All Flashcards
(499 cards)
A company’s Isilon cluster has reached the capacity limit. The cluster consists of eight H500 nodes in a
single node pool.
Which action can be taken to resolve the capacity issue while new nodes are being delivered?
A. Activate SmartPools
B. Enable GNA
C. Enable Spillover
D. Release VHS drives
A. Activate SmartPools
You are looking through the EMC Isilon Configuration Guide for client specific site data.
Which tab of the document contains this information?
A. Core
B. Topology
C. Design Intent
D. Customer Information
D. Customer Information
What is a characteristic of access tokens on a Dell EMC Isilon cluster?
A. Cannot contain both an SID and a UID
B. One token is generated for every Access zone
C. Generated when the client accesses the cluster
D. Requires the use of external authentication providers
C. Generated when the client accesses the cluster
A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file
pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the
administrator has some concerns about the available capacity on the H600 nodes.
Which feature should be configured to accept writes, even after the H600 nodes become full?
A. VHS
B. Spillover
C. SmartPools
D. GNA
B. Spillover
In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the
shares the client is able to view?
A. SmartConnect
B. Access zone
C. Access Control List
D. Mode bit
B. Access zone
You are looking through the EMC Isilon Configuration Guide for file sizes and workflows.
Which tab of the document contains this information?
2 / 99
A. Design Intent
B. Customer Information
C. Topology
D. Core
A. Design Intent
How many nodes should be set up to coordinate NTP for an Isilon cluster?
A. All nodes
B. Two only
C. Every node connected to the network
D. One only
D. One only
A systems administrator has an Isilon cluster with three X410 nodes in their environment. The default
protection setting is 2d:1n at the node pool level. Billions of very small image files, less than 50 KB size,
are stored on the cluster.
Recently, the administrator has seen an issue where the cluster’s used capacity is getting full. However,
the cumulative size of the files copied appears to be less.
What is a possible reason for the storage usage level?
A. Small files are stored with 4x mirror protection and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
C. Metadata of billions of files is consuming most of the capacity
D. Small files are spread across all nodes and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
A customer has SAP, Oracle, and file system information in a VMAX3. The customer is looking for a
backup solution to receive the least amount of RTO and RPO as possible.
Which solutions should be recommended?
A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
B. Protect Point, DD990, Snap VX, FAST.X, and Recover Point for XtremIO
C. Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
D. NetWorker, Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
A Dell EMC Isilon cluster with Gen 6 nodes has reached 90% capacity.
To increase the cluster’s capacity, what is the minimum number of Gen 6 nodes that can be added?
A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes
B. 2 nodes
What information does the isi statistics command display?
A. Protocol status, general performance, hardware condition, and critical alerts
3 / 99
B. General status, node management, Job Engine status, and drive statistics
C. Drive statistics, protocol status, node statistics, and hardware statistics
D. Drive status, hardware condition, critical alert, and protocol status
C. Drive statistics, protocol status, node statistics, and hardware statistics
You are using a RHEL server and mounting an export from an EMC Isilon cluster using NFSv3.
Where would the session or state information for the connection be maintained?
A. Client only
B. On all nodes in the cluster
C. Client-connected node only
D. Client and client-connected node
A. Client only
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What must be done to initially configure this cluster?
A. Establish a network connection to the management port on a backend switch
B. Run the cluster configuration wizard from a computer on the same network as the cluster
C. Connect a monitor, mouse, and keyboard to the utility node of the cluster
D. Establish a serial connection to the node designated as node 1
D. Establish a serial connection to the node designated as node 1
A company plans to build two Dell PowerScale clusters in an active-active disaster recovery
environment. The initial requirement is to have one access zone for their finance department.
Which recommended directory structure meets the requirement?
A. Cluster_A:
/ifs/finance
/ifs/finance
Cluster_B:
/ifs/finance
/ifs/finance
B. Cluster_A:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
Cluster_B:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
C. Cluster_A:
/ifs/cluster_a
/ifs/cluster_b
Cluster_B:
/ifs/cluster_a
/ifs/cluster_b
D. Cluster_A:
/ifs/finance/cluster_a
4 / 99
/ifs/finance/cluster_b
Cluster_B:
/ifs/finance/cluster_a
/ifs/finance/cluster_b
B. Cluster_A:
In an Isilon environment, which type of storage node is best suited for high throughput and high
concurrency using SATA drives?
A. NL-Series
B. S-Series
C. X-Series
D. A100-Series
C. X-Series
What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?
A. 40 Gb InfiniBand ports
B. Decreased journal size for storage performance
C. Dedicated bootflash drives
D. NVRAM dependency
A. 40 Gb InfiniBand ports
Which command is used to enable Source-Based Routing in OneFS 8.2.0?
A. isi network groupnets modify –sbr=true
B. isi network subnets modify –sbr=true
C. isi network pools modify –sbr=true
D. isi network external modify –sbr=true
D. isi network external modify –sbr=true
What does the isi_upgrade_helper command provide?
A. Recommended sets of nodes capable of simultaneous node firmware upgrades
B. Recommended sets of nodes capable of simultaneous drive firmware upgrades
C. Recommended sets of nodes capable of simultaneous rollup patch upgrades
D. Recommended sets of nodes capable of simultaneous standard patch upgrades
A. Recommended sets of nodes capable of simultaneous node firmware upgrades
In an Isilon environment, what are the on-disk identity types that appear in the web administration
interface?
A. SMB, NFS, and Mixed
B. AD, LDAP, and NIS
C. GUID, SID, and Mixed
D. SID, UNIX, and Native
D. SID, UNIX, and Native
What does it mean if an EMC Isilon cluster is in a NANON state?
5 / 99
A. One or more nodes are missing Ethernet connections
B. One or more nodes are missing InfiniBand connections
C. One or more nodes have critical events
D. One or more nodes have been improperly shut down
A. One or more nodes are missing Ethernet connections
Based on the graphic, what is the correct port to attach to the internal network?
A. 1
B. 2
C. 3
D. 4
C. 3
A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site.
What is a key consideration regarding the SyncIQ functionality?
A. SyncIQ synchronous option must be configured
B. SyncIQ is only an asynchronous replication tool
C. SyncIQ source must be modified to replicate
D. SnapshotIQ must be purchased and the synchronous option configured
B. SyncIQ is only an asynchronous replication tool
What is responsible for handling the SMB protocol and managing the session, protocol negotiations,
and operations in One FS?
6 / 99
A. lsassd
B. lwsm
C. lwiod
D. srvsvc
C. lwiod
What are the steps to configure SmartLock on an EMC Isilon cluster in Compliance mode?
A. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
B. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
C. Boot cluster in Compliance mode
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode