All Flashcards

1
Q

A company’s Isilon cluster has reached the capacity limit. The cluster consists of eight H500 nodes in a
single node pool.
Which action can be taken to resolve the capacity issue while new nodes are being delivered?

A. Activate SmartPools
B. Enable GNA
C. Enable Spillover
D. Release VHS drives

A

A. Activate SmartPools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are looking through the EMC Isilon Configuration Guide for client specific site data.
Which tab of the document contains this information?

A. Core
B. Topology
C. Design Intent
D. Customer Information

A

D. Customer Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a characteristic of access tokens on a Dell EMC Isilon cluster?

A. Cannot contain both an SID and a UID
B. One token is generated for every Access zone
C. Generated when the client accesses the cluster
D. Requires the use of external authentication providers

A

C. Generated when the client accesses the cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file
pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the
administrator has some concerns about the available capacity on the H600 nodes.
Which feature should be configured to accept writes, even after the H600 nodes become full?

A. VHS
B. Spillover
C. SmartPools
D. GNA

A

B. Spillover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the
shares the client is able to view?

A. SmartConnect
B. Access zone
C. Access Control List
D. Mode bit

A

B. Access zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are looking through the EMC Isilon Configuration Guide for file sizes and workflows.
Which tab of the document contains this information?
2 / 99

A. Design Intent
B. Customer Information
C. Topology
D. Core

A

A. Design Intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many nodes should be set up to coordinate NTP for an Isilon cluster?

A. All nodes
B. Two only
C. Every node connected to the network
D. One only

A

D. One only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator has an Isilon cluster with three X410 nodes in their environment. The default
protection setting is 2d:1n at the node pool level. Billions of very small image files, less than 50 KB size,
are stored on the cluster.
Recently, the administrator has seen an issue where the cluster’s used capacity is getting full. However,
the cumulative size of the files copied appears to be less.
What is a possible reason for the storage usage level?

A. Small files are stored with 4x mirror protection and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
C. Metadata of billions of files is consuming most of the capacity
D. Small files are spread across all nodes and consuming more capacity

A

B. Small files are stored with 2x mirror protection and consuming more capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A customer has SAP, Oracle, and file system information in a VMAX3. The customer is looking for a
backup solution to receive the least amount of RTO and RPO as possible.
Which solutions should be recommended?

A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
B. Protect Point, DD990, Snap VX, FAST.X, and Recover Point for XtremIO
C. Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
D. NetWorker, Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO

A

A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Dell EMC Isilon cluster with Gen 6 nodes has reached 90% capacity.
To increase the cluster’s capacity, what is the minimum number of Gen 6 nodes that can be added?

A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes

A

B. 2 nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information does the isi statistics command display?

A. Protocol status, general performance, hardware condition, and critical alerts
3 / 99

B. General status, node management, Job Engine status, and drive statistics
C. Drive statistics, protocol status, node statistics, and hardware statistics
D. Drive status, hardware condition, critical alert, and protocol status

A

C. Drive statistics, protocol status, node statistics, and hardware statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are using a RHEL server and mounting an export from an EMC Isilon cluster using NFSv3.
Where would the session or state information for the connection be maintained?

A. Client only
B. On all nodes in the cluster
C. Client-connected node only
D. Client and client-connected node

A

A. Client only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What must be done to initially configure this cluster?

A. Establish a network connection to the management port on a backend switch
B. Run the cluster configuration wizard from a computer on the same network as the cluster
C. Connect a monitor, mouse, and keyboard to the utility node of the cluster
D. Establish a serial connection to the node designated as node 1

A

D. Establish a serial connection to the node designated as node 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company plans to build two Dell PowerScale clusters in an active-active disaster recovery
environment. The initial requirement is to have one access zone for their finance department.
Which recommended directory structure meets the requirement?

A. Cluster_A:
/ifs/finance
/ifs/finance
Cluster_B:
/ifs/finance
/ifs/finance
B. Cluster_A:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
Cluster_B:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
C. Cluster_A:
/ifs/cluster_a
/ifs/cluster_b
Cluster_B:
/ifs/cluster_a
/ifs/cluster_b
D. Cluster_A:
/ifs/finance/cluster_a
4 / 99

/ifs/finance/cluster_b
Cluster_B:
/ifs/finance/cluster_a
/ifs/finance/cluster_b

A

B. Cluster_A:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an Isilon environment, which type of storage node is best suited for high throughput and high
concurrency using SATA drives?

A. NL-Series
B. S-Series
C. X-Series
D. A100-Series

A

C. X-Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?

A. 40 Gb InfiniBand ports
B. Decreased journal size for storage performance
C. Dedicated bootflash drives
D. NVRAM dependency

A

A. 40 Gb InfiniBand ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which command is used to enable Source-Based Routing in OneFS 8.2.0?

A. isi network groupnets modify –sbr=true
B. isi network subnets modify –sbr=true
C. isi network pools modify –sbr=true
D. isi network external modify –sbr=true

A

D. isi network external modify –sbr=true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the isi_upgrade_helper command provide?

A. Recommended sets of nodes capable of simultaneous node firmware upgrades
B. Recommended sets of nodes capable of simultaneous drive firmware upgrades
C. Recommended sets of nodes capable of simultaneous rollup patch upgrades
D. Recommended sets of nodes capable of simultaneous standard patch upgrades

A

A. Recommended sets of nodes capable of simultaneous node firmware upgrades

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In an Isilon environment, what are the on-disk identity types that appear in the web administration
interface?

A. SMB, NFS, and Mixed
B. AD, LDAP, and NIS
C. GUID, SID, and Mixed
D. SID, UNIX, and Native

A

D. SID, UNIX, and Native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does it mean if an EMC Isilon cluster is in a NANON state?
5 / 99

A. One or more nodes are missing Ethernet connections
B. One or more nodes are missing InfiniBand connections
C. One or more nodes have critical events
D. One or more nodes have been improperly shut down

A

A. One or more nodes are missing Ethernet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Based on the graphic, what is the correct port to attach to the internal network?

A. 1
B. 2
C. 3
D. 4

A

C. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site.
What is a key consideration regarding the SyncIQ functionality?

A. SyncIQ synchronous option must be configured
B. SyncIQ is only an asynchronous replication tool
C. SyncIQ source must be modified to replicate
D. SnapshotIQ must be purchased and the synchronous option configured

A

B. SyncIQ is only an asynchronous replication tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is responsible for handling the SMB protocol and managing the session, protocol negotiations,
and operations in One FS?
6 / 99

A. lsassd
B. lwsm
C. lwiod
D. srvsvc

A

C. lwiod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the steps to configure SmartLock on an EMC Isilon cluster in Compliance mode?

A. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
B. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
C. Boot cluster in Compliance mode
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM

A

D. Boot cluster in Compliance mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In Dell EMC Isilon, what is the purpose of a maintenance release?

A. Address known issues and minor enhancements to the OS
B. Address known issues and minor enhancements to the firmware
C. Update internal and external NICs to address known issues
D. Update all internal components for known issues

A

A. Address known issues and minor enhancements to the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An Implementation Engineer has just joined an EMC Isilon cluster to an Active Directory (AD) domain.
The System zone of the cluster is set to default values.
Which AD object is automatically added to the cluster’s users group?

A. Anonymous
B. Authenticated users
C. Guest
D. Everyone

A

B. Authenticated users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which type of issues are resolved by enabling Source-Based Routing on an Isilon cluster?
7 / 99

A. Asymmetric routing.
B. IP address space depletion.
C. TCP retransmission.
D. SmartConnect load balance.

A

A. Asymmetric routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A customer has purchased a license to allow multiple file pool policies to be applied to their multi-tier
cluster.
Which job, when run, enforces file pool policies, and applies any file pool policy changes to the data?

A. SyncIQ
B. Auto Balance
C. Smart Pools
D. Set Protect Plus

A

C. Smart Pools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the complete list of providers supported by a Dell EMC Isilon cluster?

A. LDAP, AD, NIS, and local and file providers
B. LDAP, NIS+, and file and local providers
C. AD, NIS+, local provider, and LDAP
D. AD, LDAP, and Microsoft Outlook provider

A

A. LDAP, AD, NIS, and local and file providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An administrator is attempting an object-level restore of data from a Protect Point backup. However,
they are unable to see the desired objects through the Recovery server.
What is a possible cause for this problem?

A. FTS device did not mount the static image
B. Recovery server is not zoned to the Data Domain
C. Static image was not copied to the VMAX3
D. VMAX3 did not mount the vdisk

A

D. VMAX3 did not mount the vdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A company has two Isilon clusters located in San Francisco, California. One cluster is the source and
the other is the target. For efficiency, the dataset is being replicated between the two clusters within the
same data center. The target cluster will be moved to the New York area as part of a disaster recovery
solution once the initial full copy is complete.
Once the cluster has been moved to New York, what will mitigate re-transmitting the entire dataset over
the WAN to the target cluster in the new location?

A. Enable target compare initial sync and then re-run the policy
B. Run a sync policy with excluded directories defined
C. Run a copy policy with excluded directories defined
D. Enable the policy to run on all nodes in the cluster

A

A. Enable target compare initial sync and then re-run the policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You are looking through the EMC Isilon Configuration Guide for management IPs and DNS
8 / 99

information.
Which tab of the document contains this information?

A. Core
B. Design Intent
C. Customer Information
D. Topology

A

A. Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which information is required to join a Dell EMC Isilon cluster to an Active Directory (AD) domain?

A. AD domain name, computer account created, and domain account with rights to the Join domain
B. AD server name, cluster account created in an OU, and authentication account and password
C. AD server name, port number, and authentication account and password
D. AD domain name, domain account with rights to the Join domain, and domain account password

A

D. AD domain name, domain account with rights to the Join domain, and domain account password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be
replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes.
What refresh process is appropriate in this case?

A. Use SyncIQ to migrate the data from the old cluster to the new cluster
B. Add the new nodes to the existing cluster and use SmartPools to migrate the data
C. Add the new nodes one at a time and SmartFail out the old nodes
D. Downgrade the new nodes to the version of OneFS running on the old nodes

A

A. Use SyncIQ to migrate the data from the old cluster to the new cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A customer has a 5-node cluster in which the SIP is answering DNS queries from node 1.
If node 1 goes down, to which node, or LNN, would the SSIP service move?

A. 2
B. 3
C. 4
D. 5

A

D. 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which deduplication phase is excluded from the Dry Run process?

A. Commonality Detection
B. Sharing
C. Sampling
D. Index Updating

A

D. Index Updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When a 104 K data file is written to disk with a protection level of N+2n, what is the protection
overhead of the total disk space consumed by the file?

A. 0.33
B. 0.5
C. 0.67
9 / 99

D. 0.8

A

C. 0.67

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a benefit of using NANON?

A. Increased frontend I/O ports and aggregated cache
B. Increased number of connected frontend network ports
C. Increased capacity and aggregated cache
D. Increased bandwidth inside the cluster and GbE links

A

C. Increased capacity and aggregated cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which data access advantage does Dell EMC Isilon clusters provide when hosting Hadoop data?

A. Native Hadoop client access through SMB and NFSv3
B. Real-time data access with native Hadoop clients only
C. SMB and NFSv4 data access only
D. Multi-protocol data access, in place analytics

A

D. Multi-protocol data access, in place analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the required configuration for syslog forwarding?

A. Syslog forwarding works with config auditing only
B. Local server should be set up to deny remote logging
C. Remote server should be set up to allow remote logging
D. Syslog forwarding works with protocol auditing only

A

C. Remote server should be set up to allow remote logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

You have followed the configuration document and set up a new cluster in Compliance mode. You
meet with the customer to plan directory layout and configuration requirements.
What directory types will you be able to consider for this cluster?

A. Non-WORM and Compliance Smart Lock directories only
B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories
C. Compliance Smart Lock directories only
D. Enterprise Smart Lock and Compliance Smart Lock directories only

A

B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A new file pool policy is configured on a Dell PowerScale cluster to move all media files to A200
nodes. The previously written media files are located on H500 nodes.
What does the administrator need to run to apply the new file pool policy on the old media files?

A. SetProtectPlus job
B. MediaScan job
C. SmartPools job
D. MultiScan job

A

C. SmartPools job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which type of information does the Isilon isi statistics command provide?

A. Job engine and critical alerts
10 / 99

B. Drive statistics and hardware condition
C. Protocol and node statistics
D. Drive replacement and node management

A

C. Protocol and node statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which SSH Multi-Factor Authentication (MFA) service is supported by OneFS 8.2.0?

A. Duo
B. RSA
C. Okta
D. Yubico

A

A. Duo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A Dell EMC Isilon customer’s existing cluster has Gen 5 nodes. They are using both 1 GbE and 10
GbE connectivity options. The 1 GbE is configured with the management network.
The 10 GbE is connected to the data and replication network. The customer is planning to add new Gen
6 nodes to their cluster. They want to know the available options for front-end connectivity on Gen 6
nodes.
Which information should be provided to the customer?

A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes
10 GbE and 40 GbE front-end Ethernet options are only available in Gen 6 nodes
B. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are only available in Gen 6 nodes
C. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are available on both Gen 5 and Gen 6 nodes
D. 10 GbE and 40 GbE front-end Ethernet options are only available in Gen 5 nodes
1 GbE and 10 GbE front-end Ethernet options are available in Gen 6 nodes

A

A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

How many Isilon Job Engine v2.0 components will be present on a single node?

A. One director
B. Two managers per job
C. Two workers per task
D. Three coordinators

A

A. One director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What can be determined when auditing is enabled on an EMC Isilon cluster?

A. Who made the change When the change was made If the change can be undone
B. When the change was made If the change can be undone If proper ITIL process was followed
C. Who observed the change When the change was made If the change can be undone
D. When the change was planned If the change can be undone If proper change control was followed

A

A. Who made the change When the change was made If the change can be undone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which basic administration task can be performed using the front panel of an Isilon node?

A. Adding the node to a cluster
B. Creating a Smart Connect zone
C. Configuring an additional interface
11 / 99

D. Creating an access zone

A

A. Adding the node to a cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What must be done to configure cluster name resolution for SmartConnect?

A. Create the SSIP, add the DNS delegation, configure the subnet, and configure the node pool
B. Create a host A record, create an NS record, configure the subnet, and configure the pool
C. Create the SSIP, create an NS record, configure the subnet, and configure IPv6 and IPv4
D. Create a host A record, add the DNS delegation, configure the subnet, and configure IPv4

A

B. Create a host A record, create an NS record, configure the subnet, and configure the pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the recommended method when cabling an Isilon cluster with dual InfiniBand switches?

A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled
to the second switch.
B. All internal switch ports on odd-numbered nodes should be attached to switch one and all even
numbered nodes should be cabled to switch two.
C. All int-a switch ports should be cabled to the top row of switch ports on switch one and all int-b ports
should be cabled to the bottom row of ports of switch one. Once switch one is full, continue cabling on
switch two.
D. It does not matter which switch ports are used. Any internal switch port can be cabled to either of the
InfiniBand switches.

A

A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A company deployed an Isilon cluster that consists of eight nodes connected to a main production
subnet by all available 10GB ports. Later, the company decided to implement a disaster recovery
solution with a separate replication subnet. During the reconfiguration, one of the 10Gb ports from each
of the nodes 1-4 was moved into the new pool and SBR was activated.
After activating the replication policies, the administrator noticed that the main production ports on nodes
1-4 reached the bandwidth limit.
What is a possible reason for this behavior?

A. Default gateway for the replication subnet has a higher priority value.
B. Default gateway for the replication subnet is not specified.
C. Default gateway for the replication subnet has a lower priority value.
D. Main production ports have a smaller bandwidth limit than replication ports.

A

B. Default gateway for the replication subnet is not specified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What does the ‘And’ condition provide in file pool policy filter use?

A. Increases the granularity of the file match criteria
B. Reduces the number of file pool policies
C. Combines multiple file pool policy filters with the same actions
D. Broadens the file pool policy match criteria

A

A. Increases the granularity of the file match criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does the phrase “failover revert” mean?

A. Undoing a failover job in progress
12 / 99

B. Redirecting clients to the source cluster
C. Redirecting clients to the target cluster
D. Undoing a fail back job in progress

A

A. Undoing a failover job in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A customer would like to limit administrative access to a subset of cluster management capabilities.
What method would you implement to meet their requirements?

A. Create a custom role with only the required privileges
B. Use the BackupAdmin role and add the required privileges
C. Use the SecurityAdmin role to remove privileges from the SystemAdmin role
D. Use the root user to modify the Admin role with the required privileges

A

A. Create a custom role with only the required privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which type of information does the Isilon isi status command provide?

A. Protocol and node statistics
B. General status and client connections
C. Drive statistics and hardware condition
D. Job engine and critical alerts

A

D. Job engine and critical alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In a Dell PowerScale SyncIQ environment, which action requires a SnapshotIQ license?

A. Saving historical snapshots on the target
B. Reading the target, read-only instance
C. Failing over to the target or disaster recovery cluster
D. System-created snapshot of the source data

A

A. Saving historical snapshots on the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the benefits of Isilon Scale-Out NAS versus Scale-Up NAS technology?

A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
B. Block-based storage, file system upper limit 10 PB, nodes contain all components, and RAID
protection
C. Block-based storage, file system upper limit 20 PB+, nodes contain all components, and more
granular file protection
D. File-based storage, file system upper limit 16 TB, quick scalability, and volume level RAID protection

A

A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the recommended maximum number of configured SyncIQ policies, per source cluster?

A. 50
B. 500
C. 1,000
D. 2,000

A

C. 1,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

When configuring an NFS export on an Isilon cluster, what is the default mapping for the root
13 / 99

account?

A. Root-to-nobody
B. Root-to-root
C. Root-to-admin
D. User-defined during cluster setup

A

A. Root-to-nobody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A UNIX user is accessing a file through an NFS export on an Isilon cluster. The user is successfully
authenticated through the LDAP server.
In addition to file permissions, what else must be considered to determine the degree of file access the
user will receive?

A. User’s access token.
B. Whether the SmartConnect pool is set to `static’.
C. User SID-defined in the ID Mapper database.
D. User’s access zone.

A

A. User’s access token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Within OneFS, at which level is the data layout managed?

A. File pool
B. Node
C. Cluster
D. Node pool

A

A. File pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

When using automatic home directory creation for SMB shares, which variable is used for the
NetBIOS domain name?

A. %D
B. %N
C. %S
D. %Z

A

A. %D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are sources form which an Isilon cluster can obtain authentication data about a user attempting
to access the cluster?

