201-300 Flashcards

(100 cards)

1
Q

An EMC Isilon administrator configures the cluster’s ACL policy to Balanced.
After a file or folder on EMC Isilon has been given a Windows ACL, how are the UNIX mode bits
displayed for NFSv3-connected clients?

A. Evaluated and recalculated independently of the ACE
B. Evaluated and recalculated independently of the ACL
C. As an estimation of the effective permissions granted by the ACL
D. As an exact replica of Windows share-level permissions

A

C. As an estimation of the effective permissions granted by the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the maximum number of nodes that can be added into a node pool in Isilon Gen 5 hardware
and OneFS 8.2.0?

A. 144
B. 252
C. 288
D. 352

A

A. 144

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In an Isilon environment, which type of identity information is stored in an access token?

A. Primary and secondary identities
B. Group identities
C. Primary identities only
D. Mapped identities

A

A. Primary and secondary identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A storage administrator is planning a firmware update on a cluster with 10 x NL400, 72 TB nodes.
The update will take place during a period of low activity.
Approximately how much time would the update of the cluster take?

A. 1 Hour and 40 minutes
B. 3 Hours and 20 minutes
C. 50 minutes
D. 2 hours and 30 minutes

A

A. 1 Hour and 40 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What SSD strategy provides similar behavior as L3 cache?

A. Use SSDs for metadata read acceleration
B. Use SSDs for metadata read/write acceleration
C. Use SSDs for data and metadata
D. Avoid SSDs

A

A. Use SSDs for metadata read acceleration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After starting a SyncIQ failover disaster recovery test, the Dell PowerScale administrator is told to
cancel the test. Data on the target site has been modified.
What will happen to the modified data on the target site if the administrator reverts the failover
operation?

A. Reverted to the source site
B. Maintained
C. Discarded
D. Snapped and snap reverted

A

C. Discarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An organization requires the ability to segregate various administrative rights.
Which EMC Isilon feature enables this functionality?

A. RBAC
B. SmartConnect
C. SmartLock
D. InsightIQ

A

A. RBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator has assigned the following permissions to a set of directories:
POSIX 777 root:wheel /ifs
POSIX 755 root:wheel /ifs/boston
POSIX 750 root:wheel /ifs/boston/financ
Real ACL “DEES\finance” “Full Control” /ifs/boston/finance/payroll
Real ACL “DEES\finance” “Modify” /ifs/boston/finance/payroll/johndoe.xls
After the permissions change, a user from the “DEES\finance” group experienced access issues when
opening the johndoe.xls file.
Which action will help resolve this problem?

A. Make the “DEES\finance” “Full Control” privilege inheritable for /ifs/boston/finance/payroll
B. Add “DEES\finance” “Read” privilege to /ifs/boston/finance/payroll/johndoe.xls
C. chmod 755 /ifs/boston/finance
D. chmod 777 /ifs/boston

A

C. chmod 755 /ifs/boston/finance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Continuous Availability gives which version of SMB the ability to transparently fail over?

A. 1
B. 2.0
C. 3
D. 2.1

A

C. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Dell EMC Isilon administrator has granted a user read-only permission at the share level. In
addition, the user has read/write permission from the Microsoft Windows ACLs.
What is the user’s effective permission on the share?
41 / 99

A. Read/write and modify
B. Read/write only
C. Read and modify
D. Read-only

A

D. Read-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An Isilon cluster with three S210 nodes and three NL400 nodes was expanded to 18 nodes (15 x
S210, 3 x NL400). You have been asked to revise the data protection policy initially set to N+3d:1n while
optimizing the available writable disk space.
What is the recommended data protection strategy for each pool and will the data protection overhead
average increase or decrease?

A. S210 node pool changes to N+2d:1n
NL400 node pool changes to N+2d:1n
B. S210 node pool changes to N+2n
NL400 node pool remains N+3d:1n
C. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2d:1n
D. S210 node pool remains N+3d:1n
NL400 node pool changes to N+2n

A

A. S210 node pool changes to N+2d:1n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What actions or features does SyncIQ provide with regard to DR failover and fail back?

A. Cluster preparation activities
B. Required networking changes
C. DNS changes
D. Client redirection

A

A. Cluster preparation activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are reviewing the Dell EMC Isilon Configuration Guide for file sizes and workflows.
Which tab in the Configuration Guide contains this information?

A. Topology
B. Design Intent
C. Extended
D. Core

A

B. Design Intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In OneFS, what are valid identifiers when comparing an access token to file authorization data?

A. SID, UID, and GID
B. SID only
C. UID and GID only
D. File owner and SID only

A

A. SID, UID, and GID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a Dell EMC Isilon environment, which aggregation mode is considered “dynamic”?
42 / 99

A. FEC
B. LACP
C. Round Robin
D. Active/Passive Failover

A

B. LACP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be modified in the subnet settings on an Isilon cluster?

A. VLAN ID
B. SmartConnect zone name
C. Interface membership
D. Access zone membership

A

A. VLAN ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the default behavior when a UNIX NFSv3 client executes a chmod command when the EMC
Isilon ACL policy is configured as Windows only?

A. The UNIX client receives an error on the chmod request
B. The chmod request is granted and a corresponding Windows ACE is added into the file or folder’s
ACL
C. The existing Windows ACL is converted to UNIX security
D. The existing synthetic ACL is converted to a Windows ACL

A

A. The UNIX client receives an error on the chmod request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the target of a Dell PowerScale OneFS snapshot logical pointer?

A. Volume
B. Stripe
C. File system
D. Directory

A

D. Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the order of precedence for NFS export policies?

A. 1. Clients
2. Always RO clients
3. Always RW clients
4. Root clients
B. 1. Always RW clients
2. Always RO clients
3. Root clients
4. Clients
C. 1. Root clients
2. Always RW clients
3. Clients
4. Always RO clients
D. 1. Always RO clients
2. Root clients
43 / 99

  1. Clients
  2. Always RW clients
A

A. 1. Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A customer has configured a cluster in Compliance mode. The customer is only using Enterprise
SmartLock and non-WORM directories.
What mechanism is used to control the data retention expiration period?

A. System clock
B. Compliance clock
C. Autocommit period
D. Minimum retention period

A

A. System clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where are the compressed, on-disk audit logs located?

A. /var/log/node<#>/audit_protocol.log
B. /var/log/audit_config.log
C. /ifs/.ifsvar/audit/logs/node<#>/topic
D. /ifs/.ifsvar/audit/audit.log

A

C. /ifs/.ifsvar/audit/logs/node<#>/topic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Recently a new OneFS version was implemented on an EMC Isilon cluster to perform code patches
and minor functionality enhancements.
Which version upgrade is an example of this type of upgrade?

A. 7.2.0.0 -> 7.2.0.1
B. 7.0.2.8 -> 7.1.0.0
C. 7.1.1.3 -> 7.0.2.9
D. 6.5.5.7 -> 7.0.2.12

A

A. 7.2.0.0 -> 7.2.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Dell PowerScale administrator is retiring older nodes from their 60-node Gen 5 cluster. After
SmartFail is used on the 20 targeted nodes, the administrator is notified that data access is much slower.
However, they find no issues with the network bandwidth.
What is a possible reason for the slower access issue?

A. SSD total capacity dropped below 1.5%, disabling GNA automatically
B. SmartFail disabled the L3 cache and must be enabled manually
C. Manage I/O optimization settings were not re-enabled
D. SSDs are no longer used for SmartCache prefetching

A

A. SSD total capacity dropped below 1.5%, disabling GNA automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An Isilon administrator was unsuccessful when adding a new node to an existing Isilon cluster using
the Nodes LCD panel.
What is a possible cause?

