400-499 Flashcards

1
Q

What is the maximum audit log size in Isilon OneFS before rolling over to a new file?

A. 512 MB
B. 1 GB
C. 2 GB
D. 4 GB

A

B. 1 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have been tasked with creating file pool policies for a customer as part of the configuration
79 / 99

document. The file criteria indicate that directories that have not changed for over 60 days should be
moved to the archive tier.
What file pool policy filter types should you select?

A. File type and mtime
B. Filename and atime
C. File type and atime
D. Filename and mtime

A

A. File type and mtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the On-Disk Identity types that appear in the web administration interface?

A. SID, UNIX, and Native
B. GUID, UID/GID, and Mixed
C. AD, LDAP, and NIS
D. SMB, NFS, and Mixed

A

A. SID, UNIX, and Native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Recently a Dell EMC Isilon cluster was upgraded from version 7.2.0.1 to version 8.0.1.0.
What was included in this upgrade?

A. Major change in functionality in the same family and theme
B. Code patches and firmware revisions only
C. Code patches and minor functionality enhancements only
D. Major changes and potential core modifications to the OS and data structures

A

D. Major changes and potential core modifications to the OS and data structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between dynamic and static link aggregation?

A. Dynamic link aggregation can be configured with the web administration interface.
Static link aggregation only supports CLI configurations.
B. Dynamic link aggregation negotiates with the switch on the aggregation settings.
Static link aggregation does not facilitate the negotiation.
C. Dynamic link aggregation balances the frames across the aggregated interfaces.
Static link aggregation can only failover across the links.
D. Dynamic link aggregation supports Round Robin and FEC aggregation modes.
Static link aggregation supports Failover and LACP modes.

A

B. Dynamic link aggregation negotiates with the switch on the aggregation settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users are receiving notification they are out of space even though when they calculate their file
usage, they should have 20% to 30% more space still available.
What is the probable explanation?

A. The quotas are set to include protection overhead
B. The group usage is included with their user quota
C. Snapshot data has not been deleted
D. Deleted files have not been removed from their quota

A

A. The quotas are set to include protection overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a valid simultaneous job combination on an Isilon Engine v2.0?

A. One Restripe job, one Mark job, and one All-Other job
B. One Restripe job, one All-Other job and one Multiscan job
C. One Restripe job and two Mark jobs
D. Two Restripe jobs and one All-Other job

A

A. One Restripe job, one Mark job, and one All-Other job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the access layers in EMC Isilon clusters?

A. Protocol, Authentication, Identity Assignment, and Permissions
B. Physical, Network, Transport, and Session
C. Network, Authentication, Identity Assignment, and Permissions
D. Physical, Network, Transport, and Application

A

A. Protocol, Authentication, Identity Assignment, and Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a reason why Isilon NAS solutions work effectively with Big Data workflows?

A. Functions as a single repository of data
B. Functions as single block-based storage
C. Functions as a scale-up solution
D. Provides multiple aggregates of volumes

A

A. Functions as a single repository of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which feature of the SMB protocol can be tuned to prevent clients from monopolizing EMC Isilon
cluster resources?

A. Oplocks
B. Change control
C. Packet signing
D. Credit limits

A

D. Credit limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the maximum number of H400 nodes that can be added to a node pool in a Dell
PowerScale cluster running OneFS 8.2?

A. 144
B. 252
C. 288
D. 352

A

B. 252

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the maximum number of concurrent active connections that Swift can support, per node?

A. 50
B. 100
C. 150
D. 200

A

C. 150

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When creating an SMB share on a Dell EMC Isilon cluster, what should the ??Directory ACLs? setting
be if adding a new share to an existing directory structure?

A. Do not change existing permissions
B. Apply Windows Default ACLs
C. Allow Variable Expansion
D. Auto-Create Directories

A

B. Apply Windows Default ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On the Isilon cluster CLI, which command will display the most active nodes every two seconds,
from highest to lowest?

A. isi statistics system –top –nodes –interval=2
B. isi alert list –newest=2 –nodes=all
C. isi devices -a status -d 2
D. isi_for_array -s isi status

A

A. isi statistics system –top –nodes –interval=2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Dell EMC Isilon customer is using the CloudPool feature to tier some old data to the Microsoft
Azure cloud. At the same time, they are using SyncIQ replication to replicate to a disaster recovery (DR)
cluster.
What accurately describes this implementation?

A. SyncIQ replicates POSIX mode bit permissions along with quota information to the DR cluster
B. Files stored in the cloud can be read directly from the cloud without any Isilon intervention
C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR
cluster
D. SyncIQ replicates file and directory permissions of files and directories to the DR cluster

A

C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In an Isilon Gen 6 cluster, what is the minimum number of nodes required to upgrade an existing
H500 cluster using A2000 nodes?

A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes

A

D. 4 nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is required to enable Secure NFS on an Isilon cluster?

A. Services for NFS must be configured in the AD environment
B. LDAP must be configured in the system access zone
C. NFS access must use static address pools
D. Cluster must be configured to use NTP

A

A. Services for NFS must be configured in the AD environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A systems administrator is planning an extension of a Dell PowerScale Gen 6 cluster. They are
asked to provide redundancy at the chassis level. The node pool protection level is +2d:1n.
82 / 99

What is the minimum number of nodes required to ensure that data is not lost when cycling power to a
single chassis?

A. 20
B. 22
C. 40
D. 42

A

C. 40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which data access pattern makes the prefetch caching algorithm to be highly aggressive?

A. Random
B. Parallel
C. Concurrency
D. Streaming

A

D. Streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After operating an EMC Isilon 3-node cluster for some time, a customer notices that the amount of
storage used seems significantly larger that it should be.
The filesystem has a tremendous amount of small (<128K) files and the protection level is N+2d:1n. The
customer does not want to sacrifice data protection.
What should be done to increase available capacity?

A. Nothing
B. Defragment the disks
C. Compress the small files
D. Change protection to 2x mirroring

A

A. Nothing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You are creating an A record in DNS for client connections.
Which IP should you use?

A. SmartConnect Service IP
B. IP from a dynamic pool
C. SmartConnect zone IP
D. IP from a static pool

A

A. SmartConnect Service IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which identity type is an example of a primary identifier?

A. SID
B. MPIO
C. Username
D. PID

A

A. SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are configuring DNS to work with SmartConnect zones.
What is the best practice recommendation to the customer?

A. Set TTL on NS records to zero
83 / 99

B. Use Linux-based DNS
C. Use Windows-based DNS
D. Set TTL on A records to zero

A

A. Set TTL on NS records to zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When using SyncIQ on an Isilon cluster, which setting is used to retain deleted files on the target?

A. Copy
B. Synchronize
C. –target-compare-initial sync on the CLI command option
D. Capture snapshots on the target cluster