A. NIS+, HTTP, and NIS
B. FTP, filedb, and samdb
C. LDAP, NIS, and filedb
D. HHTP, LDAP, and samdb

A

C. LDAP, NIS, and filedb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which cache type is used for read-ahead caching on behalf of other nodes?

A. L1
B. L2
C. L3
14 / 99

D. Endurant

A

B. L2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

You have configured two new subnets: one for NFS and one for SMB. You have enabled VLAN tag 20
for NFS and VLAN tag 30 for SMB and added the interfaces to the network pools. The ext-1 interface
from each node is assigned an address and is active. However, you are unable to ping the gateway on
the two subnets.
What action should you take to resolve this issue?

A. Configure link aggregation on the network switch and each network pool
B. Configure NS records in DNS for the network pools
C. Configure Source-Based Routing for each subnet created
D. Configure trunk ports on the switch for each network interface

A

D. Configure trunk ports on the switch for each network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which job scans the cluster to look for orphaned or leaked inodes or blocks?

A. Collect
B. Auto Balance
C. Flex Protect
D. Media Scan

A

A. Collect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which command shows individual drive status?

A. isi devices
B. isi_hw_status
C. isi_gconfig
D. isi networks

A

A. isi devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How is Hadoop managed in an Isilon environment?

A. Files are stored in a specialized HDFS-compatible file system format on the Isilon cluster
B. HDFS data is on Isilon; computations are handled by Hadoop
C. HDFS Data is on Hadoop; computations are handled by Isilon
D. MapReduce on the Isilon cluster allows data to be distributed across both platforms

A

B. HDFS data is on Isilon; computations are handled by Hadoop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which OneFS daemon is responsible for generating each user’s identity token?

A. lsassd
B. lwiod
C. srvscd
netlogon

A

A. lsassd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is an Ancestry Event on an Isilon cluster?

A. First instance of a coalesced event.
15 / 99

B. ID that an event had prior to being quieted.
C. An event that has been canceled.
D. An event that affects multiple nodes.

A

A. First instance of a coalesced event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which group of authentication sources is completely supported by OneFS?

A. RSA and AD
B. LDAP and AD
C. Smart Card and LDAP
D. NIS+ and LDAP

A

B. LDAP and AD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which feature(s) is supported in NFSv3?

A. Dynamic failover
B. Stateful failover
C. ACLs and ACEs
D. Shares mounted separately

A

A. Dynamic failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

By default, what does EMC Isilon search for when looking up user ID mappings?

A. Same name in file provider
B. Presence of a UID/GID
C. Same name in LDAP
D. uidAttribute is AD

A

B. Presence of a UID/GID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which feature distinguishes SMBv2 from SMBv1?

A. Endurant file handler
B. Stateless protocol
C. Change notification
D. Packet signing

A

A. Endurant file handler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

An organization has two different Isilon clusters:
- Six-node cluster in London, England
- Eight-node cluster in Paris, France
They are using SynclQ to replicate between the clusters. Each site has access zones configured and
SmartConnect Advanced is licensed.
The organization is actively engaged in a failover from Paris to London. During testing, they realize that
users from the Sales department in Paris are receiving authentication errors from the London cluster.
Which step should be taken to troubleshoot this issue?

A. Verify that the Sales access zones for Paris are configured on the London cluster
B. Verify that the Sales access zones for London are configured on the Paris cluster
C. Verify that the SmartConnect zone for Sales in Paris is set to the system access zone
16 / 99

D. Verify that the London cluster retained the Paris user list

A

A. Verify that the Sales access zones for Paris are configured on the London cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Which client connection policy is the default?

A. Round Robin
B. Connection Count
C. Network Throughput
D. CPU Utilization

A

A. Round Robin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A service provider has an Avamar server supporting many of their customer’s backup requirements.
They need to create customized reports for each customer for billing purposes. Currently, existing
reports on Avamar do not meet this requirement.
How can the service provider generate customized reports?

A. Configure Crystal Reports to extract data using Avamar MCCLI
B. Configure Microsoft Excel to access the Avamar MySQL database
C. Use Backup and Recovery Manager to track backup capacity usage per customer
D. Use Data Protection Advisor to access the Avamar PostgreSQL database

A

D. Use Data Protection Advisor to access the Avamar PostgreSQL database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Which type of administrator commands does configuration auditing track?

A. PAPI-enabled commands
B. Commands run by the “root” user
C. Commands run by the SystemAdmin and CompAdmin users only
D. All UNIX, isi, isi_ and sudo commands

A

A. PAPI-enabled commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

A Dell EMC Isilon administrator wants to create file pool policies using templates available in the
operating system.
Which management interface is used to create these templates?

A. GUI only
B. GUI and CLI
C. CLI only
D. Windows MMC

A

A. GUI only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which capabilities are enabled after activating an Isilon SnapshotIQ license?

A. Create and schedule snapshots, and modify SnapshotIQ settings
B. View and delete snapshots, and access snapshot data
C. View, create, and schedule snapshots, and access snapshot data
D. Create snapshot schedules, access snapshot data, and delete snapshots

A

A. Create and schedule snapshots, and modify SnapshotIQ settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What client protocols are supported to provide access to EMC Isilon clusters?
17 / 99

A. SMB, NFS, HTTP, FTP, and HDFS
B. AFP, CIFS, NFS, TCP, and UDP
C. SMB, NFS, HTTP, FTP, and SMTP
D. TFTP, CIFS, NFS, SSL, and TCP

A

A. SMB, NFS, HTTP, FTP, and HDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

While troubleshooting issues with a new directory services added to an Isilon cluster, which command
should be used to ensure the configured base DN is correct?

A. tcpdump
B. nslookup
C. ldapsearch
D. netstat

A

C. ldapsearch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which job is a data distribution job on an Isilon cluster?

A. FlexProtect
B. Collect
C. MediaScan
D. TreeDelete

A

A. FlexProtect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which two security roles are required for full administrative privileges when managing an Isilon
cluster?

A. Security Admin and System Admin
B. System Admin and Audit Admin
C. Security Admin and Backup Admin
D. Backup Admin and Audit Admin

A

A. Security Admin and System Admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is EMC best practice for creating more than one snapshot per directory?

A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more
frequently; use longer expiration periods assigned to snapshots that are generated less frequently
B. Create snapshots with longer expiration periods assigned to snapshots that are generated more
frequently; use shorter expiration periods assigned to snapshots that are generated less frequently
C. Only create snapshots with shorter expiration periods assigned to snapshots that are generated more
frequently
D. Only create snapshots with longer expiration periods assigned to snapshots that are generated less
frequently

A

A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A storage administrator has an Isilon cluster consisting of 10 nodes with identical hardware and are
members of a single node pool. A 1024Kb file stored on that cluster is protected at N+3n.
What is the total number of copies of the file’s metadata?

A. 3
18 / 99

B. 4
C. 6
D. 5

A

B. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to “Native”
and a user has a synthetic UID?

A. RID
B. GID
C. SID
D. UID

A

C. SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In a Dell EMC Isilon environment, which SyncIQ option can be used to copy the SmartLink file to
another cluster that supports CloudPools?

A. Deny
B. Stub
C. Allow
D. Force

A

D. Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Isilon SmartLock Compliance clock has drifted from the system clock.
How can the difference between compliance and system clocks be corrected?

A. Compliance clock drifts towards system clock automatically
B. Compliance clock drift correction is not allowed
C. Administrative user “root” can manually adjust the compliance clock
D. Administrative user “compadmin” can manually adjust the compliance clock

A

A. Compliance clock drifts towards system clock automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Which Dell EMC Isilon cluster quota events can be triggered for a hard quota?

A. Soft quota write access denied, grace period expired, write access denied, and report generation
failed
B. Limit exceeded, limit remains exceeded, grace period expired, and report generation failed
C. Limit exceeded, grace period expired, write access denied, and advisory limit exceeded
D. Limit exceeded, limit remains exceeded, and write access denied

A

D. Limit exceeded, limit remains exceeded, and write access denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Which job gathers data for InsightIQ?

A. IndexUpdate
B. Collect
C. Aenalys
D. FSAnalyze

A

D. FSAnalyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional,
the administrator wants to create specific administrative accounts for specific cluster management
activities in different access zones. An administrator of one zone should be able to view or configure
objects in a different zone.
Which action will address the administrator’s requirements?

A. Create ZRBAC role for each zone administrator.
B. Create ZRBAC role for the administrator on all access zone.
C. Create a separate management subnet for each administrator.
D. Create an unique role in the System zone for each administrator.

A

A. Create ZRBAC role for each zone administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What NFS protocols are supported by OneFS v7.2?

A. NFSv3 and NFSv4
B. NFSv2 and NFSv3
C. NFSv2 and NFSv4
D. NFSv4 and NFSv4.1

A

A. NFSv3 and NFSv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is the maximum number of active Swift connections on a 5-node Isilon cluster?

A. 250
B. 500
C. 750
D. 1000

A

C. 750

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

When using NIC aggregation, which configuration is supported in a Dell PowerScale Gen 6
environment?

A. ext-1 and ext-2 of node 1 aggregated together
B. ext-1 of node 1 and ext-2 of node 2 aggregated together
C. ext-agg of node 1 and ext-agg of node 2 aggregated together
D. ext-1 of node 1 and ext-1 of node 2 aggregated together

A

A. ext-1 and ext-2 of node 1 aggregated together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What protection level will guard against three simultaneous node failures anywhere across an EMC
Isilon cluster?

A. N+4d:2n
B. N+3n
C. N+3d:1n1d
D. N+3d:1n

A

B. N+3n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access
auditing capability

A. NFS, SMB, and HDFS
20 / 99

B. NFS, FTP, and SWIFT
C. NFS, SMB, and SWIFT
D. NFS, FTP, and HDFS

A

A. NFS, SMB, and HDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which semi-automated process with SyncIQ has the capability to interrupt sync jobs in progress?

A. Failover
B. Fail back
C. Continuous mode
D. Initial sync compare

A

A. Failover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

A Dell EMC Isilon customer is using scripts based on PAPI to automate some of their storage
administration tasks. The cluster is running OneFS 7.2. The PAPI script is using the isi config command,
but it returns an error.

A. OneFS blocked the use of the isi config command
B. isi config command is not a PAPI-aware command
C. isi config command is not a OneFS command
D. PAPI only uses job engine commands

A

C. isi config command is not a OneFS command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which component is passive during LACP communication between the cluster and the Ethernet
switch?

A. MAC address
B. Isilon
C. Switch
D. Smart Connect zone

A

B. Isilon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which Isilon Job Engine v2.0 component(s) should always be present on every node?

A. Three coordinators
B. Two managers per job
C. Two workers per task
D. One director

A

D. One director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Recently, an EMC Isilon cluster was upgraded from version 7.0.2.8 to version 7.0.2.9.
What is included in this degree of upgrade?

A. Maintenance release, new features, and functions
B. Code patch and functionality enhancements
C. Major functionality enhancements
D. Maintenance release and a substantial product upgrade

A

B. Code patch and functionality enhancements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What are the methods to join a node to an Isilon cluster?

A. Configuration wizard, SSH connection, or CLI only
B. Serial connection, Configuration wizard, or CLI only
C. Front panel display, serial cable, or Configuration wizard only
D. Front panel display, Configuration wizard, WebUI, or CLI only

A

D. Front panel display, Configuration wizard, WebUI, or CLI only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which solution meets the SaaS criteria for a customer that is under-staffed and is having difficulty
managing their infrastructure?

A. Mozy
B. NetWorker
C. Isilon
D. Recover Point

A

A. Mozy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

In a EMC Dell Isilon environment, can different node types be combined into a single tier?

A. Yes; only during a cluster upgrade
B. Yes; only for disaster recovery configuration purposes
C. No; different node types can never be combined
D. Yes; only if they have similar performance characteristics

A

D. Yes; only if they have similar performance characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is the result of mapping POSIX mode bits to a Microsoft Windows ACL on an Isilon cluster?

A. No ownership information is lost.
B. Process creates a real ACL.
C. Security of the file may be increased.
D. Multiple user ACEs are collapsed into a single ACE.

A

A. No ownership information is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What is a benefit of storing Hadoop data on an Isilon cluster versus a traditional Hadoop
environment?

A. In-place analytics
B. Requires 3X data mirroring
C. NameNode resides on a single node
D. Nodes do both computation and storage

A

A. In-place analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

How is InsightIQ changed when FSA is enabled?

A. When enabled, a Job runs on the cluster and collects InsightIQ data
B. By default, it runs every hour and monitors cluster performance
C. Enabled on a VM or physical server and helps plan SmartPools and file system use
D. FSAnalyze queries results from the last InsightIQ run and populates file system reports

A

A. When enabled, a Job runs on the cluster and collects InsightIQ data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What are the minimum requirements needed to enable the Global Namespace Acceleration setting?

A. 2.0% of disk capacity must be SSD
5% of the nodes must contain SSDs
SmartPools license
B. 2.5% of the disks capacity must be SSD
SmartPools license
C. 1.5% of disk capacity must be SSD
20% of the nodes must contain SSDs
D. 20% of the number of disks must be SSDs

A

C. 1.5% of disk capacity must be SSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

When will snapshots with no expiration date be removed from the cluster?

A. Manually removed by the cluster administrator
B. Upper limit of allowable snapshots is reached
C. Cluster free space is less than reserved snapshot space
D. Node pool containing the snapshots is full

A

A. Manually removed by the cluster administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which quota type provides a grace period?

A. Hard
B. Group
C. Advisory
D. Soft

A

D. Soft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What are the recommended methods for connecting to an EMC Isilon cluster to perform a firmware
update?

A. PAPI and serial console port
B. Telnet and SSH
C. PAPI and Telnet
D. Serial console port and SSH

A

D. Serial console port and SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is a characteristic of snapshots?

A. Snapshot creation time is based on the depth of the directory tree
B. Initial snapshot size is based upon the size of files inside the directory
C. Snapshots are created almost instantaneously
D. During snapshot creation, all pointers to files are moved to the snapshot

A

C. Snapshots are created almost instantaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Which CLI command(s) is used to identify how many snapshots are currently on disk?

A. isi snapshot snapshots view
B. isi snapshot schedules
C. isi snapshot settings
23 / 99

D. isi snapshot snapshots list

A

D. isi snapshot snapshots list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What actions can be specified as part of a file pool policy?

A. Snapshot storage target
Data access pattern
Sub pool target
B. SSD strategy
Spillover target
Requested protection level
C. Data storage target
Requested protection level
Data access pattern
D. Data storage target
Write performance optimization
L3 Cache enablement

A

C. Data storage target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

In a Dell EMC Isilon environment, which file pool policy job is used to apply the default file pool
policy when SmartPools is unlicensed?

A. SetProtectPlus
B. SmartPools
C. FlexProtect
D. SmartPoolsTree

A

A. SetProtectPlus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Where is an Isilon Gen 6 node boot drive located?

A. On the cache SSD drive at the back of the node
B. On the mirrored journal drive
C. On the node’s data drives
D. On the bootflash drive inside the node

A

C. On the node’s data drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A systems administrator is migrating existing Microsoft Windows file data to an access zone on the
Dell PowerScale cluster. The administrator discovers that two servers are using the same share name in
the environment.
How can the administrator overcome this migration challenge?

A. Add the two AD authentication providers in the access zone to isolate access to the shares
B. Configure unique SMB shares in the access zone for each share to be migrated
C. Create identical SMB shares in the access zones and change the names when the migration
completes
D. Merge each share to be migrated into an single SMB share in the access zone

A

B. Configure unique SMB shares in the access zone for each share to be migrated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

How does an Isilon cluster account for the ownership of a file where on-disk identity has been set to
native?

A. All files in exports can only be owned by a UID
B. A file will be owned by a user’s real SID if no real UID exists for that user
C. User identities must be defined through external authentication providers
D. All files in shares can only be owned by an SID

A

B. A file will be owned by a user’s real SID if no real UID exists for that user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Traditional NAS storage architectures deploy simple two-way failover between two controllers in
storage systems, such as highly available configurations.
How is the Isilon architecture different in terms of system resiliency and availability?

A. OneFS enables each node to have a designated partner node for simple failover between the pair.
B. Use of client-side drivers can enable failover to other nodes.
C. Isilon clustered architecture deploys standby failover nodes to ensure the highest available solution.
D. OneFS enables each node to be a peer to any other node in an Isilon cluster. Any node can take over
for any other node.

A

A. OneFS enables each node to have a designated partner node for simple failover between the pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

When modifying a job, which task can an Isilon administrator perform?

A. Modify job priorities
B. Modify job events
C. Pause or stop jobs
D. Modify job history

A

A. Modify job priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What configuration is required for clients to have the same user identity on both source and target
clusters?

A. Both clusters must be connected to the same LDAP and AD servers
B. Both clusters must have the same SMB shares and NFS exports
C. The SyncIQ policy must be a ‘copy’ policy
D. The SyncIQ policy must be a ‘sync’ policy

A

A. Both clusters must be connected to the same LDAP and AD servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

An existing EMC Isilon customer must comply with SEC regulations; they require that their cluster be
changed to Compliance mode.
How can this best be accomplished?

A. Engage Professional Services to guide the change
B. License SmartLock and configure it to activate Compliance mode
C. Upgrade OneFS to a newer version
D. Select Compliance mode from the web administration interface

A

A. Engage Professional Services to guide the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

When configuring link aggregation for 1 GigE interfaces, how will the aggregated interface be
represented in a Dell EMC Isilon Gen 5 node?
25 / 99

A. ext-1
B. int-a
C. ext-agg
D. ext-2

A

C. ext-agg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

A storage administrator used the shutdown -p <time> command to bring down an EMC Isilon cluster.
What could be the result of this action?</time>

A. Data can become corrupted on the filesystem
B. The filesystem could be left mounted when all nodes have shut down
C. The NVRAM will be flushed
D. Confirmation must first be acknowledged before actual shutdown

A

A. Data can become corrupted on the filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

You are creating a CNAME record in DNS for an EMC Isilon cluster.
Where should you point the CNAME?

A. NS record
B. A record
C. Cluster name
D. SSIP

A

A. NS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

During the install, a new EMC Isilon customer insists that they need SmartLock Compliance mode
for their cluster. After a few days, they decide they want to revert back to a standard Isilon Cluster.
How can this be done?