A. Internal join mode has been set to ??secure??
B. Internal join mode has been set to ??manual??
44 / 99

C. Nodes can only be added through the console port
D. Nodes can only be added through the web administration interface

A

A. Internal join mode has been set to ??secure??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the best practice for configuring shares, exports, and quotas when implementing DR on the source and target clusters? A. Change all quotas to soft quotas on the target cluster B. Configure the source side only when creating shares, exports, and quotas C. Use the exact same names for shares and same aliases for exports D. Use SyncIQ to replicate shares, exports, and quota settings
C. Use the exact same names for shares and same aliases for exports
26
What is the maximum stripe width, including both data and protection, for Protection Level N+4d:1n? A. 8 B. 16 C. 20 D. 30
C. 20
27
A customer has recently purchased a Dell EMC Isilon cluster and wants to use the cluster as a cloud service provider. OneFS 8.x Groupnet and Access zones were recommended for this purpose. What is the primary benefit of this approach? A. Each client can have their own SmartPool policy B. Each client can have their own authentication provider C. Each client can have their own VHS strategy D. Each client can have their own ACL policy
B. Each client can have their own authentication provider
28
A Dell EMC Isilon customer upgraded their cluster from 7.1 to 8.0. Some of their UNIX users can no longer access the cluster. After investigating the issue, you discover that only the UNIX systems using NFSv2 are having issues. What is a possible cause for these issues? A. Cluster read/write clients are deleted B. NFSv2 is not supported on OneFS 8.0 C. Only the "Security Flavors" are upgraded D. Upgrade is destructive to NFS exports
B. NFSv2 is not supported on OneFS 8.0
29
Which type of administrator commands are tracked by configuration auditing? A. Commands run by the root user B. PAPI-enabled commands C. Commands run by the SystemAdmin and CompAdmin roles only D. All UNIX, isi, isi_, and sudo commands
B. PAPI-enabled commands
30
How many Active Directory provider instances can be configured per access zone? A. 1 B. 2 C. 3 D. 4
A. 1
31
What information is displayed by the isi_hw_status command? A. Hardware components and selected statistics B. Health status of both NVRAM batteries C. Subnet and pool membership for the interfaces D. Status of drives in the node
A. Hardware components and selected statistics
32
What accurately describes the behavior of InsightIQ with FSA enabled on an Isilon cluster? A. FSA job runs at 22:00 hours every night by default B. Storage usage statistics will be less accurate C. A separate FSA license is required D. Total number of monitored nodes capacity is reduced by half
A. FSA job runs at 22:00 hours every night by default
33
A new cluster consisting of S nodes and NL nodes is created. SmartPools is unlicensed. Where will the data be written? A. To the node pool with the highest percentage of available space B. To the S node pool first, then to the NL node pool C. To the node pool that was created first, irrespective of node type D. To the NL node pool first, then to the S node pool
A. To the node pool with the highest percentage of available space
34
What are the notification options for Smart Quotas? A. Write to a syslog B. Write to a CEE server C. Send a trap to an SNMP server Generate an event on an SNMP server D. Send an email Generate a cluster event
D. Send an email
35
When configuring a DR cluster with SyncIQ, what should be considered with respect to SmartQuotas? A. Never set hard quotas on SyncIQ target directories B. Always set hard quotas on SyncIQ target directories C. Replicate SmartQuota settings on both source and target clusters 46 / 99 D. If the target cluster is smaller, configure SmartQuotas to limit the SyncIQ target
A. Never set hard quotas on SyncIQ target directories
36
An organization has an Isilon cluster with 15 S210 nodes in a single node pool and 20 NL400 nodes in a second node pool. Which requirements must be achieved before Global Namespace Acceleration can be activated? A. All S210 nodes must contain at least one SSD drive SSD capacity must be at least 2.25% of the total cluster space B. At least seven S210 nodes must contain at least one SSD drive SSD capacity must be at least 1.5% of the total cluster space C. All S210 nodes must contain at least one SSD drive SSD capacity must be at least 20% of the total cluster space D. All S210 nodes must contain one SSD drive SSD capacity must be at least 0.5% of the total cluster space
B. At least seven S210 nodes must contain at least one SSD drive
37
