All Flashcards

(499 cards)

1
Q

A company’s Isilon cluster has reached the capacity limit. The cluster consists of eight H500 nodes in a
single node pool.
Which action can be taken to resolve the capacity issue while new nodes are being delivered?

A. Activate SmartPools
B. Enable GNA
C. Enable Spillover
D. Release VHS drives

A

A. Activate SmartPools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are looking through the EMC Isilon Configuration Guide for client specific site data.
Which tab of the document contains this information?

A. Core
B. Topology
C. Design Intent
D. Customer Information

A

D. Customer Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a characteristic of access tokens on a Dell EMC Isilon cluster?

A. Cannot contain both an SID and a UID
B. One token is generated for every Access zone
C. Generated when the client accesses the cluster
D. Requires the use of external authentication providers

A

C. Generated when the client accesses the cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file
pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the
administrator has some concerns about the available capacity on the H600 nodes.
Which feature should be configured to accept writes, even after the H600 nodes become full?

A. VHS
B. Spillover
C. SmartPools
D. GNA

A

B. Spillover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the
shares the client is able to view?

A. SmartConnect
B. Access zone
C. Access Control List
D. Mode bit

A

B. Access zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are looking through the EMC Isilon Configuration Guide for file sizes and workflows.
Which tab of the document contains this information?
2 / 99

A. Design Intent
B. Customer Information
C. Topology
D. Core

A

A. Design Intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How many nodes should be set up to coordinate NTP for an Isilon cluster?

A. All nodes
B. Two only
C. Every node connected to the network
D. One only

A

D. One only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A systems administrator has an Isilon cluster with three X410 nodes in their environment. The default
protection setting is 2d:1n at the node pool level. Billions of very small image files, less than 50 KB size,
are stored on the cluster.
Recently, the administrator has seen an issue where the cluster’s used capacity is getting full. However,
the cumulative size of the files copied appears to be less.
What is a possible reason for the storage usage level?

A. Small files are stored with 4x mirror protection and consuming more capacity
B. Small files are stored with 2x mirror protection and consuming more capacity
C. Metadata of billions of files is consuming most of the capacity
D. Small files are spread across all nodes and consuming more capacity

A

B. Small files are stored with 2x mirror protection and consuming more capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A customer has SAP, Oracle, and file system information in a VMAX3. The customer is looking for a
backup solution to receive the least amount of RTO and RPO as possible.
Which solutions should be recommended?

A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
B. Protect Point, DD990, Snap VX, FAST.X, and Recover Point for XtremIO
C. Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
D. NetWorker, Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO

A

A. NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Dell EMC Isilon cluster with Gen 6 nodes has reached 90% capacity.
To increase the cluster’s capacity, what is the minimum number of Gen 6 nodes that can be added?

A. 1 node
B. 2 nodes
C. 3 nodes
D. 4 nodes

A

B. 2 nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information does the isi statistics command display?

A. Protocol status, general performance, hardware condition, and critical alerts
3 / 99

B. General status, node management, Job Engine status, and drive statistics
C. Drive statistics, protocol status, node statistics, and hardware statistics
D. Drive status, hardware condition, critical alert, and protocol status

A

C. Drive statistics, protocol status, node statistics, and hardware statistics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are using a RHEL server and mounting an export from an EMC Isilon cluster using NFSv3.
Where would the session or state information for the connection be maintained?

A. Client only
B. On all nodes in the cluster
C. Client-connected node only
D. Client and client-connected node

A

A. Client only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What must be done to initially configure this cluster?

A. Establish a network connection to the management port on a backend switch
B. Run the cluster configuration wizard from a computer on the same network as the cluster
C. Connect a monitor, mouse, and keyboard to the utility node of the cluster
D. Establish a serial connection to the node designated as node 1

A

D. Establish a serial connection to the node designated as node 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company plans to build two Dell PowerScale clusters in an active-active disaster recovery
environment. The initial requirement is to have one access zone for their finance department.
Which recommended directory structure meets the requirement?

A. Cluster_A:
/ifs/finance
/ifs/finance
Cluster_B:
/ifs/finance
/ifs/finance
B. Cluster_A:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
Cluster_B:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
C. Cluster_A:
/ifs/cluster_a
/ifs/cluster_b
Cluster_B:
/ifs/cluster_a
/ifs/cluster_b
D. Cluster_A:
/ifs/finance/cluster_a
4 / 99

/ifs/finance/cluster_b
Cluster_B:
/ifs/finance/cluster_a
/ifs/finance/cluster_b

A

B. Cluster_A:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In an Isilon environment, which type of storage node is best suited for high throughput and high
concurrency using SATA drives?

A. NL-Series
B. S-Series
C. X-Series
D. A100-Series

A

C. X-Series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?

A. 40 Gb InfiniBand ports
B. Decreased journal size for storage performance
C. Dedicated bootflash drives
D. NVRAM dependency

A

A. 40 Gb InfiniBand ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which command is used to enable Source-Based Routing in OneFS 8.2.0?