A. Re-image the complete cluster
B. Reboot the cluster into standard mode
C. Deactivate SmartLock and unlicense the feature
D. Downgrade OneFS and disable SmartLock Compliance mode

A

A. Re-image the complete cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is the default limit for the total number of snapshots allowed on an EMC Isilon cluster?

A. 1,024
B. 2,048
C. 10,000
D. 20,000

A

D. 20,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What is the default port that CEE servers listen on?

A. 25
B. 80
C. 8443
D. 12228

A

D. 12228

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Which access layer determines the file system actions a user can take?

A. Permissions
B. Protocol
C. Identity Assignment
D. Authentication

A

A. Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Which Isilon data protection offers additional safety during data rebuilds and is the minimum
required protection for node pools containing drives that are 6 TB or larger?

A. 3X
B. N+2d:1n
C. N+3d:1n1d
D. N+3d:1n

A

C. N+3d:1n1d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Which element supports source based routing (SBR)?

A. IPv4
B. IPv6
C. NFSv3
D. NFSv4

A

A. IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

A Dell PowerScale administrator wants to enable quota notifications for their LDAP users. However,
the users’ email IDs are not updated in the LDAP environment.
What needs to be configured?

A. Local users and groups
B. Mapping rule
C. Local provider
D. File provider

A

B. Mapping rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Which feature provides secure file system multi-tenancy access for EMC Isilon clusters?

A. DNS zone
B. System zone
C. Smart Connect zones
D. Access zones

A

D. Access zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Which type of information does Isilon InsightIQ display without enabling FSA?

A. Network performance
B. Data usage
C. Maximum file size
D. Node queue depth
27 / 99

A

A. Network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

A storage administrator is using an Isilon cluster with a large number of clients accessing the same
data.
Which data layout is best suited for this workflow?

A. Mixed
B. Streaming
C. Concurrency
D. Random

A

C. Concurrency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Which command is used to renumber the nodes of an Isilon cluster?

A. innset
B. ipset
C. deliprange / iprange
D. interface

A

A. innset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

You need to verify the number of IP addresses for a dynamic Smart Connect pool.
What formula should you use, where N represents the number of nodes in the cluster?

A. N x P, where P is the number of ports
B. N x (N + 1)
C. (N x N) + 1
D. N x (N - 1)

A

D. N x (N - 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

In a Dell EMC Isilon SyncIQ policy, what is a feature of the “synchronize” replication type?

A. Protects from file deletion on the source and target
B. Retains deleted source data on the target
C. Protects the source cluster data
D. Includes the file filter criteria

A

C. Protects the source cluster data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

When performing a patch install during an upgrade in OneFS 8.2.0, how many patches can be
installed as part of the upgrade process?

A. 0
B. 1
C. 2
D. 3

A

B. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Which Isilon cluster quota events can be triggered for an advisory quota?

A. Grace period expired
Limit remains exceeded
28 / 99

B. Grace period expired
Write access denied
C. Limit exceeded
Limit remains exceeded
D. Limit remains exceeded
Write access denied

A

C. Limit exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

In a Dell EMC Isilon environment, what is the number of tolerable drive failures in an N+3d:1n
protection scheme before data loss can occur?

A. 1
B. 2
C. 3
D. 4

A

C. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

A customer is worried about the possibility of exceeding the node pool storage capacity when a data
rebuild is required from a failed hard drive.
What configuration setting(s) should be verified and included when you configure the cluster?

A. Enable VHS, and deny data writes to reserved disk space
B. Enable L3 cache
C. Enable GNA
D. Increase the node pool default requested protection level

A

A. Enable VHS, and deny data writes to reserved disk space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

When configuring LACP between an Ethernet switch and an Isilon node, what is an important
consideration?

A. Isilon cluster side is considered passive
B. Switch must be configured as passive
C. Dynamic pool must be used
D. SmartConnect Advanced must be licensed

A

A. Isilon cluster side is considered passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

A storage administrator added three X410 nodes to an existing cluster with three X400 nodes.
However, the administrator did not realize that a decision was made to update the InfiniBand back-end
switches from DDR to QDR.
Which type of cables must be used to connect the X400 nodes to the new switches?

A. Hybrid (QSFP-to-CX4)
B. IB (Cx4-to-CX4)
C. QSFP (QSFP-to-QSFP)
D. Ethernet (DB45 CAT-6)

A

A. Hybrid (QSFP-to-CX4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

A Dell PowerScale cluster has four A200 nodes. The data protection level and access patterns are
29 / 99

set to default values.
How many drives, per node, are used to protect a 1 MB file?

A. 1
B. 2
C. 3
D. 4

A

B. 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What is a key benefit that an EMC Isilon cluster provides for a Hadoop environment?

A. Name Node caching
B. Primary and Secondary Name Node support only
C. Metadata striping
D. Distributed (Clustered) Name Node support

A

D. Distributed (Clustered) Name Node support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What command(s) must be run to update available service entries for each SmartConnect zone
name and SmartConnect zone alias?

A. isi auth ads spn check
B. isi update
C. isi config
D.&raquo_space;> ipset
E. isi_for_array -s isi services

A

A. isi auth ads spn check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Which cache stores blocks from previous read and write operations, and interacts with the node’s
drive subsystem?

A. L2 Cache
B. Endurant Cache
C. L1 Cache
D. FAST Cache

A

A. L2 Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is the estimated space savings from audit log compression on an Isilon cluster?

A. 25%
B. 50%
C. 75%
D. 90%

A

D. 90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Which system job pauses all lower priority jobs when initiated?

A. ShadowStoreDelete
B. MediaScan
C. FlexProtect
D. SetProtectPlus
30 / 99

A

C. FlexProtect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Which Avamar utility shows the total amount of data in each checkpoint?

A. status.dpn
B. mccli
C. cplist
D. cps

A

D. cps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

A company has a 4-node Dell PowerScale F800 cluster dedicated for a high-performance workflow.
The administrator wants to convert their cluster SSD strategy from SSD metadata read acceleration to
L3 cache.
What should be considered?

A. Selecting L3 cache has no impact on the workflow
B. Migration of metadata from the SSDs to L3 cache can take hours
C. Once enabled, metadata read acceleration cannot be disabled
D. L3 cache is not supported on All Flash nodes

A

D. L3 cache is not supported on All Flash nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Which Data Domain feature generates a point-in-time read-only copy of a specified MTree?

A. Snapshot
B. Checkpoint
C. Fastcopy
D. Bitmap

A

A. Snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

At which level in the network hierarchy is the allocation method configured?

A. Subnet
B. Pool
C. Groupnet
D. Rule

A

B. Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

A customer has 15 X410 nodes in their cluster.
What is the difference between N+3n and N+3d:1n1d?

A. N+3n requires only 3 nodes minimum in the node pool
N+3d:1n1d requires 7 nodes minimum
B. N+3n uses multiple drives per node
N+3d:1n1d uses a single drive per node
C. N+3n stripes across up to 9 nodes
N+3d:1n1d stripes across up to 19 nodes
D. N+3n provides additional node loss protection
N+3d:1n1d provides additional drive loss protection

A

D. N+3n provides additional node loss protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

In Dell EMC Isilon, which license is required to create a read/write copy of data in the same cluster?

A. SyncIQ
B. SmartQuota
C. SmartDedupe
D. SnapshotIQ

A

A. SyncIQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What is an NFSv4 prerequisite?

A. Kerberos
B. NIS
C. DNS
D. Realm

A

C. DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

What are the main functional components of the Job Engine?

A. Coordinator, Managers, Phase, Item
B. Director, Coordinator, Task, Item
C. Managers, Phase, Job, Workers
D. Coordinator, Director, Managers, Workers

A

D. Coordinator, Director, Managers, Workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Which event notification options are available when setting up an Isilon cluster in an SNMP-
managed environment?

A. SMTP and SNMP
B. HTTPS and IMAP
C. SNMP and HTTP
D. SMTP and HTTP

A

A. SMTP and SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

A storage administrator needs to configure an Isilon cluster to support both UNIX and Microsoft
Windows file access to the same directories.
Which options, under the ACLs page in the web administration interface, can be selected for this
environment?

A. Balanced
UNIX only
B. Microsoft Windows only
Configure permission policies manually
C. Balanced
Configure permission policies manually
D. UNIX only
Microsoft Windows only

A

C. Configure permission policies manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

An EMC Isilon customer requires quotas for their users’ home directories to prevent the filesystem
from filling up.
What type of quota is appropriate for users who generate large numbers of temporary files that are
quickly deleted?

A. Hard quota
B. User quota
C. Soft quota
D. Advisory quota

A

C. Soft quota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What is an advantage of using MTrees in a Data Domain system?

A. Allows selective data encryption
B. Segregates management and replication traffic
C. Allows for management of quotas separately
D. Data from different MTrees are not deduplicated against each other

A

C. Allows for management of quotas separately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Recently an EMC Isilon cluster was upgraded from version 7.0.1.3 to version 7.0.2.9.
What is included in this degree of upgrade?

A. Maintenance release, new features, functions, and fixes
B. Code patches and minor functionality enhancements only
C. Major change in functionality, new features, and functions
D. Code patches and minor fixes only

A

A. Maintenance release, new features, functions, and fixes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What is the only way a Microsoft Windows user can restore data from a snapshot?

A. Snapshot schedule is enabled on the cluster
B. Snapshot licenses are enabled on the cluster
C. User can never directly perform a restore from a snapshot
D. Shadow Copy Client is installed locally on their computer

A

D. Shadow Copy Client is installed locally on their computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

An EMC Isilon cluster running OneFS version 7.1.1.1 needs to have its drive firmware updated via
DSP.
What is the cluster status during the update?

A. Nodes remain online during the update, but will require rebooting when all drives are updated
B. Nodes on the cluster remain online during the drive update process
C. Nodes will be offline during the drive update process and be brought online when all drives are
updated
D. Nodes will be offline during the drive update process and reboot when all drives are updated

A

B. Nodes on the cluster remain online during the drive update process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

If a company is required to comply with Governance and National Security standards, which Data
Domain feature should be recommended?
33 / 99

A. Retention Lock Compliance
B. Retention Lock Governance
C. Encryption
D. Extended Retention

A

A. Retention Lock Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

A NetWorker customer wants to copy data from a DDBoost device to tape for a long-term archive.
Which feature is used to create the tape copy of the data?

A. Clone Controlled Replication
B. Direct File Access
C. Cloning
D. Staging

A

C. Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Which access protocols are included in the Isilon auditing capability?

A. NFS, FTP, and HDFS
B. SMB, FTP, and Swift
C. NFS, SMB, and Swift
D. NFS, SMB, and HDFS

A

D. NFS, SMB, and HDFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What is the maximum number of data stripe units contained in a file stripe?

A. 8
B. 16
C. 64
D. 128

A

B. 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

An organization wants to monitor disk performance on their Isilon cluster.
Which software module will provide this functionality?

A. InsightIQ
B. SmartQuotas
C. SmartConnect
D. SmartPools

A

A. InsightIQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

While in a diagnostic mode, a NetWorker administrator sets the Retention Policy for a client as three
months. However, the administrator was not able to select the Browse Policy for this client.
What restricts the administrator to select the Browse Policy?

A. Disable diagnostic mode and set desired Browse Policy
B. Restart GST services on NMC host
C. Enable debug mode and set the Browse Policy
D. Browse Policy will be the same as Retention Policy and cannot be changed

A

D. Browse Policy will be the same as Retention Policy and cannot be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Which network technology is used to connect the backend of an EMC Isilon cluster?

A. InfiniBand
B. Serial Attached SCSI
C. Fibre Channel
D. 10Gb Ethernet

A

A. InfiniBand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What serial settings must be used to initially configure this cluster?

A. 9,600 bps, 8 data bits, no parity, 1 stop bit, hardware flow control
B. 38,400 bps, 8 data bits, no parity, 1 stop bit, software flow control
C. 115,200 bps, 8 data bits, no parity, 1 stop bit, hardware flow control
D. 128,000 bps, 8 data bits, no parity, 1 stop bit, software flow control

A

C. 115,200 bps, 8 data bits, no parity, 1 stop bit, hardware flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Based on the output shown below, which user(s) has Read and Write privileges to file1.txt?
ls -l file1.txt -r-xrwxr-x 2 Oracle admin 512 Dec 19 06:17 file1.txt
Users:
uid=10(Oracle) gid=1000(it) groups=600(finance),20(staff),300 engineering)
uid=20(Pete) gid=500(admin) groups=600(finance),300(engineering
uid=30(Greg) gid=1000(it) groups=600(finance),20(staff),500(admin)

A. Pete only
B. Pete and Greg
C. Oracle only
D. Pete, Greg, and Oracle

A

B. Pete and Greg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Which command provides cluster statistics including protocol, disk input, and disk output?

A. isi statistics client
B. isi statistics system
C. isi statistics drive
D. isi statistics protocol

A

B. isi statistics system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

How does Isilon One FS use data striping to accomplish redundancy within the cluster?

A. Across nodes
B. Across RAID group
C. Across disks
D. Across volumes

A

A. Across nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

What does auditing keeps track of?

A. Data that is accessed, modified, created, and deleted
35 / 99

B. Jobs that are scheduled, modified, created, and deleted
C. Data that is backed up, restored, created, and deleted
D. Jobs that are running, stopped, paused, and resumed

A

A. Data that is accessed, modified, created, and deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

A Dell EMC Isilon customer wants to upgrade their cluster from OneFS version 7.2.1.0 to 8.0.
What should the customer be made aware of before proceeding with the upgrade?

A. All upgrades to OneFS 8.0 from earlier versions are rolling upgrades
B. Upgrading and rebooting cluster nodes are performed one node at a time
C. All upgrades to OneFS 8.0 from earlier versions are simultaneous upgrades
D. Direct upgrades to a supported version are possible even if the current version is not supported

A

C. All upgrades to OneFS 8.0 from earlier versions are simultaneous upgrades

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

A customer has an existing cluster with 10 S200 nodes in a single node pool, and 15 NL400 nodes
in a second node pool. They need to add capacity to their S200 node pool. The sales team has indicated
they should purchase an S210 node to obtain the additional capacity.
What is required to add the new node to the existing node pool?

A. S210 node must have the same number and capacity of HDDs and SSDs as the S200s
B. S210 node must have the identical memory capacity as the S200s
C. S200 nodes must be upgraded to the same firmware as the S210s
D. S200 node pool must be modified to use L3 cache

A

A. S210 node must have the same number and capacity of HDDs and SSDs as the S200s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Which command is used to display the on-disk permissions and print Microsoft Windows ACLs from
the security descriptor?

A. ls –l
B. chmod +a
C. chmod +ai
D. ls -le

A

D. ls -le

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

A storage administrator wants to gather NFS performance numbers on an Isilon cluster. The
administrator does not currently have a license for InsightIQ.
What is another Isilon tool that can be used to monitor the cluster?

A. isi statistics
B. isi nfs
C. isi set
D. isi networks

A

A. isi statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Which Isilon cluster quota events can be triggered for a soft quota?

A. Soft quota limit exceeded, limit remains exceeded, grace period expired, and write access denied.
B. Soft quota limit exceeded, grace period expired, write access denied, and advisory limit exceeded.
C. Soft quota limit exceeded, limit remains exceeded, grace period expired, and report generation failed.
36 / 99

D. Soft quota write access denied, grace period expired, write access denied, and report generation
failed.

A

A. Soft quota limit exceeded, limit remains exceeded, grace period expired, and write access denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Which job can be triggered by an such as a drive failure?

A. Media Scan
B. Collect
C. Flex Protect
D. Multi Scan

A

C. Flex Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Which protocol is used for communication between an Isilon InsightIQ virtual appliance and external
storage for monitoring data?

A. NFS
B. HDFS
C. HTTP
D. SMB

A

A. NFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

What happens in the Job Engine v2.0 when an error occurs in a phase on an Isilon cluster?

A. Job is marked failed
B. Job pauses
C. Phase pauses
D. Task fails

A

A. Job is marked failed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Which use case is a candidate for Dell EMC Isilon SmartDedupe?

A. Large number of files across different node pools
B. Files with large numbers of copies in snapshots
C. Large number of files on a single node pool
D. Large number of files that are smaller than 32 KB

A

C. Large number of files on a single node pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is required to join an EMC Isilon cluster to an Active Directory domain?

A. Microsoft Management Console
B. Organizational Unit
C. Domain account with rights to join domain
D. Reverse lookup zone

A

C. Domain account with rights to join domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What is a best practice for configuring ESRS for an EMC Isilon cluster?

A. Use IPs from static Smart Connect zones
B. Use IPs from the node with the lowest LNN
C. Use IPs from dynamic Smart Connect zones
37 / 99

D. Use IPs from the node with the highest LNN

A

A. Use IPs from static Smart Connect zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Which daemon accepts client SMB connections on an EMC Isilon cluster?

A. lwiod
B. smbd
C. srvsvcd
D. winbindd

A

A. lwiod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

When an Isilon ACL policy is configured as Windows only, what is the default behavior when a UNIX
NFSv3 client executes a chmod command?

A. Existing synthetic ACL is converted to a Windows ACL
B. chmod request is granted and a Windows ACE is added into the ACL file
C. UNIX client receives an error on the chmod request
D. Existing Windows ACL is converted to UNIX security

A

C. UNIX client receives an error on the chmod request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What administrative access methods are secured by RBAC?

A. Platform API and Secure Shell
B. Platform API and SNMP
C. Secure Shell and SNMP
D. SNMP and Secure Shell

A

A. Platform API and Secure Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

In an Isilon environment, which roles are required to provide full administration privileges to the
cluster?

A. SystemAdmin and SecurityAdmin
B. SystemAdmin and AuditAdmin
C. VMwareAdmin and AuditAdmin
D. SecurityAdmin and VMwareAdmin

A

A. SystemAdmin and SecurityAdmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Which access layer determines how an EMC Isilon cluster is reached?

A. Protocol
B. Identity Assignment
C. Authentication
D. Permissions

A

A. Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

After running EMC Isilon Smart Dedupe for several weeks, a customer complains about the read
performance of the deduplicated directories.
What steps should be taken to solve this problem?

A. Rehydrate the files
38 / 99

Add paths to the deduplication config
B. Rehydrate the files
Remove the problem path from the deduplication config
C. Rehydrate and then re-deduplicate the files
Add paths to the deduplication config
D. Rehydrate and then re-deduplicate the files
Remove the problem path from the deduplication config

A

B. Rehydrate the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

In a NetWorker environment, if a Virtual Synthetic Full operation fails, NetWorker defaults to creating
which type of backup?