A customer management team requires a data retention system. They need to be able to remove files if necessary and retain full cluster management capabilities. What Smart Lock configuration would you recommend to meet their requirements? A. Compliance mode cluster Enterprise Smart Lock directories with privileged deletes off B. Standard Isilon cluster Enterprise Smart Lock directories with privileged deletes off C. Compliance mode cluster Compliance Smart Lock directories with privileged deletes on D. Standard Isilon cluster Enterprise Smart Lock directories with privileged deletes permanently disabled
B. Standard Isilon cluster
38
Which protocol is used for communication between an Isilon InsightIQ virtual appliance and an end- user system? A. HTTP B. HDFS C. NFS D. SMB
A. HTTP
39
A systems administrator is attempting to manage a Dell PowerScale cluster using the web administration interface. However, some configuration tabs are not displayed. What is the most likely cause of this issue? A. Some features have not been licensed B. Administrator did not log in as CompAdmin C. RBAC has been implemented D. Access zones have been created 47 / 99
C. RBAC has been implemented
40
Based on the command output shown in the exhibit, what does the "+" represent? A. File's mode bits take precedence B. root is a super user C. File has a synthetic ACL D. File has an advanced ACL
D. File has an advanced ACL
41
A financial institution has recently purchased a Dell EMC Isilon cluster. Due to strict regulatory retention guidelines, they plan to use the SmartLock Compliance feature for the cluster. What accurately describes the SmartLock Compliance feature for committed data? A. Data can be modified after the retention period by disabling the SmartLock feature B. System clock can be adjusted to change the retention period and then the data can be deleted C. Data cannot be deleted before its retention period expires D. Only the root user can delete the data with privileged access before the retention period
C. Data cannot be deleted before its retention period expires
42
Where are audit events logged? A. Locally on each node B. /ifs/.ifsvar C. On the node with the lowest LNN D. /ifs/.cluster
A. Locally on each node
43
An implementation engineer has just joined an EMC Isilon cluster to an Active Directory domain. The System zone of the cluster is set to default values. Which AD object is automatically added to the cluster??s administrator group? A. Domain Admin group B. Domain Admin user C. Local Administrators group D. Local Administrator user
A. Domain Admin group
44
What is required to configure link aggregation on an Isilon cluster? 48 / 99 A. Aggregate the same interface on multiple nodes and use different aggregation modes for each pool B. Aggregate both interfaces on a single node and use different aggregation modes for each pool C. Aggregate the same interface on multiple nodes and only use one aggregation mode for all pools D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools
D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools
45
What are the ??Three Vs? describing challenges in managing Big Data? A. Volume, Volatile, Vicinity B. Volume, Velocity, Variety C. Velocity, Volatile, Variety D. Variety, Vicinity, Volume
B. Volume, Velocity, Variety
46
Which process is required to run on each NetWorker Storage Node? A. nsrsnmd B. nsrjobd C. nsrd D. nsrlcpd
A. nsrsnmd
47
An Isilon administrator wants to enable quota notifications for their LDAP users. However, the users?? email IDs are not updated in the LDAP environment. What additional configuration needs to be performed? A. Configured the file provider B. Manage local users and groups C. Configure the local provider D. Configure a mapping rule
D. Configure a mapping rule
48
An administrator wants to enable quotas on a group directory in their Isilon cluster. In addition, the administrator wants to monitor and limit the disk usage. Which type of quotas need to be configured? A. Advisory B. Enforcement C. Accounting D. Soft
A. Advisory
49
What is a characteristic of L3 cache on an Isilon cluster? A. Must be the same size as the L2 cache B. Contents will be persistent through a node reboot C. Only holds file data that has been stored on SSDs D. Accessed only by clients connecting to the node it is on
B. Contents will be persistent through a node reboot
50
A systems administrator needs to change the cluster protection level from N+3n to N+2n. Which interfaces can they use? A. HTTP, WebUI, and CLI B. SFTP, HTTP, and CLI C. PAPI, WebUI, and CLI D. PAPI, WebUI, and SFTP
C. PAPI, WebUI, and CLI
51
A customer requires data retention to meet governmental regulatory requirements. They have asked you to explain the EMC Isilon data retention offerings and how these offerings would meet their requirements. What mechanism ensures that data is retained for the required retention period? A. Compliance clock B. System clock C. Autocommit period D. Minimum retention period
A. Compliance clock
52
What standard reporting types are provided by InsightIQ? A. File system and performance reports B. Trending and capacity reports C. Performance and forecasting reports D. Historical and file system reports
A. File system and performance reports
53