A. isi network groupnets modify –sbr=true
B. isi network subnets modify –sbr=true
C. isi network pools modify –sbr=true
D. isi network external modify –sbr=true

A

D. isi network external modify –sbr=true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the isi_upgrade_helper command provide?

A. Recommended sets of nodes capable of simultaneous node firmware upgrades
B. Recommended sets of nodes capable of simultaneous drive firmware upgrades
C. Recommended sets of nodes capable of simultaneous rollup patch upgrades
D. Recommended sets of nodes capable of simultaneous standard patch upgrades

A

A. Recommended sets of nodes capable of simultaneous node firmware upgrades

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In an Isilon environment, what are the on-disk identity types that appear in the web administration
interface?

A. SMB, NFS, and Mixed
B. AD, LDAP, and NIS
C. GUID, SID, and Mixed
D. SID, UNIX, and Native

A

D. SID, UNIX, and Native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does it mean if an EMC Isilon cluster is in a NANON state?
5 / 99

A. One or more nodes are missing Ethernet connections
B. One or more nodes are missing InfiniBand connections
C. One or more nodes have critical events
D. One or more nodes have been improperly shut down

A

A. One or more nodes are missing Ethernet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Based on the graphic, what is the correct port to attach to the internal network?

A. 1
B. 2
C. 3
D. 4

A

C. 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site.
What is a key consideration regarding the SyncIQ functionality?

A. SyncIQ synchronous option must be configured
B. SyncIQ is only an asynchronous replication tool
C. SyncIQ source must be modified to replicate
D. SnapshotIQ must be purchased and the synchronous option configured

A

B. SyncIQ is only an asynchronous replication tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is responsible for handling the SMB protocol and managing the session, protocol negotiations,
and operations in One FS?
6 / 99

A. lsassd
B. lwsm
C. lwiod
D. srvsvc

A

C. lwiod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the steps to configure SmartLock on an EMC Isilon cluster in Compliance mode?

A. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
B. Boot cluster as a standard Isilon cluster
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
C. Boot cluster in Compliance mode
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM
D. Boot cluster in Compliance mode
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM

A

D. Boot cluster in Compliance mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In Dell EMC Isilon, what is the purpose of a maintenance release? A. Address known issues and minor enhancements to the OS B. Address known issues and minor enhancements to the firmware C. Update internal and external NICs to address known issues D. Update all internal components for known issues
A. Address known issues and minor enhancements to the OS
26
An Implementation Engineer has just joined an EMC Isilon cluster to an Active Directory (AD) domain. The System zone of the cluster is set to default values. Which AD object is automatically added to the cluster’s users group? A. Anonymous B. Authenticated users C. Guest D. Everyone
B. Authenticated users
27
Which type of issues are resolved by enabling Source-Based Routing on an Isilon cluster? 7 / 99 A. Asymmetric routing. B. IP address space depletion. C. TCP retransmission. D. SmartConnect load balance.
A. Asymmetric routing.
28
A customer has purchased a license to allow multiple file pool policies to be applied to their multi-tier cluster. Which job, when run, enforces file pool policies, and applies any file pool policy changes to the data? A. SyncIQ B. Auto Balance C. Smart Pools D. Set Protect Plus
C. Smart Pools
29
What is the complete list of providers supported by a Dell EMC Isilon cluster? A. LDAP, AD, NIS, and local and file providers B. LDAP, NIS+, and file and local providers C. AD, NIS+, local provider, and LDAP D. AD, LDAP, and Microsoft Outlook provider
A. LDAP, AD, NIS, and local and file providers
30
An administrator is attempting an object-level restore of data from a Protect Point backup. However, they are unable to see the desired objects through the Recovery server. What is a possible cause for this problem? A. FTS device did not mount the static image B. Recovery server is not zoned to the Data Domain C. Static image was not copied to the VMAX3 D. VMAX3 did not mount the vdisk
D. VMAX3 did not mount the vdisk
31
A company has two Isilon clusters located in San Francisco, California. One cluster is the source and the other is the target. For efficiency, the dataset is being replicated between the two clusters within the same data center. The target cluster will be moved to the New York area as part of a disaster recovery solution once the initial full copy is complete. Once the cluster has been moved to New York, what will mitigate re-transmitting the entire dataset over the WAN to the target cluster in the new location? A. Enable target compare initial sync and then re-run the policy B. Run a sync policy with excluded directories defined C. Run a copy policy with excluded directories defined D. Enable the policy to run on all nodes in the cluster
A. Enable target compare initial sync and then re-run the policy
32
You are looking through the EMC Isilon Configuration Guide for management IPs and DNS 8 / 99 information. Which tab of the document contains this information? A. Core B. Design Intent C. Customer Information D. Topology
A. Core
33
Which information is required to join a Dell EMC Isilon cluster to an Active Directory (AD) domain? A. AD domain name, computer account created, and domain account with rights to the Join domain B. AD server name, cluster account created in an OU, and authentication account and password C. AD server name, port number, and authentication account and password D. AD domain name, domain account with rights to the Join domain, and domain account password
D. AD domain name, domain account with rights to the Join domain, and domain account password
34
A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes. What refresh process is appropriate in this case? A. Use SyncIQ to migrate the data from the old cluster to the new cluster B. Add the new nodes to the existing cluster and use SmartPools to migrate the data C. Add the new nodes one at a time and SmartFail out the old nodes D. Downgrade the new nodes to the version of OneFS running on the old nodes
A. Use SyncIQ to migrate the data from the old cluster to the new cluster
35
A customer has a 5-node cluster in which the SIP is answering DNS queries from node 1. If node 1 goes down, to which node, or LNN, would the SSIP service move? A. 2 B. 3 C. 4 D. 5
D. 5
36
Which deduplication phase is excluded from the Dry Run process? A. Commonality Detection B. Sharing C. Sampling D. Index Updating
D. Index Updating
37
When a 104 K data file is written to disk with a protection level of N+2n, what is the protection overhead of the total disk space consumed by the file? A. 0.33 B. 0.5 C. 0.67 9 / 99 D. 0.8
C. 0.67
38
What is a benefit of using NANON? A. Increased frontend I/O ports and aggregated cache B. Increased number of connected frontend network ports C. Increased capacity and aggregated cache D. Increased bandwidth inside the cluster and GbE links
C. Increased capacity and aggregated cache
39
Which data access advantage does Dell EMC Isilon clusters provide when hosting Hadoop data? A. Native Hadoop client access through SMB and NFSv3 B. Real-time data access with native Hadoop clients only C. SMB and NFSv4 data access only D. Multi-protocol data access, in place analytics
D. Multi-protocol data access, in place analytics
40
What is the required configuration for syslog forwarding? A. Syslog forwarding works with config auditing only B. Local server should be set up to deny remote logging C. Remote server should be set up to allow remote logging D. Syslog forwarding works with protocol auditing only
C. Remote server should be set up to allow remote logging
41
You have followed the configuration document and set up a new cluster in Compliance mode. You meet with the customer to plan directory layout and configuration requirements. What directory types will you be able to consider for this cluster? A. Non-WORM and Compliance Smart Lock directories only B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories C. Compliance Smart Lock directories only D. Enterprise Smart Lock and Compliance Smart Lock directories only
B. Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories
42
A new file pool policy is configured on a Dell PowerScale cluster to move all media files to A200 nodes. The previously written media files are located on H500 nodes. What does the administrator need to run to apply the new file pool policy on the old media files? A. SetProtectPlus job B. MediaScan job C. SmartPools job D. MultiScan job
C. SmartPools job
43
Which type of information does the Isilon isi statistics command provide? A. Job engine and critical alerts 10 / 99 B. Drive statistics and hardware condition C. Protocol and node statistics D. Drive replacement and node management
C. Protocol and node statistics
44
Which SSH Multi-Factor Authentication (MFA) service is supported by OneFS 8.2.0? A. Duo B. RSA C. Okta D. Yubico
A. Duo
45
A Dell EMC Isilon customer's existing cluster has Gen 5 nodes. They are using both 1 GbE and 10 GbE connectivity options. The 1 GbE is configured with the management network. The 10 GbE is connected to the data and replication network. The customer is planning to add new Gen 6 nodes to their cluster. They want to know the available options for front-end connectivity on Gen 6 nodes. Which information should be provided to the customer? A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes 10 GbE and 40 GbE front-end Ethernet options are only available in Gen 6 nodes B. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are only available in Gen 6 nodes C. 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are available on both Gen 5 and Gen 6 nodes D. 10 GbE and 40 GbE front-end Ethernet options are only available in Gen 5 nodes 1 GbE and 10 GbE front-end Ethernet options are available in Gen 6 nodes
A. 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes
46
How many Isilon Job Engine v2.0 components will be present on a single node? A. One director B. Two managers per job C. Two workers per task D. Three coordinators
A. One director
47
What can be determined when auditing is enabled on an EMC Isilon cluster? A. Who made the change When the change was made If the change can be undone B. When the change was made If the change can be undone If proper ITIL process was followed C. Who observed the change When the change was made If the change can be undone D. When the change was planned If the change can be undone If proper change control was followed
A. Who made the change When the change was made If the change can be undone
48
Which basic administration task can be performed using the front panel of an Isilon node? A. Adding the node to a cluster B. Creating a Smart Connect zone C. Configuring an additional interface 11 / 99 D. Creating an access zone
A. Adding the node to a cluster
49
What must be done to configure cluster name resolution for SmartConnect? A. Create the SSIP, add the DNS delegation, configure the subnet, and configure the node pool B. Create a host A record, create an NS record, configure the subnet, and configure the pool C. Create the SSIP, create an NS record, configure the subnet, and configure IPv6 and IPv4 D. Create a host A record, add the DNS delegation, configure the subnet, and configure IPv4
B. Create a host A record, create an NS record, configure the subnet, and configure the pool
50
What is the recommended method when cabling an Isilon cluster with dual InfiniBand switches? A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled to the second switch. B. All internal switch ports on odd-numbered nodes should be attached to switch one and all even numbered nodes should be cabled to switch two. C. All int-a switch ports should be cabled to the top row of switch ports on switch one and all int-b ports should be cabled to the bottom row of ports of switch one. Once switch one is full, continue cabling on switch two. D. It does not matter which switch ports are used. Any internal switch port can be cabled to either of the InfiniBand switches.
A. All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled
51
A company deployed an Isilon cluster that consists of eight nodes connected to a main production subnet by all available 10GB ports. Later, the company decided to implement a disaster recovery solution with a separate replication subnet. During the reconfiguration, one of the 10Gb ports from each of the nodes 1-4 was moved into the new pool and SBR was activated. After activating the replication policies, the administrator noticed that the main production ports on nodes 1-4 reached the bandwidth limit. What is a possible reason for this behavior? A. Default gateway for the replication subnet has a higher priority value. B. Default gateway for the replication subnet is not specified. C. Default gateway for the replication subnet has a lower priority value. D. Main production ports have a smaller bandwidth limit than replication ports.
B. Default gateway for the replication subnet is not specified.
52
What does the 'And' condition provide in file pool policy filter use? A. Increases the granularity of the file match criteria B. Reduces the number of file pool policies C. Combines multiple file pool policy filters with the same actions D. Broadens the file pool policy match criteria
A. Increases the granularity of the file match criteria
53
What does the phrase "failover revert" mean? A. Undoing a failover job in progress 12 / 99 B. Redirecting clients to the source cluster C. Redirecting clients to the target cluster D. Undoing a fail back job in progress
A. Undoing a failover job in progress
54
A customer would like to limit administrative access to a subset of cluster management capabilities. What method would you implement to meet their requirements? A. Create a custom role with only the required privileges B. Use the BackupAdmin role and add the required privileges C. Use the SecurityAdmin role to remove privileges from the SystemAdmin role D. Use the root user to modify the Admin role with the required privileges