A. Synthetic Full
B. Incremental
C. Traditional Full
D. Cumulative-Incremental

A

A. Synthetic Full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

How many disks can fail per disk pool in an N+3d:1n protection scheme before data loss occurs?

A. 1
B. 2
C. 3
D. 4

A

C. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

A Dell PowerScale cluster administrator notices that the capacity of one of the node pools is at 82%.
What action is recommended?

A. Add more nodes to the node pool
B. Add larger capacity drives to the node pool
C. Enable global spillover on the node pool
D. Redirect writes from the node pool

A

A. Add more nodes to the node pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

When implementing a new Isilon cluster, DNS entries are added to a company’s environment that
looks like the following:
Isilon_node1.isilon.clustercom AAAA fd18:b23e:1659:ad42:0:0:a:a9
What does this entry indicate?

A. AAAA record maps hostname to a 32-bit IPv4 address
B. AAAA record maps hostname to a 64-bit IPv4 address
C. AAAA record maps hostname to a 64-bit IPv6 address
D. AAAA record maps hostname to a 128-bit IPv6 address

A

D. AAAA record maps hostname to a 128-bit IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

What condition must a directory be in before it can be made into an Enterprise SmartLock directory?

A. Empty
39 / 99

B. Not existing
C. Non-WORM directory
D. Compliance SmartLock directory

201
Q

An EMC Isilon administrator configures the cluster’s ACL policy to Balanced.
After a file or folder on EMC Isilon has been given a Windows ACL, how are the UNIX mode bits
displayed for NFSv3-connected clients?

A. Evaluated and recalculated independently of the ACE
B. Evaluated and recalculated independently of the ACL
C. As an estimation of the effective permissions granted by the ACL
D. As an exact replica of Windows share-level permissions

A

C. As an estimation of the effective permissions granted by the ACL

202
Q

What is the maximum number of nodes that can be added into a node pool in Isilon Gen 5 hardware
and OneFS 8.2.0?

A. 144
B. 252
C. 288
D. 352

203
Q

In an Isilon environment, which type of identity information is stored in an access token?

A. Primary and secondary identities
B. Group identities
C. Primary identities only
D. Mapped identities

A

A. Primary and secondary identities

204
Q

A storage administrator is planning a firmware update on a cluster with 10 x NL400, 72 TB nodes.
The update will take place during a period of low activity.
Approximately how much time would the update of the cluster take?

A. 1 Hour and 40 minutes
B. 3 Hours and 20 minutes
C. 50 minutes
D. 2 hours and 30 minutes

A

A. 1 Hour and 40 minutes

205
Q

What SSD strategy provides similar behavior as L3 cache?

A. Use SSDs for metadata read acceleration
B. Use SSDs for metadata read/write acceleration
C. Use SSDs for data and metadata
D. Avoid SSDs

A

A. Use SSDs for metadata read acceleration

206
Q

After starting a SyncIQ failover disaster recovery test, the Dell PowerScale administrator is told to
cancel the test. Data on the target site has been modified.
What will happen to the modified data on the target site if the administrator reverts the failover
operation?

A. Reverted to the source site
B. Maintained
C. Discarded
D. Snapped and snap reverted

A

C. Discarded

207
Q

An organization requires the ability to segregate various administrative rights.
Which EMC Isilon feature enables this functionality?

A. RBAC
B. SmartConnect
C. SmartLock
D. InsightIQ

208
Q

A systems administrator has assigned the following permissions to a set of directories:
POSIX 777 root:wheel /ifs
POSIX 755 root:wheel /ifs/boston
POSIX 750 root:wheel /ifs/boston/financ
Real ACL “DEES\finance” “Full Control” /ifs/boston/finance/payroll
Real ACL “DEES\finance” “Modify” /ifs/boston/finance/payroll/johndoe.xls
After the permissions change, a user from the “DEES\finance” group experienced access issues when
opening the johndoe.xls file.
Which action will help resolve this problem?

A. Make the “DEES\finance” “Full Control” privilege inheritable for /ifs/boston/finance/payroll
B. Add “DEES\finance” “Read” privilege to /ifs/boston/finance/payroll/johndoe.xls
C. chmod 755 /ifs/boston/finance
D. chmod 777 /ifs/boston

A

C. chmod 755 /ifs/boston/finance

209
Q

Continuous Availability gives which version of SMB the ability to transparently fail over?

A. 1
B. 2.0
C. 3
D. 2.1

210
Q

A Dell EMC Isilon administrator has granted a user read-only permission at the share level. In
addition, the user has read/write permission from the Microsoft Windows ACLs.
What is the user’s effective permission on the share?
41 / 99

A. Read/write and modify
B. Read/write only
C. Read and modify
D. Read-only

A

D. Read-only

211
Q

An Isilon cluster with three S210 nodes and three NL400 nodes was expanded to 18 nodes (15 x
S210, 3 x NL400). You have been asked to revise the data protection policy initially set to N+3d:1n while
optimizing the available writable disk space.
What is the recommended data protection strategy for each pool and will the data protection overhead
average increase or decrease?

A. S210 node pool changes to N+2d:1n
NL400 node pool changes to N+2d:1n
B. S210 node pool changes to N+2n
NL400 node pool remains N+3d:1n
C. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2d:1n
D. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2n

A

A. S210 node pool changes to N+2d:1n

212
Q

What actions or features does SyncIQ provide with regard to DR failover and fail back?

A. Cluster preparation activities
B. Required networking changes
C. DNS changes
D. Client redirection

A

A. Cluster preparation activities

213
Q

You are reviewing the Dell EMC Isilon Configuration Guide for file sizes and workflows.
Which tab in the Configuration Guide contains this information?

A. Topology
B. Design Intent
C. Extended
D. Core

A

B. Design Intent

214
Q

In OneFS, what are valid identifiers when comparing an access token to file authorization data?

A. SID, UID, and GID
B. SID only
C. UID and GID only
D. File owner and SID only

A

A. SID, UID, and GID

215
Q

In a Dell EMC Isilon environment, which aggregation mode is considered “dynamic”?
42 / 99

A. FEC
B. LACP
C. Round Robin
D. Active/Passive Failover

216
Q

What can be modified in the subnet settings on an Isilon cluster?

A. VLAN ID
B. SmartConnect zone name
C. Interface membership
D. Access zone membership

A

A. VLAN ID

217
Q

What is the default behavior when a UNIX NFSv3 client executes a chmod command when the EMC
Isilon ACL policy is configured as Windows only?

A. The UNIX client receives an error on the chmod request
B. The chmod request is granted and a corresponding Windows ACE is added into the file or folder’s
ACL
C. The existing Windows ACL is converted to UNIX security
D. The existing synthetic ACL is converted to a Windows ACL

A

A. The UNIX client receives an error on the chmod request

218
Q

What is the target of a Dell PowerScale OneFS snapshot logical pointer?

A. Volume
B. Stripe
C. File system
D. Directory

A

D. Directory

219
Q

What is the order of precedence for NFS export policies?

A. 1. Clients
2. Always RO clients
3. Always RW clients
4. Root clients
B. 1. Always RW clients
2. Always RO clients
3. Root clients
4. Clients
C. 1. Root clients
2. Always RW clients
3. Clients
4. Always RO clients
D. 1. Always RO clients
2. Root clients
43 / 99

  1. Clients
  2. Always RW clients
A

A. 1. Clients

220
Q

A customer has configured a cluster in Compliance mode. The customer is only using Enterprise
SmartLock and non-WORM directories.
What mechanism is used to control the data retention expiration period?

A. System clock
B. Compliance clock
C. Autocommit period
D. Minimum retention period

A

A. System clock

221
Q

Where are the compressed, on-disk audit logs located?

A. /var/log/node<#>/audit_protocol.log
B. /var/log/audit_config.log
C. /ifs/.ifsvar/audit/logs/node<#>/topic
D. /ifs/.ifsvar/audit/audit.log

A

C. /ifs/.ifsvar/audit/logs/node<#>/topic

222
Q

Recently a new OneFS version was implemented on an EMC Isilon cluster to perform code patches
and minor functionality enhancements.
Which version upgrade is an example of this type of upgrade?

A. 7.2.0.0 -> 7.2.0.1
B. 7.0.2.8 -> 7.1.0.0
C. 7.1.1.3 -> 7.0.2.9
D. 6.5.5.7 -> 7.0.2.12

A

A. 7.2.0.0 -> 7.2.0.1

223
Q

A Dell PowerScale administrator is retiring older nodes from their 60-node Gen 5 cluster. After
SmartFail is used on the 20 targeted nodes, the administrator is notified that data access is much slower.
However, they find no issues with the network bandwidth.
What is a possible reason for the slower access issue?

A. SSD total capacity dropped below 1.5%, disabling GNA automatically
B. SmartFail disabled the L3 cache and must be enabled manually
C. Manage I/O optimization settings were not re-enabled
D. SSDs are no longer used for SmartCache prefetching

A

A. SSD total capacity dropped below 1.5%, disabling GNA automatically

224
Q

An Isilon administrator was unsuccessful when adding a new node to an existing Isilon cluster using
the Nodes LCD panel.
What is a possible cause?

A. Internal join mode has been set to ‘secure’
B. Internal join mode has been set to ‘manual’
44 / 99

C. Nodes can only be added through the console port
D. Nodes can only be added through the web administration interface

A

A. Internal join mode has been set to ‘secure’

225
Q

What is the best practice for configuring shares, exports, and quotas when implementing DR on the
source and target clusters?

A. Change all quotas to soft quotas on the target cluster
B. Configure the source side only when creating shares, exports, and quotas
C. Use the exact same names for shares and same aliases for exports
D. Use SyncIQ to replicate shares, exports, and quota settings

A

C. Use the exact same names for shares and same aliases for exports

226
Q

What is the maximum stripe width, including both data and protection, for Protection Level N+4d:1n?

A. 8
B. 16
C. 20
D. 30

227
Q

A customer has recently purchased a Dell EMC Isilon cluster and wants to use the cluster as a cloud
service provider. OneFS 8.x Groupnet and Access zones were recommended for this purpose.
What is the primary benefit of this approach?

A. Each client can have their own SmartPool policy
B. Each client can have their own authentication provider
C. Each client can have their own VHS strategy
D. Each client can have their own ACL policy

A

B. Each client can have their own authentication provider

228
Q

A Dell EMC Isilon customer upgraded their cluster from 7.1 to 8.0. Some of their UNIX users can no
longer access the cluster. After investigating the issue, you discover that only the UNIX systems using
NFSv2 are having issues.
What is a possible cause for these issues?

A. Cluster read/write clients are deleted
B. NFSv2 is not supported on OneFS 8.0
C. Only the “Security Flavors” are upgraded
D. Upgrade is destructive to NFS exports

A

B. NFSv2 is not supported on OneFS 8.0

229
Q

Which type of administrator commands are tracked by configuration auditing?

A. Commands run by the root user
B. PAPI-enabled commands
C. Commands run by the SystemAdmin and CompAdmin roles only
D. All UNIX, isi, isi_, and sudo commands

A

B. PAPI-enabled commands

230
Q

How many Active Directory provider instances can be configured per access zone?

A. 1
B. 2
C. 3
D. 4

231
Q

What information is displayed by the isi_hw_status command?

A. Hardware components and selected statistics
B. Health status of both NVRAM batteries
C. Subnet and pool membership for the interfaces
D. Status of drives in the node

A

A. Hardware components and selected statistics

232
Q

What accurately describes the behavior of InsightIQ with FSA enabled on an Isilon cluster?

A. FSA job runs at 22:00 hours every night by default
B. Storage usage statistics will be less accurate
C. A separate FSA license is required
D. Total number of monitored nodes capacity is reduced by half

A

A. FSA job runs at 22:00 hours every night by default

233
Q

A new cluster consisting of S nodes and NL nodes is created. SmartPools is unlicensed.
Where will the data be written?

A. To the node pool with the highest percentage of available space
B. To the S node pool first, then to the NL node pool
C. To the node pool that was created first, irrespective of node type
D. To the NL node pool first, then to the S node pool

A

A. To the node pool with the highest percentage of available space

234
Q

What are the notification options for Smart Quotas?

A. Write to a syslog
B. Write to a CEE server
C. Send a trap to an SNMP server
Generate an event on an SNMP server
D. Send an email
Generate a cluster event

A

D. Send an email

235
Q

When configuring a DR cluster with SyncIQ, what should be considered with respect to
SmartQuotas?

A. Never set hard quotas on SyncIQ target directories
B. Always set hard quotas on SyncIQ target directories
C. Replicate SmartQuota settings on both source and target clusters
46 / 99

D. If the target cluster is smaller, configure SmartQuotas to limit the SyncIQ target

A

A. Never set hard quotas on SyncIQ target directories

236
Q

An organization has an Isilon cluster with 15 S210 nodes in a single node pool and 20 NL400 nodes
in a second node pool.
Which requirements must be achieved before Global Namespace Acceleration can be activated?

A. All S210 nodes must contain at least one SSD drive
SSD capacity must be at least 2.25% of the total cluster space
B. At least seven S210 nodes must contain at least one SSD drive
SSD capacity must be at least 1.5% of the total cluster space
C. All S210 nodes must contain at least one SSD drive
SSD capacity must be at least 20% of the total cluster space
D. All S210 nodes must contain one SSD drive
SSD capacity must be at least 0.5% of the total cluster space

A

B. At least seven S210 nodes must contain at least one SSD drive

237
Q

A customer management team requires a data retention system. They need to be able to remove
files if necessary and retain full cluster management capabilities.
What Smart Lock configuration would you recommend to meet their requirements?

A. Compliance mode cluster
Enterprise Smart Lock directories with privileged deletes off
B. Standard Isilon cluster
Enterprise Smart Lock directories with privileged deletes off
C. Compliance mode cluster
Compliance Smart Lock directories with privileged deletes on
D. Standard Isilon cluster
Enterprise Smart Lock directories with privileged deletes permanently disabled

A

B. Standard Isilon cluster

238
Q

Which protocol is used for communication between an Isilon InsightIQ virtual appliance and an end-
user system?

A. HTTP
B. HDFS
C. NFS
D. SMB

239
Q

A systems administrator is attempting to manage a Dell PowerScale cluster using the web
administration interface. However, some configuration tabs are not displayed.
What is the most likely cause of this issue?

A. Some features have not been licensed
B. Administrator did not log in as CompAdmin
C. RBAC has been implemented
D. Access zones have been created
47 / 99

A

C. RBAC has been implemented

240
Q

Based on the command output shown in the exhibit, what does the “+” represent?

A. File’s mode bits take precedence
B. root is a super user
C. File has a synthetic ACL
D. File has an advanced ACL

A

D. File has an advanced ACL

241
Q

A financial institution has recently purchased a Dell EMC Isilon cluster. Due to strict regulatory
retention guidelines, they plan to use the SmartLock Compliance feature for the cluster.
What accurately describes the SmartLock Compliance feature for committed data?

A. Data can be modified after the retention period by disabling the SmartLock feature
B. System clock can be adjusted to change the retention period and then the data can be deleted
C. Data cannot be deleted before its retention period expires
D. Only the root user can delete the data with privileged access before the retention period

A

C. Data cannot be deleted before its retention period expires

242
Q

Where are audit events logged?

A. Locally on each node
B. /ifs/.ifsvar
C. On the node with the lowest LNN
D. /ifs/.cluster

A

A. Locally on each node

243
Q

An implementation engineer has just joined an EMC Isilon cluster to an Active Directory domain. The
System zone of the cluster is set to default values.
Which AD object is automatically added to the cluster’s administrator group?

A. Domain Admin group
B. Domain Admin user
C. Local Administrators group
D. Local Administrator user

A

A. Domain Admin group

244
Q

What is required to configure link aggregation on an Isilon cluster?
48 / 99

A. Aggregate the same interface on multiple nodes and use different aggregation modes for each pool
B. Aggregate both interfaces on a single node and use different aggregation modes for each pool
C. Aggregate the same interface on multiple nodes and only use one aggregation mode for all pools
D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools

A

D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools

245
Q

What are the “Three Vs” describing challenges in managing Big Data?

A. Volume, Volatile, Vicinity
B. Volume, Velocity, Variety
C. Velocity, Volatile, Variety
D. Variety, Vicinity, Volume

A

B. Volume, Velocity, Variety

246
Q

Which process is required to run on each NetWorker Storage Node?

A. nsrsnmd
B. nsrjobd
C. nsrd
D. nsrlcpd

A

A. nsrsnmd

247
Q

An Isilon administrator wants to enable quota notifications for their LDAP users. However, the users’
email IDs are not updated in the LDAP environment.
What additional configuration needs to be performed?

A. Configured the file provider
B. Manage local users and groups
C. Configure the local provider
D. Configure a mapping rule

A

D. Configure a mapping rule

248
Q

An administrator wants to enable quotas on a group directory in their Isilon cluster. In addition, the
administrator wants to monitor and limit the disk usage.
Which type of quotas need to be configured?

A. Advisory
B. Enforcement
C. Accounting
D. Soft

A

A. Advisory

249
Q

What is a characteristic of L3 cache on an Isilon cluster?

A. Must be the same size as the L2 cache
B. Contents will be persistent through a node reboot
C. Only holds file data that has been stored on SSDs
D. Accessed only by clients connecting to the node it is on

A

B. Contents will be persistent through a node reboot

250
Q

A systems administrator needs to change the cluster protection level from N+3n to N+2n.
Which interfaces can they use?

A. HTTP, WebUI, and CLI
B. SFTP, HTTP, and CLI
C. PAPI, WebUI, and CLI
D. PAPI, WebUI, and SFTP

A

C. PAPI, WebUI, and CLI

251
Q

A customer requires data retention to meet governmental regulatory requirements. They have asked
you to explain the EMC Isilon data retention offerings and how these offerings would meet their
requirements.
What mechanism ensures that data is retained for the required retention period?

A. Compliance clock
B. System clock
C. Autocommit period
D. Minimum retention period

A

A. Compliance clock

252
Q

What standard reporting types are provided by InsightIQ?

A. File system and performance reports
B. Trending and capacity reports
C. Performance and forecasting reports
D. Historical and file system reports

A

A. File system and performance reports

253
Q

Which CLI command(s) properly turns off an EMC Isilon cluster?