A

A. Copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is one requirement to join multiple authentication sources through an access zone? A. Must belong to only the joined access zone B. Must use a common /ifs tree for all access zones C. Must belong to all access zones D. Must only join AD domains in the same forest
A. Must belong to only the joined access zone
26
An Isilon storage administrator has created a 500 GB quota on a new directory called `/ifs/homedirs'. The administrator then begins migrating files from a Linux server through NFS to the new directory. The migration tool returns a "Disk quota exceeded" error and fails to complete after approximately 400 GB of files are copied to the Isilon cluster. However, the cluster is reporting 10 TB of unused capacity. What is the most likely cause for this error? A. Hard quota includes overhead B. SmartPool tier capacity has been exceeded C. Soft quotas have been exceeded D. Only the root can exceed 80% of quota
A. Hard quota includes overhead
27
What authentication providers are supported on EMC Isilon clusters? A. NT, NIS, Open LDAP, Open ID, and Local B. AD, LDAP, NIS, Local, and File C. AD, LDAP, NIS, Local, and Workgroup D. Windows, UNIX, Hadoop, Open Stack, and MAC OSX
B. AD, LDAP, NIS, Local, and File
28
What is the size of a data stripe unit in KB? A. 8 B. 64 C. 128 D. 256
C. 128
29
In a Dell EMC Isilon environment, which protocol supports source-based routing (SBR)? A. IPv4 B. SMBv2 C. IPv6 D. NFSv3
A. IPv4
30
If an RHEL client is connecting to an Isilon cluster using NFSv3 and SBR is disabled, where does client response traffic move out of the cluster? A. Highest logical node B. Highest priority gateway C. Lowest priority gateway D. Lowest logical node
C. Lowest priority gateway
31
Which protocol does Isilon InsightIQ use when accessing its remote datastore? A. NFS B. SMB C. SCSI D. FTP
A. NFS
32
Which type of deduplication is performed by a Dell EMC Isilon cluster? A. Content Level B. File and Block Level C. Block Level only D. File Level only
D. File Level only
33
What information must be generated to access a Dell PowerScale OneFS S3 bucket using an S3 application? A. Secret key only B. Access token and secret key C. Access token and access ID D. Access ID and secret key
D. Access ID and secret key
34
Which jobs are used to help distribute file data across an Isilon cluster? A. Media Scan, Collect, and AV Scan B. Auto Balance, Auto Balance Lin, and Smart Pools C. Auto Balance, Integrity Scan, and Multi Scan D. Integrity Scan, Tree Delete, and Auto Balance
B. Auto Balance, Auto Balance Lin, and Smart Pools
35
An Isilon storage administrator obtained three X-Series nodes and two S-Series nodes for one cluster. What would be the status of the cluster? A. A cluster could be formed with all nodes online and writeable. B. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would be offline. C. A cluster could not be formed until an S-Series node is added. D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would remain in read-only mode.
D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would
36
After configuring a new NTP server in the Active Directory (AD) environment, the Microsoft Windows clients receive authentication failures and cannot connect to the Dell PowerScale cluster. What key condition should the administrator verify? A. Windows clients can connect to the NTP server B. Cluster time is synchronized with the Windows clients C. Windows clients can connect to other servers D. Cluster time is synchronized with the AD time
D. Cluster time is synchronized with the AD time
37
An EMC Isilon cluster is being configured for a Media and Entertainment customer. The customer's workflow consists primarily of video playback, requiring a very aggressive prefetch. What data layout access pattern is appropriate? A. Streaming B. Concurrency C. Random D. Default
A. Streaming
38
What is the correct hierarchy of the Job elements structure? Answer: 86 / 99 440.Which Isilon global cluster settings are managed by Smart Pools? A. L2 Cache, GNS, and VHS B. L3 Cache, GNA, and VHS C. L3 Cache, L2 Cache, and GNS D. L1 Cache, GNA, and VHS
B. L3 Cache, GNA, and VHS
39
The exhibit shows the components of a conventional Hadoop environment. Which component holds the location information for every file in the cluster? A. Name Node: Can comprise one or two physical servers. B. Compute: A logical component which runs on each node. C. Data: A physical component distributed across the cluster. D. 3X mirror: The first three nodes in the cluster configured as a 3X mirror.
A. Name Node: Can comprise one or two physical servers.
40
A Dell PowerScale administrator needs to secure data access with an appropriate Kerberos-based authentication provider in a non-System zone. The configuration requires balancing connections across the IP address pool. What should be configured? A. Access zones only B. SmartConnect zones and access zones C. SmartConnect zones only D. SmartConnect zones and SmartConnect zone aliases