A. Create a custom role with only the required privileges
55
Which type of information does the Isilon isi status command provide? A. Protocol and node statistics B. General status and client connections C. Drive statistics and hardware condition D. Job engine and critical alerts
D. Job engine and critical alerts
56
In a Dell PowerScale SyncIQ environment, which action requires a SnapshotIQ license? A. Saving historical snapshots on the target B. Reading the target, read-only instance C. Failing over to the target or disaster recovery cluster D. System-created snapshot of the source data
A. Saving historical snapshots on the target
57
What are the benefits of Isilon Scale-Out NAS versus Scale-Up NAS technology? A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection B. Block-based storage, file system upper limit 10 PB, nodes contain all components, and RAID protection C. Block-based storage, file system upper limit 20 PB+, nodes contain all components, and more granular file protection D. File-based storage, file system upper limit 16 TB, quick scalability, and volume level RAID protection
A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
58
What is the recommended maximum number of configured SyncIQ policies, per source cluster? A. 50 B. 500 C. 1,000 D. 2,000
C. 1,000
59
When configuring an NFS export on an Isilon cluster, what is the default mapping for the root 13 / 99 account? A. Root-to-nobody B. Root-to-root C. Root-to-admin D. User-defined during cluster setup
A. Root-to-nobody
60
A UNIX user is accessing a file through an NFS export on an Isilon cluster. The user is successfully authenticated through the LDAP server. In addition to file permissions, what else must be considered to determine the degree of file access the user will receive? A. User's access token. B. Whether the SmartConnect pool is set to `static'. C. User SID-defined in the ID Mapper database. D. User's access zone.
A. User's access token.
61
Within OneFS, at which level is the data layout managed? A. File pool B. Node C. Cluster D. Node pool
A. File pool
62
When using automatic home directory creation for SMB shares, which variable is used for the NetBIOS domain name? A. %D B. %N C. %S D. %Z
A. %D
63
What are sources form which an Isilon cluster can obtain authentication data about a user attempting to access the cluster? A. NIS+, HTTP, and NIS B. FTP, filedb, and samdb C. LDAP, NIS, and filedb D. HHTP, LDAP, and samdb
C. LDAP, NIS, and filedb
64
Which cache type is used for read-ahead caching on behalf of other nodes? A. L1 B. L2 C. L3 14 / 99 D. Endurant
B. L2
65
You have configured two new subnets: one for NFS and one for SMB. You have enabled VLAN tag 20 for NFS and VLAN tag 30 for SMB and added the interfaces to the network pools. The ext-1 interface from each node is assigned an address and is active. However, you are unable to ping the gateway on the two subnets. What action should you take to resolve this issue? A. Configure link aggregation on the network switch and each network pool B. Configure NS records in DNS for the network pools C. Configure Source-Based Routing for each subnet created D. Configure trunk ports on the switch for each network interface
D. Configure trunk ports on the switch for each network interface
66
Which job scans the cluster to look for orphaned or leaked inodes or blocks? A. Collect B. Auto Balance C. Flex Protect D. Media Scan
A. Collect
67
Which command shows individual drive status? A. isi devices B. isi_hw_status C. isi_gconfig D. isi networks
A. isi devices
68
How is Hadoop managed in an Isilon environment? A. Files are stored in a specialized HDFS-compatible file system format on the Isilon cluster B. HDFS data is on Isilon; computations are handled by Hadoop C. HDFS Data is on Hadoop; computations are handled by Isilon D. MapReduce on the Isilon cluster allows data to be distributed across both platforms
B. HDFS data is on Isilon; computations are handled by Hadoop
69
Which OneFS daemon is responsible for generating each user's identity token? A. lsassd B. lwiod C. srvscd netlogon
A. lsassd
70
What is an Ancestry Event on an Isilon cluster? A. First instance of a coalesced event. 15 / 99 B. ID that an event had prior to being quieted. C. An event that has been canceled. D. An event that affects multiple nodes.
A. First instance of a coalesced event.
71
Which group of authentication sources is completely supported by OneFS? A. RSA and AD B. LDAP and AD C. Smart Card and LDAP D. NIS+ and LDAP
B. LDAP and AD
72
Which feature(s) is supported in NFSv3? A. Dynamic failover B. Stateful failover C. ACLs and ACEs D. Shares mounted separately
A. Dynamic failover
73
By default, what does EMC Isilon search for when looking up user ID mappings? A. Same name in file provider B. Presence of a UID/GID C. Same name in LDAP D. uidAttribute is AD
B. Presence of a UID/GID
74
Which feature distinguishes SMBv2 from SMBv1? A. Endurant file handler B. Stateless protocol C. Change notification D. Packet signing
A. Endurant file handler
75
An organization has two different Isilon clusters: - Six-node cluster in London, England - Eight-node cluster in Paris, France They are using SynclQ to replicate between the clusters. Each site has access zones configured and SmartConnect Advanced is licensed. The organization is actively engaged in a failover from Paris to London. During testing, they realize that users from the Sales department in Paris are receiving authentication errors from the London cluster. Which step should be taken to troubleshoot this issue? A. Verify that the Sales access zones for Paris are configured on the London cluster B. Verify that the Sales access zones for London are configured on the Paris cluster C. Verify that the SmartConnect zone for Sales in Paris is set to the system access zone 16 / 99 D. Verify that the London cluster retained the Paris user list
A. Verify that the Sales access zones for Paris are configured on the London cluster
76