A. isi config
»> shutdown all
B. shutdown -p now
C. isi_flush;
halt
D. isi config
»> quit

A

A. isi config

254
Q

On an Isilon cluster running OneFS 7.2, what is the recommended maximum number of SyncIQ
policies per source cluster?

A. 50
B. 100
C. 200
D. 500

255
Q

What is an advantage of managed file replication?

A. Removes the media server from the data path when creating duplicates
B. Specifically an approach to system mirroring
C. User must create and replicate snapshots separately
D. Uses the collection log to track and update what is missing on the source

A

A. Removes the media server from the data path when creating duplicates

256
Q

You are using a Windows 2008r2 server and connecting to a share over SMBv2.
Where would the session or state information for the connection be maintained?

A. Client-connected node only
B. Client only
C. Client-connected node and client
D. All nodes in the cluster

A

A. Client-connected node only

257
Q

In a Dell EMC Isilon environment, which Gen 6 nodes support 2.5” SAS drives?

A. A200
B. H400
C. H500
D. H600

258
Q

You want to join your Dell PowerScale cluster with a Microsoft Active Directory (AD) domain.
In addition to the AD domain name, what other information is required to join the AD?

A. OU name and Kerberos encryption key
B. Isilon cluster name and Kerberos encryption key
C. AD domain account with rights to join and AD domain account password
D. Local account with root privilege and local account password

A

C. AD domain account with rights to join and AD domain account password

259
Q

You have been tasked with creating file pool policies for a customer as part of the configuration
document. Three of the file pool policies are based on matching specific file extensions.
What file pool policy filter type should you select?

A. Filename
B. File type
C. File location
D. User defined attributes

A

A. Filename

260
Q

What is the fastest way to back up remote offices?

A. Remote library to back up to tape
B. Deduplication at the target
C. AFTD at the central data center
D. Deduplication from the source
51 / 99

A

D. Deduplication from the source

261
Q

What additional Hadoop feature is provided by an EMC Isilon cluster environment?

A. Multi-protocol access to HDFS data
B. Reduced compute time
C. Dependent compute and storage scaling
D. Same security authentication as Hadoop

A

A. Multi-protocol access to HDFS data

262
Q

A storage administrator needs to create a file pool policy to move files that have not been changed
in over two months to their archive tier. The Tiers of nodes with faster and slower node pools already
exist.
Which file matching criterion should be used to meet this requirement?

A. atime is older than 2 months ago
B. birthtime is older than 2 months ago
C. ctime is older than 2 months ago
D. mtime is older than 2 months ago

A

D. mtime is older than 2 months ago

263
Q

In a Dell EMC Isilon environment, what happens when executing a failover revert?

A. Undoes a failback job in progress
B. Undoes a failover job in progress
C. Redirects clients to the target cluster
D. Redirects clients to the source cluster

A

B. Undoes a failover job in progress

264
Q

What is the minimum recommended protection scheme for 6 TB drives?

A. N+3d:1n
B. N+2n
C. N+2d:1n
D. N+3d:1n1d

A

D. N+3d:1n1d

265
Q

A company has an Isilon cluster on which they want to configure dynamic pools. The cluster consists
of 5 nodes. The pool will consist of one 1Gbps Ethernet external interface on each of the nodes.
Because the address space is limited at the company’s site, they will need to implement dynamic pools
using a minimum number of addresses.
If the company puts all interfaces in one pool and sets it to dynamic with round robin failover, how many
addresses need to be put into the pool to ensure an even number of IP addresses per node after failover
distribution should a node fail?

A. 4
B. 8
C. 15
D. 20
52 / 99

266
Q

A customer is using an EMC Isilon cluster solely for user’s home directories. Secure protocol
communication was a requirement in the design of their cluster configuration
Which feature of the SMB protocol could be disabled to improve performance?

A. Oplocks
B. Packet signing
C. Credit limits
D. Stateful

A

A. Oplocks

267
Q

If a Dell PowerScale cluster has five unique access zones, in which zone should administration of
the cluster occur?

A. Any zone can perform administration
B. Only access zones for which administration has been enabled
C. Zone in which changes need to be made
D. Only in the System zone

A

D. Only in the System zone

268
Q

Which CLI command can be used to display information about requested and actual protection
settings on all files in a directory?

A. isi zone zones
B. isi get
C. isi_for_array -s
D. isi stat -q

A

B. isi get

269
Q

What is the correct sequence of actions performed by OneFS to generate an access token?

Answer:
53 / 99

270.When they access an EMC Isilon cluster, at which access layer are users associated with a role?

A. Permissions
B. Identity Assignment
C. Authentication
D. Protocol

A

B. Identity Assignment

270
Q

When reviewing the actual protection output of N+4/2, what does the number “4” represent?

A. FEC stripe units per stripe
B. Hard drives used per stripe
C. Volume stripes per file system
D. FEC stripe units per file system

A

A. FEC stripe units per stripe

271
Q

What accurately describes a NetWorker Storage Node?

A. Responsible for read and write operations of data
B. A dedicated host with a NetWorker database
C. Host that maintains NetWorker tracking and configuration information
D. Host with a large database to backup itself

A

A. Responsible for read and write operations of data

272
Q

Which features represent Hadoop?

A. Software library framework
Single node data storage
B. Analyzes data across groups of computers
Single node data processing
C. Distributed processing of large data sets
Single node data storage
D. Software library framework
Distributed processing of large data sets
54 / 99

A

D. Software library framework

273
Q

You have been tasked with designing SyncIQ policies for a customer that requires failover and fail
back testing.
What should you advise the customer?

A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ
B. SyncIQ will support fail back replication policies that specify directory includes or excludes
C. Multiple SyncIQ policies can point to the same directory on the target cluster
D. Synchronous replication is supported by SyncIQ

A

A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ

274
Q

An Isilon cluster has been configured with an autocommit period of 30 minutes for all compliance
SmartLock directories. However, the storage administrator has noticed that files recently written to the
folders can be deleted or modified.
Why is this happening?

A. Offset time for autocommit has not been met
B. Compliance clock is out of sync with the autocommit function
C. Offset time for autocommit has been met
D. Manual commit must be used for all compliance SmartLock directories

A

A. Offset time for autocommit has not been met

275
Q

What can be configured on the SmartPools page in the web administration interface of an Isilon
cluster?

A. GNA, VHS, L3 cache, Global Spillover
B. Address pools, L2 cache, tiers, snapshot storage
C. L1 cache, file pool policies, VHS, notifications
D. Data access pattern, protection setting, VHS, deduplication

A

A. GNA, VHS, L3 cache, Global Spillover

276
Q

A drive is being SmartFailed from a node and the data is being rebuilt.
Where will the data be rebuilt by default?

A. Space reserved as VHS only in the same node pool
B. Any available space on the same node pool
C. Node pool designated in the global spillover setting
D. Node pool specified in the Default file pool policy

A

B. Any available space on the same node pool

277
Q

An administrator requires SMB Continuous Availability (CA) on all existing SMB shares.
What needs to be done to meet this request?

A. Nothing; SMB CA is on by default
B. All shares must be reshared
C. Log into the CLI to access the necessary command
D. Run the global command from the web administration interface

A

B. All shares must be reshared

278
Q

In a Dell EMC Isilon environment, what is a function of the SmartPoolsTree job?

A. Directs all files in the cluster to one or more node pools in a single tier
B. Allows file pool policies to be applied on a directory rather than on an entire file system
C. Enforces the default system pool policies but does not enforce user pool policies
D. Maintains the layout of files in the node or file pools according to file pool policies

A

B. Allows file pool policies to be applied on a directory rather than on an entire file system

279
Q

When using the WebUI to edit an active job, which task can a Dell PowerScale administrator
perform?

A. Cancel the job
B. Change the job priority
C. Pause the job
D. Restart the job

A

B. Change the job priority

280
Q

In a Windows ACL, what rules govern how deny permissions are enforced?

A. Deny permissions take precedence over allow permissions
B. Any inherited permission overrides any explicit permission
C. An inherited deny permission overrides an explicit allow permission
D. Allow permissions take precedence over deny permissions

A

A. Deny permissions take precedence over allow permissions

281
Q

In a Dell EMC Isilon environment, what does the command prompt character change to when
logged in with only administrator rights?

A. Cluster-1#
B. Cluster-1%
C. Cluster-1*
D. Cluster-1:

A

B. Cluster-1%

282
Q

In a 3-node Isilon cluster using N+1n data protection, a single 128 KB file is written.
How are the stripe units distributed over the nodes?

A. Node 1: 64 KB stripe unit
Node 2: 64 KB mirror
Node 3: 64 KB FEC
B. Node 1:64 KB stripe unit
Node 2: 64 KB stripe unit
Node 3: 64 KB FEC
C. Node 1: 128 KB stripe unit
Node 2: 128 KB FEC
D. Node 1: 128 KB stripe unit
Node 2: 128 KB mirror
Node 3: 128 KB FEC
56 / 99

A

C. Node 1: 128 KB stripe unit

283
Q

What is the result when SyncIQ is used to replicate a SmartLink file to OneFS 7.2.1?

A. Data is deep copied to the destination cluster
B. The SyncIQ job fails
C. A new Smart Link file is created on the destination cluster
D. Contents of the Smart Link file are copied to the destination cluster

A

A. Data is deep copied to the destination cluster

284
Q

If a Dell EMC Isilon customer is using OneFS v8.0.0.2, what is the maximum number of SyncIQ jobs
that can be run concurrently?

A. 5
B. 40
C. 50
D. 60

285
Q

A customer’s Isilon storage administrator is concerned about capacity after recently ingesting 200
TB of file data. The customer has recently added more nodes to the cluster and wants to auto-balance
the cluster as soon as possible.
The cluster utilization percentages for an average 24-hour period are:
- 45% during 00:00-08:59
- 60% during 09:00-17:00
- 30% during 17:01-23:59
While keeping cluster utilization at a minimum, which Impact Policy settings will allow the job to complete
quickly without impacting the production workload?

A. Medium, Medium, Low.
B. Medium, Low, Low.
C. High, Medium, Paused.
D. High, High, Low.

A

A. Medium, Medium, Low.

286
Q

Which type of record is needed in DNS to register the name storage.cluster.training.com as
192.168.15.12?

A. Name Server
B. PTR
C. AAAA
D. A

287
Q

An Isilon cluster has ten A200 nodes and the node pool data protection level is set to N+2. The data
access pattern is currently set to streaming.
If the data access pattern is changed to concurrency, how many stripes for a 1 MB file are moved to the
other drive(s)?
57 / 99

A. 0
B. 2
C. 4
D. 6

288
Q

Management would like to ensure that all of the dynamic IP addresses from the pool are assigned to
ports.
Which license needs to be activated to accomplish this?

A. Insight IQ
B. Smart Pools
C. Cloud Pools
D. Smart Connect Advanced

A

D. Smart Connect Advanced

289
Q

What does the FSA job use to track directory activity in OneFS 8.0?

A. Customer configured snapshots with a Snapshot IQ license
B. Change list API to compare snapshots on the /ifs tree
C. Complete LIN scan of the file system
D. PAPI interface to query One FS

A

B. Change list API to compare snapshots on the /ifs tree

290
Q

What is a reason why Dell PowerScale NAS solutions work effectively with Big Data workflows?

A. Provide a scale-up solution
B. Function as single block-based storage
C. Provide multiple aggregates of volumes
D. Function as a single repository of data

A

D. Function as a single repository of data

291
Q

Which RBAC user role(s) provides a user full web administration privileges?

A. Audit Admin only
B. System Admin and Audit Admin
C. System Admin and Security Admin
D. Security Admin only

A

C. System Admin and Security Admin

292
Q

Which setting may be modified on an Isilon cluster by the file system explorer, file pool policies, and
the isi set command?

A. Data Layout
B. VHS Space Reservation
C. File Permissions
D. Access Zone Membership

A

A. Data Layout

293
Q

You are using Connection Count to load balance client connections in an Isilon SmartConnect zone.
Which connection type is counted when considering which IP to assign?

A. Established FTP connections
B. Active IP connections
C. Active UDP connections
D. Established TCP connections

A

D. Established TCP connections

294
Q

What node pool settings can be modified?

A. Tier assignment
Requested protection level
L3 cache enablement
B. Node pool name
Requested protection level
I/O optimization
C. Tier assignment
L3 cache enablement
I/O optimization
D. Node pool name
L3 cache enablement
Requested protection level

A

D. Node pool name

295
Q

A customer has a 5 node cluster. Their average file size is 512 KB. The customer requires the ability
to withstand a minimum of three simultaneous drive losses without a data loss.
What requested protection level should be implemented to minimize protection overhead?

A. N+3d:1n1d
B. 3X
C. N+3n
D. N+3d:1n

A

A. N+3d:1n1d

296
Q

In which directory can you find snapshots stored on an EMC Isilon cluster?

A. /ifs/.snapshot
B. /ifs/.ifsvar
C. /ifs/.isilon
D. /ifs/data

A

A. /ifs/.snapshot

297
Q

In a Dell EMC Isilon environment, what occurs when an Isilon node pool is below the suggested
protection level?

A. File is striped to an additional drive
B. Cluster event is generated
C. CELOG event is generated
59 / 99

D. File is mirrored to an additional node

A

C. CELOG event is generated

298
Q

What accurately describes the behavior of an access token on an Isilon cluster?

A. Updated when the client accesses the cluster.
B. One token is generated for every access zone.
C. Cannot contain both an SID and an UID.
D. Requires the use of external authentication providers.

A

A. Updated when the client accesses the cluster.

299
Q

What will occur when an Isilon node pool is below the recommended protection level?

A. CELOG will generate an underprotected event.
B. File will be striped to an additional drive.
C. File will be mirrored.
D. An additional copy of the metadata will be stored on the SSD drives.

A

A. CELOG will generate an underprotected event.

300
Q

You have just joined an Isilon cluster to an Active Directory (AD). The System access zone of the
cluster is set to the default settings.
Which AD group is automatically added to the Isilon Users group?

A. Domain Users
B. Authenticated Users
C. Security Admins
D. Domain Admins

A

A. Domain Users

301
Q

Which protocols are referenced when creating multiprotocol permissions in an Isilon
implementation?

A. NFS and SMB only
B. FTP, NFS, and HTTP
C. HDFS, SMB, and FTP
D. REST and PAPI only

A

A. NFS and SMB only

302
Q

You are configuring a five-node Isilon cluster with high-density, NL-Series nodes. You want to
minimize protection overhead and preserve the required MTTDL requirements.
Which protection level is most appropriate for this type of cluster?

A. 2X
B. N+1n
C. N+2n
D. N+2d:1n

A

D. N+2d:1n

303
Q

What is a benefit of the Isilon Data Lake solutions?
60 / 99

A. Protects entirety of lake at same level
B. Scale-up approach for petabyte scale
C. Block-based storage for large databases
D. Stores data from multiple sources

A

D. Stores data from multiple sources

304
Q

What is the size of the cloud data object on a Dell PowerScale cluster running OneFS 9.0?

A. 8 KB
B. 128 KB
C. 2 MB
D. 8 MB

305
Q

Which type of node is designed for files that are accessed infrequently, or stored for archival
purposes?

A. NL-Series
B. S-Series
C. X-Series
D. Backup Accelerator

A

B. S-Series

306
Q

Which operating system does NetWorker Virtual Edition use?

A. RHEL
B. SLES
C. Solaris
D. Windows

307
Q

What is the recommended limit for Access zones in Dell EMC Isilon OneFS 8.0?

A. 50
B. 60
C. 70
D. Unlimited

A

D. Unlimited

308
Q

What is the recommended best practice to delete a container from an Isilon Swift implementation?

A. Use the web administration interface
B. Use the rmdir command from the Isilon CLI
C. Use the DELETE operation to delete the container and its contents
D. Ensure the container is empty and then delete the container

A

D. Ensure the container is empty and then delete the container

309
Q

In an Isilon environment, which physical configuration will enable the internal failover network?

A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches.
61 / 99

B. Both int-a and int-b ports of each node in the cluster must be physically connected to one switch.
C. Only int-a ports of each node in the cluster must be physically connected to one switch.
D. Only int-b ports of each node in the cluster must be physically connected to one switch.

A

A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches.

310
Q

An organization wants to provide their client with read-only administrative access to their EMC Isilon
data cloud.
Which role would best provide the access required?

A. Audit Admin
B. Backup Admin
C. System Admin
D. Security Admin

A

A. Audit Admin

311
Q

What is a minimum requirement to enable GNA in an Isilon cluster?

A. Four nodes within a cluster contain SSDs
B. L3 cache is enabled
C. 20% of the nodes contain SSDs
D. Total SSD space equals 1%

A

C. 20% of the nodes contain SSDs

312
Q

What is a characteristic of static pools?

A. Will force an IP to remain on a NIC port even if a node fails
B. Can assign more than one IP per NIC port in the pool
C. When a node fails, will fail over IPs to the node with the lowest LNN
D. Must have the same number of IPs in the range as NIC ports in the pool

A

A. Will force an IP to remain on a NIC port even if a node fails

313
Q

In an Isilon Hadoop configuration, what changes occur in the event there is a failure of an Isilon
node running as a NameNode?

A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be
preserved
B. Administrative intervention will be required to failover the NameNode
C. Affected node will be SmartFailed since metadata assigned to the failed NameNode can be
compromised
D. Administrator can configure a replacement NameNode; all metadata will be preserved

A

A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be

314
Q

Which command(s) writes uncommitted data from NVRAM to disk on an EMC Isilon node?

A. isi_flush
B. isi devices
C. isi config&raquo_space;> commit
D. isi_for_array -s isi update

A

A. isi_flush

315
Q

What is a reason for implementing a scale-out NAS solution?

A. Solution needs to add capacity without adding compute power or bandwidth
B. Solution needs specialized controllers that will run in active-active mode
C. Performance of the solution needs to scale consistently to hundreds of petabytes
D. Components of the solution need to be distributed across different racks for redundancy

A

C. Performance of the solution needs to scale consistently to hundreds of petabytes

316
Q

How many rack units are required in a Dell EMC Isilon Gen 6 chassis?

A. 1U only
B. 1U or 2U
C. 2U only
D. 4U

317
Q

What is a benefit of using access zones on an EMC Isilon cluster?

A. Multi-tenancy
B. All users can share data access
C. Single tenancy
D. All groups can share data access

A

A. Multi-tenancy

318
Q

What are characteristics of deduplication on an EMC Isilon cluster?