B. SmartConnect zones and access zones
41
Refer to the exhibit. Which port is used to attach the node to the internal network? A. 1 B. 2 C. 3 D. 4
C. 3
42
What is a characteristic of dynamic pools? A. Can allocate more than one IP per NIC port in the pool B. Must have the same number of IPs in the range as NIC ports in the pool C. If a node fails, will fail over the IPs in a pool to the node with the lowest LNN D. Will force the IPs to stay with the same NIC port, even if a node fails
A. Can allocate more than one IP per NIC port in the pool
43
A customer has recently learned about the Dell EMC Isilon Data Lake feature and purchased an Isilon cluster for use with their Hadoop application. 88 / 99 Which components of a Hadoop cluster will be provided by Isilon? A. NameNode and DataNode only B. NameNode and ComputeNode only C. NameNode, DataNode, and ComputeNode D. DataNode and ComputeNode only
A. NameNode and DataNode only
44
Which role-based privilege must be granted to a user before they are allowed to log into the web administration interface? A. ISI_PRIV_AUTH B. ISI_PRIV_LOGIN_PAPI C. ISI_PRIV_CLUSTER D. ISI_PRIV_LOGIN_CONSOLE
A. ISI_PRIV_AUTH
45
An EMC Isilon administrator is attempting to limit disk usage and control the visible capacity of a share to SMB clients. Which quota type gives the administrator this ability? A. Hard quota on Directory B. Hard quota on Group C. Soft quota on Directory D. Soft quota on User
A. Hard quota on Directory
46
Which OneFS 8.0 feature is incompatible with Swift? A. SyncIQ B. Auditing C. Smart Connect D. Dedupe
B. Auditing
47
While troubleshooting an access issue, an administrator receives the isi auth mapping list output from the Dell PowerScale cluster. The corresponding SID is found within the following line: ["ZID:2", "SID:S-1-5-21-2391006495-4839401849-419739012-5522", [["UID:3000001", 144]]] What can the administrator determine from this output? A. Mapping is done in the System access zone and both identities are real B. Mapping is done in a non-System access zone and both identities are real C. Mapping is done in a non-System access zone and SID is the real identity D. Mapping is done in the System access zone and SID is the real identity
B. Mapping is done in a non-System access zone and both identities are real
48
A company has decided that Compliance Mode will not work for them. Which method is required to reset an EMC Isilon cluster from Compliance mode to a standard EMC 89 / 99 Isilon cluster? A. Use isi_reformat_node to reset each node B. Use a USB stick to re-image each node C. Use isi_config >>> reboot all D. Upgrade the cluster
B. Use a USB stick to re-image each node
49
When creating an SMB share on the Isilon cluster, what is the effect of selecting the "Apply Windows Default ACLs"? A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory automatically created. B. File permissions are automatically set to be the same as the share permissions. C. Share permissions' configuration is no longer required as it too will be set to the default values. D. Ownership of all files in the directory will be set to the default user's SID.
A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory
50
Which mechanisms can provide real time notification of Isilon events? A. ESRS, SNMP traps, and SMTP B. SupportlQ, isi statistics, and SNMP polling C. isi_gather_info, SNMP set, and SupportIQ D. SNMP traps, SNMP set, and SNMP polling
A. ESRS, SNMP traps, and SMTP
51
Which Isilon protection setting will require the least percentage of overhead for a 1024 KB file? A. N+3d:1n in a 5-node node pool B. N+2d:1n in a 4-node node pool C. N+1n in a d-node node pool D. N+2n in a 10-node node pool
D. N+2n in a 10-node node pool
52
What are the considerations when a NANON configuration is used? A. Increase frontend I/O ports and aggregated cache. B. Increases capacity and aggregated cache. C. Increases frontend network ports and capacity. D. Increases bandwidth inside the cluster and GbE links.
C. Increases frontend network ports and capacity.
53
What event notification options are available when setting up an Isilon cluster in an SNMP-managed environment? A. HTTPS and IMAP B. SNMP and HTTP C. SMTP and SNMP D. SMTP and HTTP 90 / 99
C. SMTP and SNMP
54
What can be done to add more nodes to an Isilon cluster that has run out of backend switch ports? A. Migrate to larger switches B. Daisy chain new nodes from existing nodes C. Daisy chain new switches from existing switches D. Deploy a new cluster
A. Migrate to larger switches
55
What information is required to configure the LDAP service on a Dell PowerScale cluster? A. Port number, cluster name, and an LDAP server IP address B. Base distinguished name, LDAP provider name, and at least one LDAP server C. Base distinguished name, cluster name, and port number D. Administrator account and password, and LDAP provider name, and LDAP provider IP address