Which client connection policy is the default? A. Round Robin B. Connection Count C. Network Throughput D. CPU Utilization
A. Round Robin
77
A service provider has an Avamar server supporting many of their customer's backup requirements. They need to create customized reports for each customer for billing purposes. Currently, existing reports on Avamar do not meet this requirement. How can the service provider generate customized reports? A. Configure Crystal Reports to extract data using Avamar MCCLI B. Configure Microsoft Excel to access the Avamar MySQL database C. Use Backup and Recovery Manager to track backup capacity usage per customer D. Use Data Protection Advisor to access the Avamar PostgreSQL database
D. Use Data Protection Advisor to access the Avamar PostgreSQL database
78
Which type of administrator commands does configuration auditing track? A. PAPI-enabled commands B. Commands run by the “root” user C. Commands run by the SystemAdmin and CompAdmin users only D. All UNIX, isi, isi_ and sudo commands
A. PAPI-enabled commands
79
A Dell EMC Isilon administrator wants to create file pool policies using templates available in the operating system. Which management interface is used to create these templates? A. GUI only B. GUI and CLI C. CLI only D. Windows MMC
A. GUI only
80
Which capabilities are enabled after activating an Isilon SnapshotIQ license? A. Create and schedule snapshots, and modify SnapshotIQ settings B. View and delete snapshots, and access snapshot data C. View, create, and schedule snapshots, and access snapshot data D. Create snapshot schedules, access snapshot data, and delete snapshots
A. Create and schedule snapshots, and modify SnapshotIQ settings
81
What client protocols are supported to provide access to EMC Isilon clusters? 17 / 99 A. SMB, NFS, HTTP, FTP, and HDFS B. AFP, CIFS, NFS, TCP, and UDP C. SMB, NFS, HTTP, FTP, and SMTP D. TFTP, CIFS, NFS, SSL, and TCP
A. SMB, NFS, HTTP, FTP, and HDFS
82
While troubleshooting issues with a new directory services added to an Isilon cluster, which command should be used to ensure the configured base DN is correct? A. tcpdump B. nslookup C. ldapsearch D. netstat
C. ldapsearch
83
Which job is a data distribution job on an Isilon cluster? A. FlexProtect B. Collect C. MediaScan D. TreeDelete
A. FlexProtect
84
Which two security roles are required for full administrative privileges when managing an Isilon cluster? A. Security Admin and System Admin B. System Admin and Audit Admin C. Security Admin and Backup Admin D. Backup Admin and Audit Admin
A. Security Admin and System Admin
85
What is EMC best practice for creating more than one snapshot per directory? A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more frequently; use longer expiration periods assigned to snapshots that are generated less frequently B. Create snapshots with longer expiration periods assigned to snapshots that are generated more frequently; use shorter expiration periods assigned to snapshots that are generated less frequently C. Only create snapshots with shorter expiration periods assigned to snapshots that are generated more frequently D. Only create snapshots with longer expiration periods assigned to snapshots that are generated less frequently
A. Create snapshots with shorter expiration periods assigned to snapshots that are generated more
86
A storage administrator has an Isilon cluster consisting of 10 nodes with identical hardware and are members of a single node pool. A 1024Kb file stored on that cluster is protected at N+3n. What is the total number of copies of the file's metadata? A. 3 18 / 99 B. 4 C. 6 D. 5
B. 4
87
By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to "Native" and a user has a synthetic UID? A. RID B. GID C. SID D. UID
C. SID
88
In a Dell EMC Isilon environment, which SyncIQ option can be used to copy the SmartLink file to another cluster that supports CloudPools? A. Deny B. Stub C. Allow D. Force
D. Force
89
Isilon SmartLock Compliance clock has drifted from the system clock. How can the difference between compliance and system clocks be corrected? A. Compliance clock drifts towards system clock automatically B. Compliance clock drift correction is not allowed C. Administrative user “root” can manually adjust the compliance clock D. Administrative user “compadmin” can manually adjust the compliance clock
A. Compliance clock drifts towards system clock automatically
90
Which Dell EMC Isilon cluster quota events can be triggered for a hard quota? A. Soft quota write access denied, grace period expired, write access denied, and report generation failed B. Limit exceeded, limit remains exceeded, grace period expired, and report generation failed C. Limit exceeded, grace period expired, write access denied, and advisory limit exceeded D. Limit exceeded, limit remains exceeded, and write access denied
D. Limit exceeded, limit remains exceeded, and write access denied
91
Which job gathers data for InsightIQ? A. IndexUpdate B. Collect C. Aenalys D. FSAnalyze
D. FSAnalyze
92
An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional, the administrator wants to create specific administrative accounts for specific cluster management activities in different access zones. An administrator of one zone should be able to view or configure objects in a different zone. Which action will address the administrator’s requirements? A. Create ZRBAC role for each zone administrator. B. Create ZRBAC role for the administrator on all access zone. C. Create a separate management subnet for each administrator. D. Create an unique role in the System zone for each administrator.
A. Create ZRBAC role for each zone administrator.
93
What NFS protocols are supported by OneFS v7.2? A. NFSv3 and NFSv4 B. NFSv2 and NFSv3 C. NFSv2 and NFSv4 D. NFSv4 and NFSv4.1
A. NFSv3 and NFSv4
94
What is the maximum number of active Swift connections on a 5-node Isilon cluster? A. 250 B. 500 C. 750 D. 1000
C. 750
95