A. Asynchronous batch job
Does not dedupe blocks within files
Occurs within node pools
B. Runs during file write
Does not dedupe blocks within files
Occurs within individual tiers
C. Asynchronous batch job
Dedupes blocks within files
Occurs across node pools
D. Runs during file write
Dedupes blocks within files
Occurs across individual tiers

A

A. Asynchronous batch job

319
Q

Which command can be used to test connectivity from a client to an Isilon cluster?

A. nslookup
B. netstat
C. ping
D. ifconfig

320
Q

In a Dell EMC Isilon environment, what is a characteristic of dynamic pools?

A. Fails over the IP addresses in a pool to the node with the lowest LNN if a node fails
B. Must have the same number of IP addresses in the range as NIC ports in the pool
C. Forces the IP addresses to stay with the same NIC port, even if a node fails
D. Can allocate more than one IP address per NIC port in the pool

A

D. Can allocate more than one IP address per NIC port in the pool

321
Q

Which features are part of the traditional Hadoop NameNode?

A. Filesystem for the metadata
One physical server
B. Holds Metadata/location data for the cluster
Task Tracker
C. Filesystem for the metadata
Multiple NameNodes
D. One physical server
Task Tracker

A

A. Filesystem for the metadata

322
Q

What is the correct sequence of phases taken in a full deduplication job?

A. 1. Index updating
2. Duplicate detection
3. Block sharing
4. Sampling
B. 1. Block sharing
2. Duplicate detection
3. Index updating
4. Sampling
C. 1. Duplicate detection
2. Sampling
3. Block sharing
4. Index updating
D. 1. Sampling
2. Duplicate detection
3. Block sharing
4. Index updating

A

D. 1. Sampling

323
Q

An organization has a five-node standard Isilon cluster. Due to regulatory requirements, they need to
build a compliance mode cluster using the existing production hardware.
How can this be achieved?

A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster
B. SmartFail two of the nodes and use them to build a new compliance mode cluster
C. Add the SmartLock license to the existing cluster and create some compliance mode directories
D. Purchase a new cluster as there is no way to upgrade an existing cluster or reformat nodes
64 / 99

A

A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster

324
Q

A Dell PowerScale cluster has six A200 nodes and the node pool data protection level is set to N+2.
The data access pattern is currently set to streaming.
If the data access pattern is changed to random, how many stripes for a 1 MB file are moved to other
drives?

A. 0
B. 2
C. 4
D. 6

325
Q

What is a major advantage of the DSP in version 7.1.1 and later?

A. The nodes remain online during the update process
B. The updated node remains offline during the process and joins the cluster after the update
C. It will update the node firmware non-disruptively
D. It automatically updates all drives simultaneously

A

A. The nodes remain online during the update process

326
Q

A Dell PowerScale administrator wants to list the snapshots only for /ifs/data/stuGG7.
Where can they find the snapshots?

A. /ifs/.snapshot only
B. /ifs/data/stuGG7/.snapshot and /ifs/.snapshot
C. /ifs/data/stuGG7/.snapshot only
D. /ifs/data/stuGG7 and /ifs/.snapshot

A

A. /ifs/.snapshot only

327
Q

What is used to reduce the time to ACK to the client for synchronous writes?

A. Endurant Cache
B. L1 Cache
C. FAST Cache
D. L2 Cache

A

A. Endurant Cache

328
Q

An administrator wants to verify that a file has been moved from the Dell PowerScale cluster to the
cloud. The cluster is running Dell PowerScale OneFS 9.0.
Which command can the administrator use?

A. isi cloud pools view
B. isi sync target
C. isi filepool
D. isi get

A

D. isi get

329
Q

What is required to perform management operations through the web administration interface?
65 / 99

A. An external IP address reachable over TCP port 8080
B. Direct serial connectivity to any node in the cluster
C. TCP port 23 open between Isilon and a remote management server
D. ConnectEMC services enabled on the cluster

A

A. An external IP address reachable over TCP port 8080

330
Q

An implementation engineer has just joined an EMC Isilon cluster to an Active Directory (AD). The
System zone of the cluster is set to default settings.
Which AD group is automatically added to the Isilon cluster’s users group?

A. Domain Users
B. Local Users
C. Everyone
D. Domain Admins

A

A. Domain Users

331
Q

What is the benefit of sub pools within a node pool?

A. Drive loss protection is per sub pool
B. Increases the number of drives per node available for streaming writes
C. Enables multi-tenancy at the node pool level
D. Adds a more granular level of storage management

A

A. Drive loss protection is per sub pool

332
Q

On which port will a NetWorker client listen?

A. 7934
B. 7937
C. 7944
D. 7947

333
Q

Upon review of an existing Isilon cluster, a storage administrator discovers that the cluster is in
compliance mode. However, some files are beyond their maximum retention period but are not out of the
WORM state.
How can this condition be explained?

A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up
B. Files do not age out of compliance and the WORM state cannot be modified once written
C. Files were never updated to free up space
D. Users specified shorter individual retention periods than the directory configurations

A

A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up

334
Q

Which benefit does GNA provide to a Dell EMC Isilon cluster?

A. Additional level of cache on SSDs used for metadata
B. Metadata read acceleration across the cluster
C. Namespace read/write acceleration across the cluster
D. Metadata read acceleration for only the Job Engine
66 / 99

A

B. Metadata read acceleration across the cluster

335
Q

A storage administrator has an Isilon cluster consisting of 20 nodes. The nodes have identical
hardware and are members of a single node pool. All files are being protected at N+2d:1n.
What is the largest file that can be written in a single stripe on this cluster?

A. 1024 KB
B. 2048 KB
C. 2304 KB
D. 2560 KB

A

B. 2048 KB

336
Q

In an Avamar client, what is used to identify unique data?

A. Summary Vectors
B. Containers
C. Fingerprints
D. Cache files

A

D. Cache files

337
Q

What is the purpose of access zones?

A. Isolate data for multi-tenancy
Control who can access the data in each zone
B. Create configuration settings for authentication
Provide identity management services on a cluster
C. Configure authentication providers
Provision protocol directories
D. Create mode bits and access control lists
Control client access to files and directories

A

A. Isolate data for multi-tenancy

338
Q

When a Gen 5 node loses power unexpectedly, which cache performs a vault to flash memory in a
Dell EMC Isilon environment?

A. NVRAM Cache
B. DNS Cache
C. Endurant Cache
D. L1 Cache

A

A. NVRAM Cache

339
Q

You are configuring an NS record for an EMC Isilon cluster.
What is the best practice for naming the NS record?

A. Unique name
B. Same name as the A record
C. Same name as the cluster
D. Same name as the Smart Connect zone

A

B. Same name as the A record

340
Q

A customer has NFSv3 and SMBv2 clients on the same network which need to access a Dell EMC
Isilon cluster.
Based on best practice, how should the cluster’s network settings be configured?

A. 1 subnet with 1 pool
B. 1 subnet with 2 pools
C. 2 subnets with 1 pool each
D. 2 subnets with 2 pools each

A

B. 1 subnet with 2 pools

341
Q

What benefit does GNA provide to the cluster?

A. Metadata read acceleration across the cluster
B. Namespace read/write acceleration across the cluster
C. An additional level of cache on SSDs used for metadata
D. Metadata read acceleration specifically for the job engine

A

A. Metadata read acceleration across the cluster

342
Q

What is provided by using link aggregation?

A. Failover mechanism for stateful protocols
B. Failover across EMC Isilon cluster nodes
C. Failover mechanism for stateless protocols
D. Increased overall throughput for a single client

A

A. Failover mechanism for stateful protocols

343
Q

You configure DataIQ to monitor the Dell PowerScale cluster. You add a subdirectory to the OneFS
volume that DataIQ monitors. However, the subdirectory does not appear in the Data Management >
Browse page.
What action should you take to resolve this issue?

A. Include the subdirectories in the data management configuration file
B. Add a file type class to the PowerScale volume
C. Run a scan on the PowerScale volume
D. Adjust the scan exclusions on the Data Management Configuration page

A

C. Run a scan on the PowerScale volume

344
Q

When a user accesses a file on a Dell PowerScale cluster, what does the cluster use to verify
authorization?

A. Active Directory call to LDAP
B. Configured authentication service
C. Access token
D. On-disk identity

A

C. Access token

345
Q

A storage administrator wants to check the current firmware status of an EMC Isilon cluster as
quickly as possible.
68 / 99

Which command should you run to non-disruptively check this information?

A. isi firmware status
B. isi devices
C. isi_for_array isi firmware status
D. isi_for_array isi devices

A

A. isi firmware status

346
Q

A customer has implemented SyncIQ as part of their DR strategy. They are now implementing
SmartLock for data retention as part of their continued migration to EMC Isilon as their big data NAS
storage provider.
What advice should be provided to the customer regarding SmartLock directories and SyncIQ?

A. Only non-WORM directories can be failed over and failed back
B. Only non-WORM and Enterprise SmartLock directories can be failed over and failed back
C. Enterprise SmartLock directories can be synchronized to Compliance SmartLock directories
D. Compliance SmartLock directories can be synchronized to Enterprise SmartLock directories

A

A. Only non-WORM directories can be failed over and failed back

347
Q

What is the minimum required information to create an SMB share?

A. Specific share permissions
B. Access zone
C. Export name
D. Description

A

B. Access zone

348
Q

Refer to the exhibit.

What is the actual protection level of the FEATURE.wmv file?

A. N+2n
B. N+1
C. N+2d:1n
D. N+2

349
Q

What is the maximum object size supported by a Dell PowerScale OneFS S3 bucket?

A. 8 TB
B. 16 TB
C. 32 TB
D. 64 TB

350
Q

A Dell EMC Isilon user is restricted by a 40 GB quota that includes data protection overhead in its
69 / 99

disk usage calculations.
If the cluster is configured with a 2x data protection level and the user writes a 10 GB file to the cluster,
how much space is consumed?

A. 10 GB
B. 20 GB
C. 30 GB
D. 40 GB

351
Q

A company has an 8-node F800 Dell PowerScale cluster with two Z9100 Dell Ethernet back-end
switches running on OneFS 8.2.0. The company is planning to add 72 H500 nodes to the cluster.
What is the minimum number of additional switches needed to support the configuration?

A. 5
B. 6
C. 10
D. 12

352
Q

During a Dell PowerScale OneFS rolling upgrade, which protocols offer continuous availability
functionality?

A. NFSv3 and SMB 2.0
B. NFSv4 and SMB 3.0
C. SMB 2.0 and SMB 3.0
D. SMB 2.0 and NFSv4

A

B. NFSv4 and SMB 3.0

353
Q

A customer has Smart Failed out a node named “node-1”, and replaced it with another. The new
node has identified itself as “node-8”.
Which command(s) would allow the customer to change the identity of the new node to “node-1”?

A. isi firmware update
B. isi update
C. isi devices
D. isi config
»> lnnset

A

D. isi config

354
Q

Which feature of the SMB protocol can be used to adjust protocol overhead?

A. Change notify
B. Stateless
C. Credit limits
D. Stateful

A

A. Change notify

355
Q

What type of identity information is stored in an access token?
70 / 99

A. Primary and secondary identities
B. Kerberos tokens
C. Primary identities only
D. Secondary identities only

A

A. Primary and secondary identities

356
Q

Which protocol connections could seamlessly fail over to another node if an EMC Isilon node
became unavailable?

A. NFSv4
B. NFSv3
C. HDFS
D. SMBv2.1

357
Q

In a Dell EMC Isilon environment, what is provided by using the “and” condition in a file pool policy
filter?

A. Increases the granularity of the file match criteria
B. Reduces the number of file pool policies
C. Combines multiple file pool policy filters with the same actions
D. Broadens the file pool policy match criteria

A

A. Increases the granularity of the file match criteria

358
Q

An Internet hosting company has customers requesting a total of 200 TB of storage. The hosting
company currently has 50 TB of storage available.
What should be implemented to satisfy customer requirements?

A. Thin provisioning
B. Soft user quotas
C. Default group quotas
D. Advisory user quotas

A

A. Thin provisioning

359
Q

A given node pool consists of hard drives only (no SSDs).
How many drives are included, per node, in a sub pool?

A. 2
B. 3
C. 6
D. 12

360
Q

Which interface on an Isilon cluster represents an aggregation of interfaces ext3 and ext4?

A. ext-agg-2
B. lagg-2
C. ext-agg-3
D. ext-agg
71 / 99

A

A. ext-agg-2

361
Q

What is a valid hierarchical structure in the Isilon Job Engine v2.0?

A. Jobs contain phases
B. Tasks contain phases
C. Tasks contain jobs
D. Items contain tasks

A

A. Jobs contain phases

362
Q

What security settings are used to calculate effective permissions for Windows clients when
accessing a Windows share?

A. Combination of share permissions File or folder ACL
B. Combination of local security policies File or folder ACL
C. Combination of share permissions only
D. Windows group policy settings only

A

A. Combination of share permissions File or folder ACL

363
Q

What is the minimum number of H400 nodes with OneFS 8.2.0 required to create a new Dell
PowerScale cluster?

A. 3
B. 4
C. 5
D. 6

364
Q

A storage administrator has configured two SmartConnect zones on an Isilon cluster labeled ZoneA
and ZoneB. Source-Based Routing has been enabled on the cluster.
How will the outgoing network packets from the cluster be routed back to the requesting IP?

A. Both zones will use the source IP to route the packets.
B. Both zones will use the highest priority default gateway.
C. ZoneB will route all packets through ZoneA.
D. ZoneA will route all packets through ZoneB.

A

A. Both zones will use the source IP to route the packets.

365
Q

What is the state of the source data when a failover to the target cluster has been completed?

A. Read only
B. Read/Write
C. Files marked as locked by One FS
D. Retention rules are applied

A

B. Read/Write

366
Q

A Dell EMC Isilon administrator wants to configure SnapshotIQ for optimal efficiency for writes after
a change is made.
Which information should be provided to the administrator?
72 / 99

A. Redirect on Write should always be used
B. Optimizing writes is configurable through sysctl
C. Copy on Write should always be used
D. OneFS optimizes writes by default

A

D. OneFS optimizes writes by default

367
Q

A storage administrator is planning to perform a node firmware update on an EMC Isilon cluster.
What should you do before installing a new firmware package?

A. Remove any previously installed firmware package
B. Remove any previously installed drive firmware
C. Reboot each node before updating the firmware
D. Remove any previously installed node firmware

A

A. Remove any previously installed firmware package

368
Q

A Dell PowerScale OneFS administrator wants to perform a HealthCheck evaluation.
Which command should they use?

A. isi services healthcheck
B. isi monitor healthcheck
C. isi healthcheck run
D. isi healthcheck schedules

A

C. isi healthcheck run

369
Q

How many Dell EMC Isilon clusters are supported on a single pair of back-end InfiniBand or
Ethernet switches?

A. 1
B. 2
C. 3
D. 4

370
Q

A storage administrator needs to enable FTP service on an Isilon cluster to allow internal customers
to upload files to the company. However, the administrator does not want to create individual user names
and passwords for each internal customer.

A. Configure LDAP to support anonymous access
B. Enable FTP server-to-server transfers
C. Enable FTP anonymous access
D. Configure Active Directory to support anonymous access

A

C. Enable FTP anonymous access

371
Q

A storage administrator is migrating existing Microsoft Windows file data to an Isilon cluster. The
administrator discovered that two servers are using the same share name in the environment.
Which access zone feature will help in implementing this migration?

A. Each SMB share can be represented with a unique name
B. Each NFS export can be represented with a unique name
73 / 99

C. Each access zone will contain all available SMB shares by default
D. Each access zone will contain all available authentication providers by default

A

A. Each SMB share can be represented with a unique name

372
Q

What is the recommended best practice when setting snapshot deletion schedules?

A. Determined by your RTO and RPO SLAs
B. Set to six times the length of the snapshot policy period
C. Set to delete after the next snapshot is taken
D. Set to one year after the snapshot is taken

A

A. Determined by your RTO and RPO SLAs

373
Q

A company wishes to test automated fail back between two EMC Isilon clusters.
What requirements must be met before the test can occur?

A. The same version of OneFS must be running on source and target clusters
B. The same number of network connections must exist on source and target clusters
C. Both clusters must be running OneFS version 7.0 or greater
D. Both clusters must have exactly the same type and number of nodes

A

C. Both clusters must be running OneFS version 7.0 or greater

374
Q

A company has completed DR testing and wishes to quickly reset a cluster via SyncIQ failback for
SmartLock directories.
What is the quickest way to return a node or group of nodes to an unconfigured state?

A. si_reformat_node
B. Reformat the nodes with a USB stick
C. isi config
»> shutdown all
D. SmartFail the nodes out individually

A

A. si_reformat_node

375
Q

When using the same Active Directory domain for multiple access zones on an Isilon cluster, which
configuration must be considered?

A. Each access zone requires a unique Active Directory domain
B. All configured access zones will use the system zone’s configured Active Directory domain
C. Each individual access zone must be configured with the Active Directory domain
D. Each access zone must be configured using the same Smart Connect zone and pool

A

C. Each individual access zone must be configured with the Active Directory domain

376
Q

Which RBAC role is required for an administrator to assign other administrators, roles, and
priviledges?

A. SecurityAdmin
B. AuditAdmin
C. SystemAdmin
D. BackupAdmin

A

A. SecurityAdmin

377
Q

Where is the boot drive located on a Dell PowerScale Gen 6 node?

A. Cache SSD at the back of the node
B. Bootflash drive inside the node
C. Data drives of the node
D. Mirrored journal drive

A

C. Data drives of the node

378
Q

Which OneFS 8.0 feature can be added to an NFSv4 export to assist with seamless failover in the
event of a disconnect?

A. Transparent failover
B. Stateless connection
C. Stateful connection
D. Continuous availability

A

C. Stateful connection

379
Q

What NIC ports could be used in a valid NIC aggregation configuration?

A. ext-1, ext-2, ext-3, and ext-4
B. ext-1, ext-2, 10gige-1, and 10gige-2
C. ext-1 and 10gige-1 only
D. 10gige-1, 10gige-2, 10gige-3, and 10gige-4

A

A. ext-1, ext-2, ext-3, and ext-4

380
Q

What is the minimum number of SSIPs required for an EMC Isilon cluster?

A. 1 per cluster
B. 1 per pool
C. 1 per subnet
D. 1 per node

A

A. 1 per cluster

381
Q

An administrator wants to configure antivirus scanning on an Isilon cluster.
What is the best way to accomplish this task?