B. Base distinguished name, LDAP provider name, and at least one LDAP server
56
How many drives are used, per node, with the requested protection represented as N+3n? A. 1 B. 2 C. 3 D. The value of n
A. 1
57
Which command provides information about the current operational situation of the cluster, events, and jobs? A. isi status B. isi devices C. isi events D. isi services
A. isi status
58
What is an advantage of an EMC Isilon cluster using a switched star network for backend connectivity? A. Each node in the cluster is one hop away from any other node B. Each node is able to load balance its I/O across the entire cluster C. Additional switches can be daisy chained to existing switches D. The internal network can be used for more than intra-cluster communication
A. Each node in the cluster is one hop away from any other node
59
Which use case is a good candidate for SmartDedupe? A. Large number of files on a single node pool B. Large number of files across different node pools C. Files with duplicate blocks contained within them D. Files that are smaller than 32 K 91 / 99
A. Large number of files on a single node pool
60
For what purpose is quota management an important consideration on both source and target clusters? A. SyncIQ copy policies B. SyncIQ sync policies C. SyncIQ initial sync compare D. Failover and fail back
D. Failover and fail back
61
A customer is examining their CELOG events on their OneFS 7.2 cluster and identifies an event indicating one of their node pools is underprotected. What is the most likely cause of the CELOG event? A. Additional nodes were added to the cluster B. One or more of their nodes are offline C. The OneFS version on the cluster was recently upgraded D. The Default file pool policy requested protection level was modified
A. Additional nodes were added to the cluster
62
A systems administrator has a Dell PowerScale cluster with four A2000 nodes in their environment. The protection setting is 2d:1n at the node pool level. Billions of very small image files, each less than 50 KB in size, are stored on the cluster. The node pool is now approaching full capacity. However, the cumulative size of the files copied appears to be less. What is a possible reason? A. Small files are stored with 4x mirror protection and consuming more capacity B. Metadata for billions of files is consuming most of the capacity C. Small files are stored with triple mirror protection and consuming more capacity D. Small files are spread across all disk pools, causing greater capacity consumption
C. Small files are stored with triple mirror protection and consuming more capacity
63
What is a characteristic of Data Protection Advisor (DPA) cluster implementation? A. Multiple cluster instances are not supported B. A cluster can span different subnets C. All DPA Database nodes must be configured for clustering D. DPA cluster can have a mix of standalone and clustered application nodes
A. Multiple cluster instances are not supported
64
What is the name of the default access zone in an EMC Isilon cluster? A. System zone B. Static zone C. Dynamic zone D. Configuration zone
A. System zone
65
An Isilon administrator restored an individual user??s 30-day snapshot of a directory. However, that individual has now left the company. What must be done to allow another user to access data inside this directory? A. ACL permission must be updated or changed for the directory or file B. ACL permissions are automatically restored matching the new user C. Mode bits on the restored directory are automatically rwxr-xr-- for the new user D. Mode bits on the restored directory are automatically r-xr-xr-- for the new user
A. ACL permission must be updated or changed for the directory or file
66
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled. Which tool can be used to connect to and initially configure a cluster? A. PuTTY B. PLink C. WinSCP D. Telnet
A. PuTTY
67
How many concurrent jobs can the Job Engine run? A. 2 B. 3 C. 4 D. 5
B. 3
68
What is a characteristic of access tokens on an Isilon cluster? A. Can only contain UIDs defined in the LDAP authentication provider B. May contain supplemental groups inserted through use mapping rules C. Updated when the cluster joins the Active Directory D. Dynamic after initial creation of the access token
B. May contain supplemental groups inserted through use mapping rules
69
A company has an Isilon cluster that is joined to an Active Directory (AD) domain. Previously, the company replaced their primary NTP server and added new NTP settings to the Isilon cluster. Now the users are experiencing authentication failures. What is a possible reason for this behavior? A. Cluster and the AD are configured to use the same NTP server. B. AD is not configured to synchronize its time from the cluster. C. SMB time is not configured on the cluster to synchronize with the AD. D. Time between the NTP and the AD differentiates by more than 5 minutes.