When using NIC aggregation, which configuration is supported in a Dell PowerScale Gen 6 environment? A. ext-1 and ext-2 of node 1 aggregated together B. ext-1 of node 1 and ext-2 of node 2 aggregated together C. ext-agg of node 1 and ext-agg of node 2 aggregated together D. ext-1 of node 1 and ext-1 of node 2 aggregated together
A. ext-1 and ext-2 of node 1 aggregated together
96
What protection level will guard against three simultaneous node failures anywhere across an EMC Isilon cluster? A. N+4d:2n B. N+3n C. N+3d:1n1d D. N+3d:1n
B. N+3n
97
In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access auditing capability A. NFS, SMB, and HDFS 20 / 99 B. NFS, FTP, and SWIFT C. NFS, SMB, and SWIFT D. NFS, FTP, and HDFS
A. NFS, SMB, and HDFS
98
Which semi-automated process with SyncIQ has the capability to interrupt sync jobs in progress? A. Failover B. Fail back C. Continuous mode D. Initial sync compare
A. Failover
99
A Dell EMC Isilon customer is using scripts based on PAPI to automate some of their storage administration tasks. The cluster is running OneFS 7.2. The PAPI script is using the isi config command, but it returns an error. A. OneFS blocked the use of the isi config command B. isi config command is not a PAPI-aware command C. isi config command is not a OneFS command D. PAPI only uses job engine commands
C. isi config command is not a OneFS command
100
Which component is passive during LACP communication between the cluster and the Ethernet switch? A. MAC address B. Isilon C. Switch D. Smart Connect zone
B. Isilon
101
Which Isilon Job Engine v2.0 component(s) should always be present on every node? A. Three coordinators B. Two managers per job C. Two workers per task D. One director
D. One director
102
Recently, an EMC Isilon cluster was upgraded from version 7.0.2.8 to version 7.0.2.9. What is included in this degree of upgrade? A. Maintenance release, new features, and functions B. Code patch and functionality enhancements C. Major functionality enhancements D. Maintenance release and a substantial product upgrade
B. Code patch and functionality enhancements
103
What are the methods to join a node to an Isilon cluster? A. Configuration wizard, SSH connection, or CLI only B. Serial connection, Configuration wizard, or CLI only C. Front panel display, serial cable, or Configuration wizard only D. Front panel display, Configuration wizard, WebUI, or CLI only
D. Front panel display, Configuration wizard, WebUI, or CLI only
104
Which solution meets the SaaS criteria for a customer that is under-staffed and is having difficulty managing their infrastructure? A. Mozy B. NetWorker C. Isilon D. Recover Point
A. Mozy
105
In a EMC Dell Isilon environment, can different node types be combined into a single tier? A. Yes; only during a cluster upgrade B. Yes; only for disaster recovery configuration purposes C. No; different node types can never be combined D. Yes; only if they have similar performance characteristics
D. Yes; only if they have similar performance characteristics
106
What is the result of mapping POSIX mode bits to a Microsoft Windows ACL on an Isilon cluster? A. No ownership information is lost. B. Process creates a real ACL. C. Security of the file may be increased. D. Multiple user ACEs are collapsed into a single ACE.
A. No ownership information is lost.
107
What is a benefit of storing Hadoop data on an Isilon cluster versus a traditional Hadoop environment? A. In-place analytics B. Requires 3X data mirroring C. NameNode resides on a single node D. Nodes do both computation and storage
A. In-place analytics
108
How is InsightIQ changed when FSA is enabled? A. When enabled, a Job runs on the cluster and collects InsightIQ data B. By default, it runs every hour and monitors cluster performance C. Enabled on a VM or physical server and helps plan SmartPools and file system use D. FSAnalyze queries results from the last InsightIQ run and populates file system reports
A. When enabled, a Job runs on the cluster and collects InsightIQ data
109
What are the minimum requirements needed to enable the Global Namespace Acceleration setting? A. 2.0% of disk capacity must be SSD 5% of the nodes must contain SSDs SmartPools license B. 2.5% of the disks capacity must be SSD SmartPools license C. 1.5% of disk capacity must be SSD 20% of the nodes must contain SSDs D. 20% of the number of disks must be SSDs
C. 1.5% of disk capacity must be SSD
110
When will snapshots with no expiration date be removed from the cluster? A. Manually removed by the cluster administrator B. Upper limit of allowable snapshots is reached C. Cluster free space is less than reserved snapshot space D. Node pool containing the snapshots is full
A. Manually removed by the cluster administrator
111
Which quota type provides a grace period? A. Hard B. Group C. Advisory D. Soft
D. Soft
112
What are the recommended methods for connecting to an EMC Isilon cluster to perform a firmware update? A. PAPI and serial console port B. Telnet and SSH C. PAPI and Telnet D. Serial console port and SSH
D. Serial console port and SSH
113
What is a characteristic of snapshots? A. Snapshot creation time is based on the depth of the directory tree B. Initial snapshot size is based upon the size of files inside the directory C. Snapshots are created almost instantaneously D. During snapshot creation, all pointers to files are moved to the snapshot
C. Snapshots are created almost instantaneously
114
Which CLI command(s) is used to identify how many snapshots are currently on disk? A. isi snapshot snapshots view B. isi snapshot schedules C. isi snapshot settings 23 / 99 D. isi snapshot snapshots list
D. isi snapshot snapshots list
115
What actions can be specified as part of a file pool policy? A. Snapshot storage target Data access pattern Sub pool target B. SSD strategy Spillover target Requested protection level C. Data storage target Requested protection level Data access pattern D. Data storage target Write performance optimization L3 Cache enablement
C. Data storage target
116