A. Isilon web administration interface => Data Protection => Antivirus, and then click “Add an ICAP
Server”.
B. Install the antivirus client on all nodes in the cluster.
C. Install the antivirus client on the logical node number in the cluster.
D. Isilon web administration interface => Data Protection, and then click “Install Antivirus Client”.

A

A. Isilon web administration interface => Data Protection => Antivirus, and then click “Add an ICAP

382
Q

A customer has created multiple file pool policies on their cluster. Many of the file pool policies
include the same filtering criteria.
What determines which file pool policy is applied to the file?

A. The first matching policy in top-down order
B. The first matching policy in bottom-up order
75 / 99

C. File name matches are applied first, followed by File location matches
D. File time matches are applied first, followed by File name matches

A

A. The first matching policy in top-down order

383
Q

An RHEL client is connecting to an EMC Isilon cluster using NFSv3.
How is client response traffic routed out of the cluster?

A. Highest priority gateway
B. 1 GigE NICs on node with highest LNN
C. 10 GigE NICs on node with lowest node ID
D. Lowest priority gateway

A

A. Highest priority gateway

384
Q

A company has a Dell PowerScale cluster with Gen 6 nodes. Due to performance issues, they have
added four H400 nodes and created a new node pool. The administrator wants to enable metadata
read/write acceleration for the SSDs.
However, they are not able to do so.
What is the reason for this issue?

A. L3 cache is enabled on the new node pool and uses all SSDs
B. L3 cache is disabled on the new node pool; therefore, acceleration is not available
C. Metadata read/write acceleration needs to be enabled in the CLI
D. Only metadata read acceleration is supported with Gen 6 H400 nodes

A

A. L3 cache is enabled on the new node pool and uses all SSDs

385
Q

Refer to the exhibit:

A storage administrator has an Isilon cluster with the following:
- Five S210 nodes
- Eight X200 nodes
- Eight NL400 nodes
The cluster default protection level is set to N+2n and the administrator has configured the listed file pool
policies. A video capture station saves a new file to /ifs/content/ project as intro.mov.
Which node pool is the intro.mov file written to and which protection level is applied?

A. NL400_Pool at N+3n protection
B. S210 _Pool at N+2n protection
C. X200_Pool at N+2n protection
D. X200_Pool at N+3n protection
76 / 99

A

A. NL400_Pool at N+3n protection

386
Q

Before deploying a new EMC Isilon cluster you decide to confirm the details of the installation with
the customer. The customer would like to make a change to the subnet pools in the configuration guide.
What should you do first?

A. Contact the design team
B. Update the configuration guide
C. Contact EMC change control
D. Collect system configuration

A

A. Contact the design team

387
Q

What is the first step to perform a DR failover test?

A. Allow client writes to target SyncIQ policy paths
B. Run a final incremental sync on each policy failing over
C. Take a snapshot of each policy’s root path that is being failed over
D. Make the source paths of SyncIQ policies unavailable to client writes

A

D. Make the source paths of SyncIQ policies unavailable to client writes

388
Q

An Isilon administrator needs to create a new Isilon cluster to support high performance and large
capacity storage for a streaming media environment.
Which node model is recommended?

A. HD-Series
B. NL-Series
C. S-Series
D. X-Series

A

D. X-Series

389
Q

A storage administrator has just configured a newly acquired Isilon cluster. The administrator
connected to the console port of Node 1 and created subnets, pools, and two access zones called “Blue”
and “Green”.
The administrator then created shares in zone “Blue” and is able to access the shares from their
Microsoft Windows clients. In addition, the administrator created exports in the “Green” zone and is able
to access the exports from their UNIX clients.
However, the administrator is unable to SSH into the cluster and login as root.
What is a possible cause for this issue?

A. No interfaces exist in the System zone
B. No authentication providers are defined in the “Blue” and “Green” access zones
C. No failover address was configured for the InfiniBand network
D. A local user “root” needs to be created

A

A. No interfaces exist in the System zone

390
Q

You are deploying an EMC Isilon system using one dynamic Smart Connect pool.
How many IP addresses are recommended for a cluster with 10 nodes, of which only 6 nodes participate
in the pool?
77 / 99

A. 6
B. 10
C. 30
D. 90

391
Q

When enabling mount access to subdirectories, what can the user do?

A. Read and write files in the parent directory
B. Red files in the parent directory
C. Browse the directories in the parent directory
D. Directly mount a subdirectory of the export

A

D. Directly mount a subdirectory of the export

392
Q

When using an X410 node containing HDDs and SSDs, which bay numbers are used to contain
SSDs in the standard configurations?

A. Bays 1 and 2 only.
B. Bays 1 through 6.
C. Bays 31 through 36.
D. Bays 35 and 36 only.

A

B. Bays 1 through 6.

393
Q

One FS version 8.0 supports how many NFS exports?

A. 1,000
B. 10,000
C. 25,000
D. 40,000

394
Q

What accurately describes the behavior of On Disk Identity set to native on an Isilon cluster?

A. A file will be owned by a user’s real SID if no real UID exists for that user.
B. All files in shares can only be owned by a SID.
C. All files in exports can only be owned by a UID.
D. User identities must be defined through external authentication providers.

A

A. A file will be owned by a user’s real SID if no real UID exists for that user.

395
Q

Which task requires preparation for successful failover?

A. Creating shares and exports on the target cluster
B. Using the same cluster name and IP address for source and target
C. Breaking the target associations of SyncIQ policies
D. Testing each SyncIQ policy to prepare resync policies

A

A. Creating shares and exports on the target cluster

396
Q

How are events communicated from the CELOG daemon?

A. Sent using SNMP only
78 / 99

B. Sent by the CELOG notifications service
C. Sent over ESRS only
D. Sent by the MCP

A

B. Sent by the CELOG notifications service

397
Q

A customer wants to test the failover and fail back capabilities of their SmartLock directories using
SyncIQ.
What should you advise the customer?

A. Failover is a one-way event with SmartLock directories
B. Fail back is supported with SmartLock directories
C. Committed files on the target can be replicated back to the original source directories
D. SyncIQ can revert SmartLock directories on the source cluster

A

A. Failover is a one-way event with SmartLock directories

398
Q

In OneFS 8.2.0, how many snapshots are supported at the cluster and directory levels?

A. 20,000 and 1000
B. 20,000 and 1024
C. 40,000 and 2000
D. 40,000 and 2048

A

A. 20,000 and 1000

399
Q

If an Isilon has been integrated into an existing Hadoop environment, what explains how the HDFS
data will be distributed?

A. HDFS data on Isilon and computations will be handled by Hadoop
B. HDFS data remains on Hadoop; computations is handled by Isilon
C. Files are stored in a specialized HDFS compatible file system format on the Isilon cluster
D. MapReduce on the Isilon allows data to be distributed across both platforms

A

A. HDFS data on Isilon and computations will be handled by Hadoop

400
Q

What are the ways in which a FlexProtect job can start in a Dell EMC Isilon environment?

A. Using a batch command and event driven
B. Using a batch command and manually driven
C. Administrative and event driven
D. Non-event driven and unscheduled

A

C. Administrative and event driven

401
Q

What is the maximum audit log size in Isilon OneFS before rolling over to a new file?

A. 512 MB
B. 1 GB
C. 2 GB
D. 4 GB

402
Q

You have been tasked with creating file pool policies for a customer as part of the configuration
79 / 99

document. The file criteria indicate that directories that have not changed for over 60 days should be
moved to the archive tier.
What file pool policy filter types should you select?

A. File type and mtime
B. Filename and atime
C. File type and atime
D. Filename and mtime

A

A. File type and mtime

403
Q

What are the On-Disk Identity types that appear in the web administration interface?

A. SID, UNIX, and Native
B. GUID, UID/GID, and Mixed
C. AD, LDAP, and NIS
D. SMB, NFS, and Mixed

A

A. SID, UNIX, and Native

404
Q

Recently a Dell EMC Isilon cluster was upgraded from version 7.2.0.1 to version 8.0.1.0.
What was included in this upgrade?

A. Major change in functionality in the same family and theme
B. Code patches and firmware revisions only
C. Code patches and minor functionality enhancements only
D. Major changes and potential core modifications to the OS and data structures

A

D. Major changes and potential core modifications to the OS and data structures

405
Q

What is the difference between dynamic and static link aggregation?

A. Dynamic link aggregation can be configured with the web administration interface.
Static link aggregation only supports CLI configurations.
B. Dynamic link aggregation negotiates with the switch on the aggregation settings.
Static link aggregation does not facilitate the negotiation.
C. Dynamic link aggregation balances the frames across the aggregated interfaces.
Static link aggregation can only failover across the links.
D. Dynamic link aggregation supports Round Robin and FEC aggregation modes.
Static link aggregation supports Failover and LACP modes.

A

B. Dynamic link aggregation negotiates with the switch on the aggregation settings.

406
Q

Users are receiving notification they are out of space even though when they calculate their file
usage, they should have 20% to 30% more space still available.
What is the probable explanation?

A. The quotas are set to include protection overhead
B. The group usage is included with their user quota
C. Snapshot data has not been deleted
D. Deleted files have not been removed from their quota

A

A. The quotas are set to include protection overhead

407
Q

What is a valid simultaneous job combination on an Isilon Engine v2.0?

A. One Restripe job, one Mark job, and one All-Other job
B. One Restripe job, one All-Other job and one Multiscan job
C. One Restripe job and two Mark jobs
D. Two Restripe jobs and one All-Other job

A

A. One Restripe job, one Mark job, and one All-Other job

408
Q

What are the access layers in EMC Isilon clusters?

A. Protocol, Authentication, Identity Assignment, and Permissions
B. Physical, Network, Transport, and Session
C. Network, Authentication, Identity Assignment, and Permissions
D. Physical, Network, Transport, and Application

A

A. Protocol, Authentication, Identity Assignment, and Permissions

409
Q

What is a reason why Isilon NAS solutions work effectively with Big Data workflows?

A. Functions as a single repository of data
B. Functions as single block-based storage
C. Functions as a scale-up solution
D. Provides multiple aggregates of volumes

A

A. Functions as a single repository of data

410
Q

Which feature of the SMB protocol can be tuned to prevent clients from monopolizing EMC Isilon
cluster resources?

A. Oplocks
B. Change control
C. Packet signing
D. Credit limits

A

D. Credit limits

411
Q

What is the maximum number of H400 nodes that can be added to a node pool in a Dell
PowerScale cluster running OneFS 8.2?

A. 144
B. 252
C. 288
D. 352

412
Q

What is the maximum number of concurrent active connections that Swift can support, per node?

A. 50
B. 100
C. 150
D. 200

413
Q

When creating an SMB share on a Dell EMC Isilon cluster, what should the “Directory ACLs” setting
be if adding a new share to an existing directory structure?

A. Do not change existing permissions
B. Apply Windows Default ACLs
C. Allow Variable Expansion
D. Auto-Create Directories

A

B. Apply Windows Default ACLs

414
Q

On the Isilon cluster CLI, which command will display the most active nodes every two seconds,
from highest to lowest?

A. isi statistics system –top –nodes –interval=2
B. isi alert list –newest=2 –nodes=all
C. isi devices -a status -d 2
D. isi_for_array -s isi status

A

A. isi statistics system –top –nodes –interval=2

415
Q

A Dell EMC Isilon customer is using the CloudPool feature to tier some old data to the Microsoft
Azure cloud. At the same time, they are using SyncIQ replication to replicate to a disaster recovery (DR)
cluster.
What accurately describes this implementation?

A. SyncIQ replicates POSIX mode bit permissions along with quota information to the DR cluster
B. Files stored in the cloud can be read directly from the cloud without any Isilon intervention
C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR
cluster
D. SyncIQ replicates file and directory permissions of files and directories to the DR cluster

A

C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR

416
Q

In an Isilon Gen 6 cluster, what is the minimum number of nodes required to upgrade an existing
H500 cluster using A2000 nodes?

A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes

A

D. 4 nodes

417
Q

What is required to enable Secure NFS on an Isilon cluster?

A. Services for NFS must be configured in the AD environment
B. LDAP must be configured in the system access zone
C. NFS access must use static address pools
D. Cluster must be configured to use NTP

A

A. Services for NFS must be configured in the AD environment

418
Q

A systems administrator is planning an extension of a Dell PowerScale Gen 6 cluster. They are
asked to provide redundancy at the chassis level. The node pool protection level is +2d:1n.
82 / 99

What is the minimum number of nodes required to ensure that data is not lost when cycling power to a
single chassis?

A. 20
B. 22
C. 40
D. 42

419
Q

Which data access pattern makes the prefetch caching algorithm to be highly aggressive?

A. Random
B. Parallel
C. Concurrency
D. Streaming

A

D. Streaming

420
Q

After operating an EMC Isilon 3-node cluster for some time, a customer notices that the amount of
storage used seems significantly larger that it should be.
The filesystem has a tremendous amount of small (<128K) files and the protection level is N+2d:1n. The
customer does not want to sacrifice data protection.
What should be done to increase available capacity?

A. Nothing
B. Defragment the disks
C. Compress the small files
D. Change protection to 2x mirroring

A

A. Nothing

421
Q

You are creating an A record in DNS for client connections.
Which IP should you use?

A. SmartConnect Service IP
B. IP from a dynamic pool
C. SmartConnect zone IP
D. IP from a static pool

A

A. SmartConnect Service IP

422
Q

Which identity type is an example of a primary identifier?

A. SID
B. MPIO
C. Username
D. PID

423
Q

You are configuring DNS to work with SmartConnect zones.
What is the best practice recommendation to the customer?

A. Set TTL on NS records to zero
83 / 99

B. Use Linux-based DNS
C. Use Windows-based DNS
D. Set TTL on A records to zero

A

A. Set TTL on NS records to zero

424
Q

When using SyncIQ on an Isilon cluster, which setting is used to retain deleted files on the target?

A. Copy
B. Synchronize
C. –target-compare-initial sync on the CLI command option
D. Capture snapshots on the target cluster

425
Q

What is one requirement to join multiple authentication sources through an access zone?

A. Must belong to only the joined access zone
B. Must use a common /ifs tree for all access zones
C. Must belong to all access zones
D. Must only join AD domains in the same forest

A

A. Must belong to only the joined access zone

426
Q

An Isilon storage administrator has created a 500 GB quota on a new directory called `/ifs/homedirs’.
The administrator then begins migrating files from a Linux server through NFS to the new directory.
The migration tool returns a “Disk quota exceeded” error and fails to complete after approximately 400
GB of files are copied to the Isilon cluster. However, the cluster is reporting 10 TB of unused capacity.
What is the most likely cause for this error?

A. Hard quota includes overhead
B. SmartPool tier capacity has been exceeded
C. Soft quotas have been exceeded
D. Only the root can exceed 80% of quota

A

A. Hard quota includes overhead

427
Q

What authentication providers are supported on EMC Isilon clusters?

A. NT, NIS, Open LDAP, Open ID, and Local
B. AD, LDAP, NIS, Local, and File
C. AD, LDAP, NIS, Local, and Workgroup
D. Windows, UNIX, Hadoop, Open Stack, and MAC OSX

A

B. AD, LDAP, NIS, Local, and File

428
Q

What is the size of a data stripe unit in KB?

A. 8
B. 64
C. 128
D. 256

429
Q

In a Dell EMC Isilon environment, which protocol supports source-based routing (SBR)?

A. IPv4
B. SMBv2
C. IPv6
D. NFSv3

430
Q

If an RHEL client is connecting to an Isilon cluster using NFSv3 and SBR is disabled, where does
client response traffic move out of the cluster?

A. Highest logical node
B. Highest priority gateway
C. Lowest priority gateway
D. Lowest logical node

A

C. Lowest priority gateway

431
Q

Which protocol does Isilon InsightIQ use when accessing its remote datastore?

A. NFS
B. SMB
C. SCSI
D. FTP

432
Q

Which type of deduplication is performed by a Dell EMC Isilon cluster?

A. Content Level
B. File and Block Level
C. Block Level only
D. File Level only

A

D. File Level only

433
Q

What information must be generated to access a Dell PowerScale OneFS S3 bucket using an S3
application?

A. Secret key only
B. Access token and secret key
C. Access token and access ID
D. Access ID and secret key

A

D. Access ID and secret key

434
Q

Which jobs are used to help distribute file data across an Isilon cluster?

A. Media Scan, Collect, and AV Scan
B. Auto Balance, Auto Balance Lin, and Smart Pools
C. Auto Balance, Integrity Scan, and Multi Scan
D. Integrity Scan, Tree Delete, and Auto Balance

A

B. Auto Balance, Auto Balance Lin, and Smart Pools

435
Q

An Isilon storage administrator obtained three X-Series nodes and two S-Series nodes for one
cluster.
What would be the status of the cluster?

A. A cluster could be formed with all nodes online and writeable.
B. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would be
offline.
C. A cluster could not be formed until an S-Series node is added.
D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would
remain in read-only mode.

A

D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would

436
Q

After configuring a new NTP server in the Active Directory (AD) environment, the Microsoft Windows
clients receive authentication failures and cannot connect to the Dell PowerScale cluster.
What key condition should the administrator verify?

A. Windows clients can connect to the NTP server
B. Cluster time is synchronized with the Windows clients
C. Windows clients can connect to other servers
D. Cluster time is synchronized with the AD time

A

D. Cluster time is synchronized with the AD time

437
Q

An EMC Isilon cluster is being configured for a Media and Entertainment customer. The customer’s
workflow consists primarily of video playback, requiring a very aggressive prefetch.
What data layout access pattern is appropriate?

A. Streaming
B. Concurrency
C. Random
D. Default

A

A. Streaming

438
Q

What is the correct hierarchy of the Job elements structure?

Answer:
86 / 99

440.Which Isilon global cluster settings are managed by Smart Pools?

A. L2 Cache, GNS, and VHS
B. L3 Cache, GNA, and VHS
C. L3 Cache, L2 Cache, and GNS
D. L1 Cache, GNA, and VHS

A

B. L3 Cache, GNA, and VHS

439
Q

The exhibit shows the components of a conventional Hadoop environment.

Which component holds the location information for every file in the cluster?

A. Name Node: Can comprise one or two physical servers.
B. Compute: A logical component which runs on each node.
C. Data: A physical component distributed across the cluster.
D. 3X mirror: The first three nodes in the cluster configured as a 3X mirror.

A

A. Name Node: Can comprise one or two physical servers.

440
Q

A Dell PowerScale administrator needs to secure data access with an appropriate Kerberos-based
authentication provider in a non-System zone. The configuration requires balancing connections across
the IP address pool.
What should be configured?