D. Time between the NTP and the AD differentiates by more than 5 minutes.
70
What type of zone does SyncIQ require? A. Default B. Dynamic only 93 / 99 C. Static only D. Static or Dynamic
C. Static only
71
Which protocol or daemon is responsible for handling authentication in OneFS? A. lsassd B. lwiod C. AD D. LDAP
A. lsassd
72
Which requirement must be met on an Isilon cluster to be able to enable node compatibility? A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs. B. New generation nodes must have less RAM than older generation nodes. C. Minimum of three new generation nodes must be added to the existing node pool. D. Any new generation node can be added to any older generation node pool.
A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs.
73
What is the recommended networking design approach when planning subnets? A. Use a common subnet for data, replication and backup, and use a dedicated subnet for management. Assign the lowest priority gateway number for the management subnet. B. Use a common subnet for management, data, replication and backup. Assign a random priority gateway number for the subnet. C. Use a common subnet for data and management and a common subnet for replication and backup. Assign the lowest priority gateway number for the management subnet. D. Use dedicated subnets for management, data, replication and backup. Assign the lowest priority gateway number for the data subnet.
D. Use dedicated subnets for management, data, replication and backup.
74
What is the file protection mechanism used with OneFS file striping? A. Forward error correction B. Redundant array of independent disks C. Non-volatile random access memory D. Drive controller mirroring
A. Forward error correction
75
A customer is planning an Isilon deployment for use with their Hadoop environment. What is one advantage of using Isilon as the HDFS layer in this instance? A. Facilitates independent scaling of compute and storage nodes. B. Provides single protocol access to data. C. Integrates storage into Hadoop compute for more flexibility. D. Allows the compute nodes to apply data protection.
A. Facilitates independent scaling of compute and storage nodes.
76
You have been asked to design a NetWorker backup solution with the following two requirements: - Leverage Microsoft SQL VDI backup AP - Back up SQL database, transaction logs, and file groups Which NetWorker module is recommended? A. Power Snap B. NMDA C. Snap Image D. NMM
D. NMM
77
After enabling auditing on an EMC Isilon cluster, which configuration changes are tracked? A. Changes made through PAPI system only B. Changes made by a user in a shell only C. Changes made by root in a shell only D. Changes made by a batch file only
A. Changes made through PAPI system only
78
In an Isilon environment, what is the total protection level offered by N+2:1? A. Two drives or one node can fail without any data loss in the cluster. B. Two hot spare drives and one cold spare drive are available for disk failures. C. Two hot nodes and one cold node are available for node failures. D. Two drives on one node can fail without causing any data loss in the cluster.
A. Two drives or one node can fail without any data loss in the cluster.
79
Refer to the Graphic. If you notice the symbol illuminated on the Dell EMC Isilon node??s compute module, what does this indicate? A. Unsafe to remove the compute module B. Compute module is running a system check C. Unsafe to reboot the compute module D. Compute module has one or more faulty components
A. Unsafe to remove the compute module
80
Several SyncIQ policies have been defined on an Isilon cluster and are in production on several terabytes of data. The customer wishes to change the directory includes on one of the policies, but is concerned about maintaining their RTO. What will occur after the change is made? A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data; 95 / 99 RTO may be affected B. Policy changes are reflected in the next SyncIQ incremental run; RTO should be unaffected C. If the directory includes are only new data, SyncIQ replicates the new data during the next incremental synchronization; RTO may be affected D. SyncIQ dynamically adjusts for policy changes; RTO will be unchanged
A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data;
81
In an Isilon environment, the output of the isi get command on a file shows the level 6+2/2. What does the "6" represent? A. FEC stripe units per stripe B. Mirrored copies per file C. Data stripe units per stripe D. Drive used per node
C. Data stripe units per stripe
82
A node does not shut down properly during a systematic node shutdown process. What is the proper way to restart a node in this state? A. Run isi config >>> reboot B. Power cycle the node C. Run reboot from a shell D. Run halt from a shell
A. Run isi config
83