Which CLI command(s) properly turns off an EMC Isilon cluster? A. isi config >>> shutdown all B. shutdown -p now C. isi_flush; halt D. isi config >>> quit
A. isi config
54
On an Isilon cluster running OneFS 7.2, what is the recommended maximum number of SyncIQ policies per source cluster? A. 50 B. 100 C. 200 D. 500
C. 200
55
What is an advantage of managed file replication? A. Removes the media server from the data path when creating duplicates B. Specifically an approach to system mirroring C. User must create and replicate snapshots separately D. Uses the collection log to track and update what is missing on the source
A. Removes the media server from the data path when creating duplicates
56
You are using a Windows 2008r2 server and connecting to a share over SMBv2. Where would the session or state information for the connection be maintained? A. Client-connected node only B. Client only C. Client-connected node and client D. All nodes in the cluster
A. Client-connected node only
57
In a Dell EMC Isilon environment, which Gen 6 nodes support 2.5" SAS drives? A. A200 B. H400 C. H500 D. H600
D. H600
58
You want to join your Dell PowerScale cluster with a Microsoft Active Directory (AD) domain. In addition to the AD domain name, what other information is required to join the AD? A. OU name and Kerberos encryption key B. Isilon cluster name and Kerberos encryption key C. AD domain account with rights to join and AD domain account password D. Local account with root privilege and local account password
C. AD domain account with rights to join and AD domain account password
59
You have been tasked with creating file pool policies for a customer as part of the configuration document. Three of the file pool policies are based on matching specific file extensions. What file pool policy filter type should you select? A. Filename B. File type C. File location D. User defined attributes
A. Filename
60
What is the fastest way to back up remote offices? A. Remote library to back up to tape B. Deduplication at the target C. AFTD at the central data center D. Deduplication from the source 51 / 99
D. Deduplication from the source
61
What additional Hadoop feature is provided by an EMC Isilon cluster environment? A. Multi-protocol access to HDFS data B. Reduced compute time C. Dependent compute and storage scaling D. Same security authentication as Hadoop
A. Multi-protocol access to HDFS data
62
A storage administrator needs to create a file pool policy to move files that have not been changed in over two months to their archive tier. The Tiers of nodes with faster and slower node pools already exist. Which file matching criterion should be used to meet this requirement? A. atime is older than 2 months ago B. birthtime is older than 2 months ago C. ctime is older than 2 months ago D. mtime is older than 2 months ago
D. mtime is older than 2 months ago
63
In a Dell EMC Isilon environment, what happens when executing a failover revert? A. Undoes a failback job in progress B. Undoes a failover job in progress C. Redirects clients to the target cluster D. Redirects clients to the source cluster
B. Undoes a failover job in progress
64
What is the minimum recommended protection scheme for 6 TB drives? A. N+3d:1n B. N+2n C. N+2d:1n D. N+3d:1n1d
D. N+3d:1n1d
65
A company has an Isilon cluster on which they want to configure dynamic pools. The cluster consists of 5 nodes. The pool will consist of one 1Gbps Ethernet external interface on each of the nodes. Because the address space is limited at the company's site, they will need to implement dynamic pools using a minimum number of addresses. If the company puts all interfaces in one pool and sets it to dynamic with round robin failover, how many addresses need to be put into the pool to ensure an even number of IP addresses per node after failover distribution should a node fail? A. 4 B. 8 C. 15 D. 20 52 / 99
D. 20
66
A customer is using an EMC Isilon cluster solely for user's home directories. Secure protocol communication was a requirement in the design of their cluster configuration Which feature of the SMB protocol could be disabled to improve performance? A. Oplocks B. Packet signing C. Credit limits D. Stateful
A. Oplocks
67
If a Dell PowerScale cluster has five unique access zones, in which zone should administration of the cluster occur? A. Any zone can perform administration B. Only access zones for which administration has been enabled C. Zone in which changes need to be made D. Only in the System zone
D. Only in the System zone
68
Which CLI command can be used to display information about requested and actual protection settings on all files in a directory? A. isi zone zones B. isi get C. isi_for_array -s D. isi stat -q
B. isi get
69
What is the correct sequence of actions performed by OneFS to generate an access token? Answer: 53 / 99 270.When they access an EMC Isilon cluster, at which access layer are users associated with a role? A. Permissions B. Identity Assignment C. Authentication D. Protocol
B. Identity Assignment
70