A. Access zones only
B. SmartConnect zones and access zones
C. SmartConnect zones only
D. SmartConnect zones and SmartConnect zone aliases

A

B. SmartConnect zones and access zones

441
Q

Refer to the exhibit.

Which port is used to attach the node to the internal network?

A. 1
B. 2
C. 3
D. 4

442
Q

What is a characteristic of dynamic pools?

A. Can allocate more than one IP per NIC port in the pool
B. Must have the same number of IPs in the range as NIC ports in the pool
C. If a node fails, will fail over the IPs in a pool to the node with the lowest LNN
D. Will force the IPs to stay with the same NIC port, even if a node fails

A

A. Can allocate more than one IP per NIC port in the pool

443
Q

A customer has recently learned about the Dell EMC Isilon Data Lake feature and purchased an
Isilon cluster for use with their Hadoop application.
88 / 99

Which components of a Hadoop cluster will be provided by Isilon?

A. NameNode and DataNode only
B. NameNode and ComputeNode only
C. NameNode, DataNode, and ComputeNode
D. DataNode and ComputeNode only

A

A. NameNode and DataNode only

444
Q

Which role-based privilege must be granted to a user before they are allowed to log into the web
administration interface?

A. ISI_PRIV_AUTH
B. ISI_PRIV_LOGIN_PAPI
C. ISI_PRIV_CLUSTER
D. ISI_PRIV_LOGIN_CONSOLE

A

A. ISI_PRIV_AUTH

445
Q

An EMC Isilon administrator is attempting to limit disk usage and control the visible capacity of a
share to SMB clients.
Which quota type gives the administrator this ability?

A. Hard quota on Directory
B. Hard quota on Group
C. Soft quota on Directory
D. Soft quota on User

A

A. Hard quota on Directory

446
Q

Which OneFS 8.0 feature is incompatible with Swift?

A. SyncIQ
B. Auditing
C. Smart Connect
D. Dedupe

A

B. Auditing

447
Q

While troubleshooting an access issue, an administrator receives the isi auth mapping list output
from the Dell PowerScale cluster.
The corresponding SID is found within the following line:
[“ZID:2”, “SID:S-1-5-21-2391006495-4839401849-419739012-5522”, [[“UID:3000001”, 144]]]
What can the administrator determine from this output?

A. Mapping is done in the System access zone and both identities are real
B. Mapping is done in a non-System access zone and both identities are real
C. Mapping is done in a non-System access zone and SID is the real identity
D. Mapping is done in the System access zone and SID is the real identity

A

B. Mapping is done in a non-System access zone and both identities are real

448
Q

A company has decided that Compliance Mode will not work for them.
Which method is required to reset an EMC Isilon cluster from Compliance mode to a standard EMC
89 / 99

Isilon cluster?

A. Use isi_reformat_node to reset each node
B. Use a USB stick to re-image each node
C. Use isi_config
»> reboot all
D. Upgrade the cluster

A

B. Use a USB stick to re-image each node

449
Q

When creating an SMB share on the Isilon cluster, what is the effect of selecting the “Apply Windows
Default ACLs”?

A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory
automatically created.
B. File permissions are automatically set to be the same as the share permissions.
C. Share permissions’ configuration is no longer required as it too will be set to the default values.
D. Ownership of all files in the directory will be set to the default user’s SID.

A

A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory

450
Q

Which mechanisms can provide real time notification of Isilon events?

A. ESRS, SNMP traps, and SMTP
B. SupportlQ, isi statistics, and SNMP polling
C. isi_gather_info, SNMP set, and SupportIQ
D. SNMP traps, SNMP set, and SNMP polling

A

A. ESRS, SNMP traps, and SMTP

451
Q

Which Isilon protection setting will require the least percentage of overhead for a 1024 KB file?

A. N+3d:1n in a 5-node node pool
B. N+2d:1n in a 4-node node pool
C. N+1n in a d-node node pool
D. N+2n in a 10-node node pool

A

D. N+2n in a 10-node node pool

452
Q

What are the considerations when a NANON configuration is used?

A. Increase frontend I/O ports and aggregated cache.
B. Increases capacity and aggregated cache.
C. Increases frontend network ports and capacity.
D. Increases bandwidth inside the cluster and GbE links.

A

C. Increases frontend network ports and capacity.

453
Q

What event notification options are available when setting up an Isilon cluster in an SNMP-managed
environment?

A. HTTPS and IMAP
B. SNMP and HTTP
C. SMTP and SNMP
D. SMTP and HTTP
90 / 99

A

C. SMTP and SNMP

454
Q

What can be done to add more nodes to an Isilon cluster that has run out of backend switch ports?

A. Migrate to larger switches
B. Daisy chain new nodes from existing nodes
C. Daisy chain new switches from existing switches
D. Deploy a new cluster

A

A. Migrate to larger switches

455
Q

What information is required to configure the LDAP service on a Dell PowerScale cluster?

A. Port number, cluster name, and an LDAP server IP address
B. Base distinguished name, LDAP provider name, and at least one LDAP server
C. Base distinguished name, cluster name, and port number
D. Administrator account and password, and LDAP provider name, and LDAP provider IP address

A

B. Base distinguished name, LDAP provider name, and at least one LDAP server

456
Q

How many drives are used, per node, with the requested protection represented as N+3n?

A. 1
B. 2
C. 3
D. The value of n

457
Q

Which command provides information about the current operational situation of the cluster, events,
and jobs?

A. isi status
B. isi devices
C. isi events
D. isi services

A

A. isi status

458
Q

What is an advantage of an EMC Isilon cluster using a switched star network for backend
connectivity?

A. Each node in the cluster is one hop away from any other node
B. Each node is able to load balance its I/O across the entire cluster
C. Additional switches can be daisy chained to existing switches
D. The internal network can be used for more than intra-cluster communication

A

A. Each node in the cluster is one hop away from any other node

459
Q

Which use case is a good candidate for SmartDedupe?

A. Large number of files on a single node pool
B. Large number of files across different node pools
C. Files with duplicate blocks contained within them
D. Files that are smaller than 32 K
91 / 99

A

A. Large number of files on a single node pool

460
Q

For what purpose is quota management an important consideration on both source and target
clusters?

A. SyncIQ copy policies
B. SyncIQ sync policies
C. SyncIQ initial sync compare
D. Failover and fail back

A

D. Failover and fail back

461
Q

A customer is examining their CELOG events on their OneFS 7.2 cluster and identifies an event
indicating one of their node pools is underprotected.
What is the most likely cause of the CELOG event?

A. Additional nodes were added to the cluster
B. One or more of their nodes are offline
C. The OneFS version on the cluster was recently upgraded
D. The Default file pool policy requested protection level was modified

A

A. Additional nodes were added to the cluster

462
Q

A systems administrator has a Dell PowerScale cluster with four A2000 nodes in their environment.
The protection setting is 2d:1n at the node pool level. Billions of very small image files, each less than 50
KB in size, are stored on the cluster. The node pool is now approaching full capacity.
However, the cumulative size of the files copied appears to be less.
What is a possible reason?

A. Small files are stored with 4x mirror protection and consuming more capacity
B. Metadata for billions of files is consuming most of the capacity
C. Small files are stored with triple mirror protection and consuming more capacity
D. Small files are spread across all disk pools, causing greater capacity consumption

A

C. Small files are stored with triple mirror protection and consuming more capacity

463
Q

What is a characteristic of Data Protection Advisor (DPA) cluster implementation?

A. Multiple cluster instances are not supported
B. A cluster can span different subnets
C. All DPA Database nodes must be configured for clustering
D. DPA cluster can have a mix of standalone and clustered application nodes

A

A. Multiple cluster instances are not supported

464
Q

What is the name of the default access zone in an EMC Isilon cluster?

A. System zone
B. Static zone
C. Dynamic zone
D. Configuration zone

A

A. System zone

465
Q

An Isilon administrator restored an individual user’s 30-day snapshot of a directory. However, that
individual has now left the company.
What must be done to allow another user to access data inside this directory?

A. ACL permission must be updated or changed for the directory or file
B. ACL permissions are automatically restored matching the new user
C. Mode bits on the restored directory are automatically rwxr-xr– for the new user
D. Mode bits on the restored directory are automatically r-xr-xr– for the new user

A

A. ACL permission must be updated or changed for the directory or file

466
Q

You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
Which tool can be used to connect to and initially configure a cluster?

A. PuTTY
B. PLink
C. WinSCP
D. Telnet

467
Q

How many concurrent jobs can the Job Engine run?

A. 2
B. 3
C. 4
D. 5

468
Q

What is a characteristic of access tokens on an Isilon cluster?

A. Can only contain UIDs defined in the LDAP authentication provider
B. May contain supplemental groups inserted through use mapping rules
C. Updated when the cluster joins the Active Directory
D. Dynamic after initial creation of the access token

A

B. May contain supplemental groups inserted through use mapping rules

469
Q

A company has an Isilon cluster that is joined to an Active Directory (AD) domain. Previously, the
company replaced their primary NTP server and added new NTP settings to the Isilon cluster. Now the
users are experiencing authentication failures.
What is a possible reason for this behavior?

A. Cluster and the AD are configured to use the same NTP server.
B. AD is not configured to synchronize its time from the cluster.
C. SMB time is not configured on the cluster to synchronize with the AD.
D. Time between the NTP and the AD differentiates by more than 5 minutes.

A

D. Time between the NTP and the AD differentiates by more than 5 minutes.

470
Q

What type of zone does SyncIQ require?

A. Default
B. Dynamic only
93 / 99

C. Static only
D. Static or Dynamic

A

C. Static only

471
Q

Which protocol or daemon is responsible for handling authentication in OneFS?

A. lsassd
B. lwiod
C. AD
D. LDAP

472
Q

Which requirement must be met on an Isilon cluster to be able to enable node compatibility?

A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs.
B. New generation nodes must have less RAM than older generation nodes.
C. Minimum of three new generation nodes must be added to the existing node pool.
D. Any new generation node can be added to any older generation node pool.

A

A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs.

473
Q

What is the recommended networking design approach when planning subnets?

A. Use a common subnet for data, replication and backup, and use a dedicated subnet for management.
Assign the lowest priority gateway number for the management subnet.
B. Use a common subnet for management, data, replication and backup.
Assign a random priority gateway number for the subnet.
C. Use a common subnet for data and management and a common subnet for replication and backup.
Assign the lowest priority gateway number for the management subnet.
D. Use dedicated subnets for management, data, replication and backup.
Assign the lowest priority gateway number for the data subnet.

A

D. Use dedicated subnets for management, data, replication and backup.

474
Q

What is the file protection mechanism used with OneFS file striping?

A. Forward error correction
B. Redundant array of independent disks
C. Non-volatile random access memory
D. Drive controller mirroring

A

A. Forward error correction

475
Q

A customer is planning an Isilon deployment for use with their Hadoop environment.
What is one advantage of using Isilon as the HDFS layer in this instance?

A. Facilitates independent scaling of compute and storage nodes.
B. Provides single protocol access to data.
C. Integrates storage into Hadoop compute for more flexibility.
D. Allows the compute nodes to apply data protection.

A

A. Facilitates independent scaling of compute and storage nodes.

476
Q

You have been asked to design a NetWorker backup solution with the following two requirements:
- Leverage Microsoft SQL VDI backup AP
- Back up SQL database, transaction logs, and file groups
Which NetWorker module is recommended?

A. Power Snap
B. NMDA
C. Snap Image
D. NMM

477
Q

After enabling auditing on an EMC Isilon cluster, which configuration changes are tracked?

A. Changes made through PAPI system only
B. Changes made by a user in a shell only
C. Changes made by root in a shell only
D. Changes made by a batch file only

A

A. Changes made through PAPI system only

478
Q

In an Isilon environment, what is the total protection level offered by N+2:1?

A. Two drives or one node can fail without any data loss in the cluster.
B. Two hot spare drives and one cold spare drive are available for disk failures.
C. Two hot nodes and one cold node are available for node failures.
D. Two drives on one node can fail without causing any data loss in the cluster.

A

A. Two drives or one node can fail without any data loss in the cluster.

479
Q

Refer to the Graphic.

If you notice the symbol illuminated on the Dell EMC Isilon node’s compute module, what does this
indicate?

A. Unsafe to remove the compute module
B. Compute module is running a system check
C. Unsafe to reboot the compute module
D. Compute module has one or more faulty components

A

A. Unsafe to remove the compute module

480
Q

Several SyncIQ policies have been defined on an Isilon cluster and are in production on several
terabytes of data. The customer wishes to change the directory includes on one of the policies, but is
concerned about maintaining their RTO.
What will occur after the change is made?

A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data;
95 / 99

RTO may be affected
B. Policy changes are reflected in the next SyncIQ incremental run; RTO should be unaffected
C. If the directory includes are only new data, SyncIQ replicates the new data during the next
incremental synchronization; RTO may be affected
D. SyncIQ dynamically adjusts for policy changes; RTO will be unchanged

A

A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data;

481
Q

In an Isilon environment, the output of the isi get command on a file shows the level 6+2/2.
What does the “6” represent?

A. FEC stripe units per stripe
B. Mirrored copies per file
C. Data stripe units per stripe
D. Drive used per node

A

C. Data stripe units per stripe

482
Q

A node does not shut down properly during a systematic node shutdown process.
What is the proper way to restart a node in this state?

A. Run isi config
»> reboot
B. Power cycle the node
C. Run reboot from a shell
D. Run halt from a shell

A

A. Run isi config

483
Q

You are not able to delete a container using Swift.
What is the problem?

A. You are not logged in as root
B. Container is not empty
C. You need to be system administrator
D. Containers cannot be deleted

A

B. Container is not empty

484
Q

An administrator wants to enable quotas on a group directory in their Dell PowerScale cluster. In
addition, they want to monitor the disk usage for future capacity planning.
Which type of quotas need to be configured?

A. Accounting
B. Enforcement
C. Hard
D. Advisory

A

A. Accounting

485
Q

An Isilon storage administrator is attempting to manage an Isilon cluster using the web
administration interface. However, some configuration tabs are not displayed.
What is the most likely cause?
96 / 99

A. RBAC has been implemented
B. Some features have not been licensed
C. Access zones have been created
D. Administrator must log in as “compadmin”

A

A. RBAC has been implemented

486
Q

What accurately describes a characteristic of EMC OneFS protocol auditing?

A. Can be enabled on a per access zone basis
B. Cannot be enabled if the isi_audit_cee daemon is running
C. Requires syslog forwarding to also be configured
D. Can only audit for success, not failure

A

A. Can be enabled on a per access zone basis

487
Q

Which command provides an explanation of available isi commands?

A. isi events list
B. isi config –help
C. isi status
D. isi –help

A

D. isi –help

488
Q

Which license is required to retain historical or archival points for SyncIQ replication?

A. SnapshotIQ
B. SmartConnect
C. SmartPools
D. InsightIQ

A

A. SnapshotIQ

489
Q

When are file pool policy actions applied to files?

A. When a file is written for path-based filters after SmartPools job has run at least once
B. When a file is read for node pool location-based actions after the SmartPools job has run at least
once
C. When the SetProtectPlus job runs for clusters with multiple file pool policies
D. When a file is modified for the first time after the SetProtectPlus job has run at least once

A

A. When a file is written for path-based filters after SmartPools job has run at least once

490
Q

A customer is implementing two new clusters for DR using recommended best practices. SyncIQ will
be used for the filesystem failover and fail back operations. You have been asked to create the initial
filesystem structure for home directories for SMBv2.1 clients on both clusters.
Which directory structure should you use?

A. Source/ClusterA: /ifs/ClusterA/access_zone/home
Target/ClusterB: /ifs/ClusterA/access_zone/home
B. Source/ClusterA: /ifs/ClusterA/home
Target/ClusterB: /ifs/ClusterA/home
C. Source/ClusterA: /ifs/home
97 / 99

Target/ClusterB: /ifs/ClusterA/home
D. Source/ClusterA: /ifs/ClusterA/system_zone/home
Target/ClusterB: /ifs/sync/ClusterA/system_zone/home

A

A. Source/ClusterA: /ifs/ClusterA/access_zone/home

491
Q

For which IT solution is an Isilon NL-Series node best suited?

A. Internet Web 2.0 applications
B. Nearline archiving
C. Quantitative analysis
D. Hadoop workflows

A

C. Quantitative analysis

492
Q

Which protocols are access zone aware in OneFS 7.2?

A. SMB and NFS
B. SMB and FTP
C. NFS and HTTP
D. FTP and NFS

A

A. SMB and NFS

493
Q

What does Dell PowerScale OneFS use to simplify administration over traditional NAS solutions?

A. File System, Data Protection, and Volume Manager
B. Drive Partitioning, Volume Manager, and Data Protection
C. File Manager, Drive Partitioning, and Volume Manager
D. Volume Manager, File System, and Drive Partitioning

A

A. File System, Data Protection, and Volume Manager

494
Q

Which methods are used for managing jobs on an Isilon cluster?

A. Only through feature settings and the web administration interface
B. Only CLI and the web administration interface
C. PAPI, web administration interface, and through all feature settings
D. CLI, web administration interface, and through some feature settings

A

D. CLI, web administration interface, and through some feature settings

495
Q

When creating custom job schedules in a Dell PowerScale environment, what are the impact policy
settings?

A. HIGH, LOW, MEDIUM, and PAUSED
B. HIGH, LOW, MEDIUM, and OFF_HOURS
C. HIGH, LOW, PAUSED, and OFF_HOURS
D. JOB, PHASE, TASK, and ITEM

A

B. HIGH, LOW, MEDIUM, and OFF_HOURS

496
Q

What is the TLD of student.isilon.training.com?

A. isilon
B. com
98 / 99

C. training
D. student

497
Q

Which RBAC role(s) includes the admin user privileges?

A. Security Admin and System Admin
B. Security Admin only
C. System Admin and Audit Admin
D. System Admin only

A

A. Security Admin and System Admin

498
Q

What effect does enabling GNA on an Isilon node pool have for SSDs?

A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration
B. Allows SSDs in the same node pool as the data to be used for metadata read acceleration
C. Allows SSDs in all node pools to be used as L3 cache and shared between node pools
D. Enables cluster-wide read/write metadata acceleration utilizing all SSDs

A

A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration

499
Q

What is a recommended solution to back up a large number of desktops/laptops?

A. Protect Point
B. NetWorker
C. Data Domain
D. Avamar