201-300 Flashcards
(100 cards)
An EMC Isilon administrator configures the cluster’s ACL policy to Balanced.
After a file or folder on EMC Isilon has been given a Windows ACL, how are the UNIX mode bits
displayed for NFSv3-connected clients?
A. Evaluated and recalculated independently of the ACE
B. Evaluated and recalculated independently of the ACL
C. As an estimation of the effective permissions granted by the ACL
D. As an exact replica of Windows share-level permissions
C. As an estimation of the effective permissions granted by the ACL
What is the maximum number of nodes that can be added into a node pool in Isilon Gen 5 hardware
and OneFS 8.2.0?
A. 144
B. 252
C. 288
D. 352
A. 144
In an Isilon environment, which type of identity information is stored in an access token?
A. Primary and secondary identities
B. Group identities
C. Primary identities only
D. Mapped identities
A. Primary and secondary identities
A storage administrator is planning a firmware update on a cluster with 10 x NL400, 72 TB nodes.
The update will take place during a period of low activity.
Approximately how much time would the update of the cluster take?
A. 1 Hour and 40 minutes
B. 3 Hours and 20 minutes
C. 50 minutes
D. 2 hours and 30 minutes
A. 1 Hour and 40 minutes
What SSD strategy provides similar behavior as L3 cache?
A. Use SSDs for metadata read acceleration
B. Use SSDs for metadata read/write acceleration
C. Use SSDs for data and metadata
D. Avoid SSDs
A. Use SSDs for metadata read acceleration
After starting a SyncIQ failover disaster recovery test, the Dell PowerScale administrator is told to
cancel the test. Data on the target site has been modified.
What will happen to the modified data on the target site if the administrator reverts the failover
operation?
A. Reverted to the source site
B. Maintained
C. Discarded
D. Snapped and snap reverted
C. Discarded
An organization requires the ability to segregate various administrative rights.
Which EMC Isilon feature enables this functionality?
A. RBAC
B. SmartConnect
C. SmartLock
D. InsightIQ
A. RBAC
A systems administrator has assigned the following permissions to a set of directories:
POSIX 777 root:wheel /ifs
POSIX 755 root:wheel /ifs/boston
POSIX 750 root:wheel /ifs/boston/financ
Real ACL “DEES\finance” “Full Control” /ifs/boston/finance/payroll
Real ACL “DEES\finance” “Modify” /ifs/boston/finance/payroll/johndoe.xls
After the permissions change, a user from the “DEES\finance” group experienced access issues when
opening the johndoe.xls file.
Which action will help resolve this problem?
A. Make the “DEES\finance” “Full Control” privilege inheritable for /ifs/boston/finance/payroll
B. Add “DEES\finance” “Read” privilege to /ifs/boston/finance/payroll/johndoe.xls
C. chmod 755 /ifs/boston/finance
D. chmod 777 /ifs/boston
C. chmod 755 /ifs/boston/finance
Continuous Availability gives which version of SMB the ability to transparently fail over?
A. 1
B. 2.0
C. 3
D. 2.1
C. 3
A Dell EMC Isilon administrator has granted a user read-only permission at the share level. In
addition, the user has read/write permission from the Microsoft Windows ACLs.
What is the user’s effective permission on the share?
41 / 99
A. Read/write and modify
B. Read/write only
C. Read and modify
D. Read-only
D. Read-only
An Isilon cluster with three S210 nodes and three NL400 nodes was expanded to 18 nodes (15 x
S210, 3 x NL400). You have been asked to revise the data protection policy initially set to N+3d:1n while
optimizing the available writable disk space.
What is the recommended data protection strategy for each pool and will the data protection overhead
average increase or decrease?
A. S210 node pool changes to N+2d:1n
NL400 node pool changes to N+2d:1n
B. S210 node pool changes to N+2n
NL400 node pool remains N+3d:1n
C. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2d:1n
D. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2n
A. S210 node pool changes to N+2d:1n
What actions or features does SyncIQ provide with regard to DR failover and fail back?