When reviewing the actual protection output of N+4/2, what does the number ??4? represent? A. FEC stripe units per stripe B. Hard drives used per stripe C. Volume stripes per file system D. FEC stripe units per file system
A. FEC stripe units per stripe
71
What accurately describes a NetWorker Storage Node? A. Responsible for read and write operations of data B. A dedicated host with a NetWorker database C. Host that maintains NetWorker tracking and configuration information D. Host with a large database to backup itself
A. Responsible for read and write operations of data
72
Which features represent Hadoop? A. Software library framework Single node data storage B. Analyzes data across groups of computers Single node data processing C. Distributed processing of large data sets Single node data storage D. Software library framework Distributed processing of large data sets 54 / 99
D. Software library framework
73
You have been tasked with designing SyncIQ policies for a customer that requires failover and fail back testing. What should you advise the customer? A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ B. SyncIQ will support fail back replication policies that specify directory includes or excludes C. Multiple SyncIQ policies can point to the same directory on the target cluster D. Synchronous replication is supported by SyncIQ
A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ
74
An Isilon cluster has been configured with an autocommit period of 30 minutes for all compliance SmartLock directories. However, the storage administrator has noticed that files recently written to the folders can be deleted or modified. Why is this happening? A. Offset time for autocommit has not been met B. Compliance clock is out of sync with the autocommit function C. Offset time for autocommit has been met D. Manual commit must be used for all compliance SmartLock directories
A. Offset time for autocommit has not been met
75
What can be configured on the SmartPools page in the web administration interface of an Isilon cluster? A. GNA, VHS, L3 cache, Global Spillover B. Address pools, L2 cache, tiers, snapshot storage C. L1 cache, file pool policies, VHS, notifications D. Data access pattern, protection setting, VHS, deduplication
A. GNA, VHS, L3 cache, Global Spillover
76
A drive is being SmartFailed from a node and the data is being rebuilt. Where will the data be rebuilt by default? A. Space reserved as VHS only in the same node pool B. Any available space on the same node pool C. Node pool designated in the global spillover setting D. Node pool specified in the Default file pool policy
B. Any available space on the same node pool
77
An administrator requires SMB Continuous Availability (CA) on all existing SMB shares. What needs to be done to meet this request? A. Nothing; SMB CA is on by default B. All shares must be reshared C. Log into the CLI to access the necessary command D. Run the global command from the web administration interface
B. All shares must be reshared
78
In a Dell EMC Isilon environment, what is a function of the SmartPoolsTree job? A. Directs all files in the cluster to one or more node pools in a single tier B. Allows file pool policies to be applied on a directory rather than on an entire file system C. Enforces the default system pool policies but does not enforce user pool policies D. Maintains the layout of files in the node or file pools according to file pool policies
B. Allows file pool policies to be applied on a directory rather than on an entire file system
79
When using the WebUI to edit an active job, which task can a Dell PowerScale administrator perform? A. Cancel the job B. Change the job priority C. Pause the job D. Restart the job
B. Change the job priority
80
In a Windows ACL, what rules govern how deny permissions are enforced? A. Deny permissions take precedence over allow permissions B. Any inherited permission overrides any explicit permission C. An inherited deny permission overrides an explicit allow permission D. Allow permissions take precedence over deny permissions
A. Deny permissions take precedence over allow permissions
81
In a Dell EMC Isilon environment, what does the command prompt character change to when logged in with only administrator rights? A. Cluster-1# B. Cluster-1% C. Cluster-1* D. Cluster-1:
B. Cluster-1%
82
In a 3-node Isilon cluster using N+1n data protection, a single 128 KB file is written. How are the stripe units distributed over the nodes? A. Node 1: 64 KB stripe unit Node 2: 64 KB mirror Node 3: 64 KB FEC B. Node 1:64 KB stripe unit Node 2: 64 KB stripe unit Node 3: 64 KB FEC C. Node 1: 128 KB stripe unit Node 2: 128 KB FEC D. Node 1: 128 KB stripe unit Node 2: 128 KB mirror Node 3: 128 KB FEC 56 / 99
C. Node 1: 128 KB stripe unit
83
What is the result when SyncIQ is used to replicate a SmartLink file to OneFS 7.2.1? A. Data is deep copied to the destination cluster B. The SyncIQ job fails C. A new Smart Link file is created on the destination cluster D. Contents of the Smart Link file are copied to the destination cluster