You are not able to delete a container using Swift. What is the problem? A. You are not logged in as root B. Container is not empty C. You need to be system administrator D. Containers cannot be deleted
B. Container is not empty
84
An administrator wants to enable quotas on a group directory in their Dell PowerScale cluster. In addition, they want to monitor the disk usage for future capacity planning. Which type of quotas need to be configured? A. Accounting B. Enforcement C. Hard D. Advisory
A. Accounting
85
An Isilon storage administrator is attempting to manage an Isilon cluster using the web administration interface. However, some configuration tabs are not displayed. What is the most likely cause? 96 / 99 A. RBAC has been implemented B. Some features have not been licensed C. Access zones have been created D. Administrator must log in as ??compadmin?
A. RBAC has been implemented
86
What accurately describes a characteristic of EMC OneFS protocol auditing? A. Can be enabled on a per access zone basis B. Cannot be enabled if the isi_audit_cee daemon is running C. Requires syslog forwarding to also be configured D. Can only audit for success, not failure
A. Can be enabled on a per access zone basis
87
Which command provides an explanation of available isi commands? A. isi events list B. isi config ??help C. isi status D. isi --help
D. isi --help
88
Which license is required to retain historical or archival points for SyncIQ replication? A. SnapshotIQ B. SmartConnect C. SmartPools D. InsightIQ
A. SnapshotIQ
89
When are file pool policy actions applied to files? A. When a file is written for path-based filters after SmartPools job has run at least once B. When a file is read for node pool location-based actions after the SmartPools job has run at least once C. When the SetProtectPlus job runs for clusters with multiple file pool policies D. When a file is modified for the first time after the SetProtectPlus job has run at least once
A. When a file is written for path-based filters after SmartPools job has run at least once
90
A customer is implementing two new clusters for DR using recommended best practices. SyncIQ will be used for the filesystem failover and fail back operations. You have been asked to create the initial filesystem structure for home directories for SMBv2.1 clients on both clusters. Which directory structure should you use? A. Source/ClusterA: /ifs/ClusterA/access_zone/home Target/ClusterB: /ifs/ClusterA/access_zone/home B. Source/ClusterA: /ifs/ClusterA/home Target/ClusterB: /ifs/ClusterA/home C. Source/ClusterA: /ifs/home 97 / 99 Target/ClusterB: /ifs/ClusterA/home D. Source/ClusterA: /ifs/ClusterA/system_zone/home Target/ClusterB: /ifs/sync/ClusterA/system_zone/home
A. Source/ClusterA: /ifs/ClusterA/access_zone/home
91
For which IT solution is an Isilon NL-Series node best suited? A. Internet Web 2.0 applications B. Nearline archiving C. Quantitative analysis D. Hadoop workflows
C. Quantitative analysis
92
Which protocols are access zone aware in OneFS 7.2? A. SMB and NFS B. SMB and FTP C. NFS and HTTP D. FTP and NFS
A. SMB and NFS
93
What does Dell PowerScale OneFS use to simplify administration over traditional NAS solutions? A. File System, Data Protection, and Volume Manager B. Drive Partitioning, Volume Manager, and Data Protection C. File Manager, Drive Partitioning, and Volume Manager D. Volume Manager, File System, and Drive Partitioning
A. File System, Data Protection, and Volume Manager
94
Which methods are used for managing jobs on an Isilon cluster? A. Only through feature settings and the web administration interface B. Only CLI and the web administration interface C. PAPI, web administration interface, and through all feature settings D. CLI, web administration interface, and through some feature settings
D. CLI, web administration interface, and through some feature settings
95
When creating custom job schedules in a Dell PowerScale environment, what are the impact policy settings? A. HIGH, LOW, MEDIUM, and PAUSED B. HIGH, LOW, MEDIUM, and OFF_HOURS C. HIGH, LOW, PAUSED, and OFF_HOURS D. JOB, PHASE, TASK, and ITEM
B. HIGH, LOW, MEDIUM, and OFF_HOURS
96
What is the TLD of student.isilon.training.com? A. isilon B. com 98 / 99 C. training D. student
B. com
97
Which RBAC role(s) includes the admin user privileges? A. Security Admin and System Admin B. Security Admin only C. System Admin and Audit Admin D. System Admin only
A. Security Admin and System Admin
98
What effect does enabling GNA on an Isilon node pool have for SSDs? A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration B. Allows SSDs in the same node pool as the data to be used for metadata read acceleration C. Allows SSDs in all node pools to be used as L3 cache and shared between node pools D. Enables cluster-wide read/write metadata acceleration utilizing all SSDs
A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration
99
What is a recommended solution to back up a large number of desktops/laptops? A. Protect Point B. NetWorker C. Data Domain D. Avamar
D. Avamar