A. Cluster preparation activities
B. Required networking changes
C. DNS changes
D. Client redirection
A. Cluster preparation activities
You are reviewing the Dell EMC Isilon Configuration Guide for file sizes and workflows.
Which tab in the Configuration Guide contains this information?
A. Topology
B. Design Intent
C. Extended
D. Core
B. Design Intent
In OneFS, what are valid identifiers when comparing an access token to file authorization data?
A. SID, UID, and GID
B. SID only
C. UID and GID only
D. File owner and SID only
A. SID, UID, and GID
In a Dell EMC Isilon environment, which aggregation mode is considered “dynamic”?
42 / 99
A. FEC
B. LACP
C. Round Robin
D. Active/Passive Failover
B. LACP
What can be modified in the subnet settings on an Isilon cluster?
A. VLAN ID
B. SmartConnect zone name
C. Interface membership
D. Access zone membership
A. VLAN ID
What is the default behavior when a UNIX NFSv3 client executes a chmod command when the EMC
Isilon ACL policy is configured as Windows only?
A. The UNIX client receives an error on the chmod request
B. The chmod request is granted and a corresponding Windows ACE is added into the file or folder’s
ACL
C. The existing Windows ACL is converted to UNIX security
D. The existing synthetic ACL is converted to a Windows ACL
A. The UNIX client receives an error on the chmod request
What is the target of a Dell PowerScale OneFS snapshot logical pointer?
A. Volume
B. Stripe
C. File system
D. Directory
D. Directory
What is the order of precedence for NFS export policies?
A. 1. Clients
2. Always RO clients
3. Always RW clients
4. Root clients
B. 1. Always RW clients
2. Always RO clients
3. Root clients
4. Clients
C. 1. Root clients
2. Always RW clients
3. Clients
4. Always RO clients
D. 1. Always RO clients
2. Root clients
43 / 99
- Clients
- Always RW clients
A. 1. Clients
A customer has configured a cluster in Compliance mode. The customer is only using Enterprise
SmartLock and non-WORM directories.
What mechanism is used to control the data retention expiration period?
A. System clock
B. Compliance clock
C. Autocommit period
D. Minimum retention period
A. System clock
Where are the compressed, on-disk audit logs located?
A. /var/log/node<#>/audit_protocol.log
B. /var/log/audit_config.log
C. /ifs/.ifsvar/audit/logs/node<#>/topic
D. /ifs/.ifsvar/audit/audit.log
C. /ifs/.ifsvar/audit/logs/node<#>/topic
Recently a new OneFS version was implemented on an EMC Isilon cluster to perform code patches
and minor functionality enhancements.
Which version upgrade is an example of this type of upgrade?
A. 7.2.0.0 -> 7.2.0.1
B. 7.0.2.8 -> 7.1.0.0
C. 7.1.1.3 -> 7.0.2.9
D. 6.5.5.7 -> 7.0.2.12
A. 7.2.0.0 -> 7.2.0.1
A Dell PowerScale administrator is retiring older nodes from their 60-node Gen 5 cluster. After
SmartFail is used on the 20 targeted nodes, the administrator is notified that data access is much slower.
However, they find no issues with the network bandwidth.
What is a possible reason for the slower access issue?
A. SSD total capacity dropped below 1.5%, disabling GNA automatically
B. SmartFail disabled the L3 cache and must be enabled manually
C. Manage I/O optimization settings were not re-enabled
D. SSDs are no longer used for SmartCache prefetching
A. SSD total capacity dropped below 1.5%, disabling GNA automatically
An Isilon administrator was unsuccessful when adding a new node to an existing Isilon cluster using
the Nodes LCD panel.
What is a possible cause?
A. Internal join mode has been set to ??secure??
B. Internal join mode has been set to ??manual??
44 / 99
C. Nodes can only be added through the console port
D. Nodes can only be added through the web administration interface
A. Internal join mode has been set to ??secure??