A. Data is deep copied to the destination cluster
84
If a Dell EMC Isilon customer is using OneFS v8.0.0.2, what is the maximum number of SyncIQ jobs that can be run concurrently? A. 5 B. 40 C. 50 D. 60
C. 50
85
A customer's Isilon storage administrator is concerned about capacity after recently ingesting 200 TB of file data. The customer has recently added more nodes to the cluster and wants to auto-balance the cluster as soon as possible. The cluster utilization percentages for an average 24-hour period are: - 45% during 00:00-08:59 - 60% during 09:00-17:00 - 30% during 17:01-23:59 While keeping cluster utilization at a minimum, which Impact Policy settings will allow the job to complete quickly without impacting the production workload? A. Medium, Medium, Low. B. Medium, Low, Low. C. High, Medium, Paused. D. High, High, Low.
A. Medium, Medium, Low.
86
Which type of record is needed in DNS to register the name storage.cluster.training.com as 192.168.15.12? A. Name Server B. PTR C. AAAA D. A
D. A
87
An Isilon cluster has ten A200 nodes and the node pool data protection level is set to N+2. The data access pattern is currently set to streaming. If the data access pattern is changed to concurrency, how many stripes for a 1 MB file are moved to the other drive(s)? 57 / 99 A. 0 B. 2 C. 4 D. 6
B. 2
88
Management would like to ensure that all of the dynamic IP addresses from the pool are assigned to ports. Which license needs to be activated to accomplish this? A. Insight IQ B. Smart Pools C. Cloud Pools D. Smart Connect Advanced
D. Smart Connect Advanced
89
What does the FSA job use to track directory activity in OneFS 8.0? A. Customer configured snapshots with a Snapshot IQ license B. Change list API to compare snapshots on the /ifs tree C. Complete LIN scan of the file system D. PAPI interface to query One FS
B. Change list API to compare snapshots on the /ifs tree
90
What is a reason why Dell PowerScale NAS solutions work effectively with Big Data workflows? A. Provide a scale-up solution B. Function as single block-based storage C. Provide multiple aggregates of volumes D. Function as a single repository of data
D. Function as a single repository of data
91
Which RBAC user role(s) provides a user full web administration privileges? A. Audit Admin only B. System Admin and Audit Admin C. System Admin and Security Admin D. Security Admin only
C. System Admin and Security Admin
92
Which setting may be modified on an Isilon cluster by the file system explorer, file pool policies, and the isi set command? A. Data Layout B. VHS Space Reservation C. File Permissions D. Access Zone Membership
A. Data Layout
93
You are using Connection Count to load balance client connections in an Isilon SmartConnect zone. Which connection type is counted when considering which IP to assign? A. Established FTP connections B. Active IP connections C. Active UDP connections D. Established TCP connections
D. Established TCP connections
94
What node pool settings can be modified? A. Tier assignment Requested protection level L3 cache enablement B. Node pool name Requested protection level I/O optimization C. Tier assignment L3 cache enablement I/O optimization D. Node pool name L3 cache enablement Requested protection level
D. Node pool name
95
A customer has a 5 node cluster. Their average file size is 512 KB. The customer requires the ability to withstand a minimum of three simultaneous drive losses without a data loss. What requested protection level should be implemented to minimize protection overhead? A. N+3d:1n1d B. 3X C. N+3n D. N+3d:1n
A. N+3d:1n1d
96
In which directory can you find snapshots stored on an EMC Isilon cluster? A. /ifs/.snapshot B. /ifs/.ifsvar C. /ifs/.isilon D. /ifs/data
A. /ifs/.snapshot
97
In a Dell EMC Isilon environment, what occurs when an Isilon node pool is below the suggested protection level? A. File is striped to an additional drive B. Cluster event is generated C. CELOG event is generated 59 / 99 D. File is mirrored to an additional node
C. CELOG event is generated
98
What accurately describes the behavior of an access token on an Isilon cluster? A. Updated when the client accesses the cluster. B. One token is generated for every access zone. C. Cannot contain both an SID and an UID. D. Requires the use of external authentication providers.
A. Updated when the client accesses the cluster.
99
What will occur when an Isilon node pool is below the recommended protection level? A. CELOG will generate an underprotected event. B. File will be striped to an additional drive. C. File will be mirrored. D. An additional copy of the metadata will be stored on the SSD drives.
A. CELOG will generate an underprotected event.
100
You have just joined an Isilon cluster to an Active Directory (AD). The System access zone of the cluster is set to the default settings. Which AD group is automatically added to the Isilon Users group? A. Domain Users B. Authenticated Users C. Security Admins D. Domain Admins
A. Domain Users