.
What should you do first?
A. Contact the design team
B. Update the configuration guide
C. Contact EMC change control
D. Collect system configuration
A. Contact the design team
What is the first step to perform a DR failover test?
A. Allow client writes to target SyncIQ policy paths
B. Run a final incremental sync on each policy failing over
C. Take a snapshot of each policy’s root path that is being failed over
D. Make the source paths of SyncIQ policies unavailable to client writes
D. Make the source paths of SyncIQ policies unavailable to client writes
An Isilon administrator needs to create a new Isilon cluster to support high performance and large
capacity storage for a streaming media environment.
Which node model is recommended?
A. HD-Series
B. NL-Series
C. S-Series
D. X-Series
D. X-Series
A storage administrator has just configured a newly acquired Isilon cluster. The administrator
connected to the console port of Node 1 and created subnets, pools, and two access zones called ??Blue?
and ??Green?.
The administrator then created shares in zone ??Blue? and is able to access the shares from their
Microsoft Windows clients. In addition, the administrator created exports in the ??Green? zone and is able
to access the exports from their UNIX clients.
However, the administrator is unable to SSH into the cluster and login as root.
What is a possible cause for this issue?
A. No interfaces exist in the System zone
B. No authentication providers are defined in the “Blue” and “Green” access zones
C. No failover address was configured for the InfiniBand network
D. A local user “root” needs to be created
A. No interfaces exist in the System zone
You are deploying an EMC Isilon system using one dynamic Smart Connect pool.
How many IP addresses are recommended for a cluster with 10 nodes, of which only 6 nodes participate
in the pool?
77 / 99
A. 6
B. 10
C. 30
D. 90
C. 30
When enabling mount access to subdirectories, what can the user do?
A. Read and write files in the parent directory
B. Red files in the parent directory
C. Browse the directories in the parent directory
D. Directly mount a subdirectory of the export
D. Directly mount a subdirectory of the export
When using an X410 node containing HDDs and SSDs, which bay numbers are used to contain
SSDs in the standard configurations?
A. Bays 1 and 2 only.
B. Bays 1 through 6.
C. Bays 31 through 36.
D. Bays 35 and 36 only.
B. Bays 1 through 6.
One FS version 8.0 supports how many NFS exports?
A. 1,000
B. 10,000
C. 25,000
D. 40,000
D. 40,000
What accurately describes the behavior of On Disk Identity set to native on an Isilon cluster?
A. A file will be owned by a user’s real SID if no real UID exists for that user.
B. All files in shares can only be owned by a SID.
C. All files in exports can only be owned by a UID.
D. User identities must be defined through external authentication providers.
A. A file will be owned by a user’s real SID if no real UID exists for that user.
Which task requires preparation for successful failover?
A. Creating shares and exports on the target cluster
B. Using the same cluster name and IP address for source and target
C. Breaking the target associations of SyncIQ policies
D. Testing each SyncIQ policy to prepare resync policies
A. Creating shares and exports on the target cluster
How are events communicated from the CELOG daemon?
A. Sent using SNMP only
78 / 99
B. Sent by the CELOG notifications service
C. Sent over ESRS only
D. Sent by the MCP
B. Sent by the CELOG notifications service
A customer wants to test the failover and fail back capabilities of their SmartLock directories using
SyncIQ.
What should you advise the customer?
A. Failover is a one-way event with SmartLock directories
B. Fail back is supported with SmartLock directories
C. Committed files on the target can be replicated back to the original source directories
D. SyncIQ can revert SmartLock directories on the source cluster
A. Failover is a one-way event with SmartLock directories
In OneFS 8.2.0, how many snapshots are supported at the cluster and directory levels?
A. 20,000 and 1000
B. 20,000 and 1024
C. 40,000 and 2000
D. 40,000 and 2048
A. 20,000 and 1000
If an Isilon has been integrated into an existing Hadoop environment, what explains how the HDFS
data will be distributed?
A. HDFS data on Isilon and computations will be handled by Hadoop
B. HDFS data remains on Hadoop; computations is handled by Isilon
C. Files are stored in a specialized HDFS compatible file system format on the Isilon cluster
D. MapReduce on the Isilon allows data to be distributed across both platforms
A. HDFS data on Isilon and computations will be handled by Hadoop
What are the ways in which a FlexProtect job can start in a Dell EMC Isilon environment?
A. Using a batch command and event driven
B. Using a batch command and manually driven
C. Administrative and event driven
D. Non-event driven and unscheduled
C. Administrative and event driven