In a Dell EMC Isilon environment, which file pool policy job is used to apply the default file pool policy when SmartPools is unlicensed? A. SetProtectPlus B. SmartPools C. FlexProtect D. SmartPoolsTree
A. SetProtectPlus
117
Where is an Isilon Gen 6 node boot drive located? A. On the cache SSD drive at the back of the node B. On the mirrored journal drive C. On the node’s data drives D. On the bootflash drive inside the node
C. On the node’s data drives
118
A systems administrator is migrating existing Microsoft Windows file data to an access zone on the Dell PowerScale cluster. The administrator discovers that two servers are using the same share name in the environment. How can the administrator overcome this migration challenge? A. Add the two AD authentication providers in the access zone to isolate access to the shares B. Configure unique SMB shares in the access zone for each share to be migrated C. Create identical SMB shares in the access zones and change the names when the migration completes D. Merge each share to be migrated into an single SMB share in the access zone
B. Configure unique SMB shares in the access zone for each share to be migrated
119
How does an Isilon cluster account for the ownership of a file where on-disk identity has been set to native? A. All files in exports can only be owned by a UID B. A file will be owned by a user's real SID if no real UID exists for that user C. User identities must be defined through external authentication providers D. All files in shares can only be owned by an SID
B. A file will be owned by a user's real SID if no real UID exists for that user
120
Traditional NAS storage architectures deploy simple two-way failover between two controllers in storage systems, such as highly available configurations. How is the Isilon architecture different in terms of system resiliency and availability? A. OneFS enables each node to have a designated partner node for simple failover between the pair. B. Use of client-side drivers can enable failover to other nodes. C. Isilon clustered architecture deploys standby failover nodes to ensure the highest available solution. D. OneFS enables each node to be a peer to any other node in an Isilon cluster. Any node can take over for any other node.
A. OneFS enables each node to have a designated partner node for simple failover between the pair.
121
When modifying a job, which task can an Isilon administrator perform? A. Modify job priorities B. Modify job events C. Pause or stop jobs D. Modify job history
A. Modify job priorities
122
What configuration is required for clients to have the same user identity on both source and target clusters? A. Both clusters must be connected to the same LDAP and AD servers B. Both clusters must have the same SMB shares and NFS exports C. The SyncIQ policy must be a 'copy' policy D. The SyncIQ policy must be a 'sync' policy
A. Both clusters must be connected to the same LDAP and AD servers
123
An existing EMC Isilon customer must comply with SEC regulations; they require that their cluster be changed to Compliance mode. How can this best be accomplished? A. Engage Professional Services to guide the change B. License SmartLock and configure it to activate Compliance mode C. Upgrade OneFS to a newer version D. Select Compliance mode from the web administration interface
A. Engage Professional Services to guide the change
124
When configuring link aggregation for 1 GigE interfaces, how will the aggregated interface be represented in a Dell EMC Isilon Gen 5 node? 25 / 99 A. ext-1 B. int-a C. ext-agg D. ext-2
C. ext-agg
125
A storage administrator used the shutdown -p
A. Data can become corrupted on the filesystem
126
You are creating a CNAME record in DNS for an EMC Isilon cluster. Where should you point the CNAME? A. NS record B. A record C. Cluster name D. SSIP
A. NS record
127
During the install, a new EMC Isilon customer insists that they need SmartLock Compliance mode for their cluster. After a few days, they decide they want to revert back to a standard Isilon Cluster. How can this be done? A. Re-image the complete cluster B. Reboot the cluster into standard mode C. Deactivate SmartLock and unlicense the feature D. Downgrade OneFS and disable SmartLock Compliance mode
A. Re-image the complete cluster
128
What is the default limit for the total number of snapshots allowed on an EMC Isilon cluster? A. 1,024 B. 2,048 C. 10,000 D. 20,000
D. 20,000
129
What is the default port that CEE servers listen on? A. 25 B. 80 C. 8443 D. 12228
D. 12228
130
Which access layer determines the file system actions a user can take? A. Permissions B. Protocol C. Identity Assignment D. Authentication
A. Permissions
131
Which Isilon data protection offers additional safety during data rebuilds and is the minimum required protection for node pools containing drives that are 6 TB or larger? A. 3X B. N+2d:1n C. N+3d:1n1d D. N+3d:1n
C. N+3d:1n1d
132
Which element supports source based routing (SBR)? A. IPv4 B. IPv6 C. NFSv3 D. NFSv4
A. IPv4
133
A Dell PowerScale administrator wants to enable quota notifications for their LDAP users. However, the users' email IDs are not updated in the LDAP environment. What needs to be configured? A. Local users and groups B. Mapping rule C. Local provider D. File provider
B. Mapping rule
134
Which feature provides secure file system multi-tenancy access for EMC Isilon clusters? A. DNS zone B. System zone C. Smart Connect zones D. Access zones
D. Access zones
135
Which type of information does Isilon InsightIQ display without enabling FSA? A. Network performance B. Data usage C. Maximum file size D. Node queue depth 27 / 99
A. Network performance
136
A storage administrator is using an Isilon cluster with a large number of clients accessing the same data. Which data layout is best suited for this workflow? A. Mixed B. Streaming C. Concurrency D. Random
C. Concurrency
137
Which command is used to renumber the nodes of an Isilon cluster? A. innset B. ipset C. deliprange / iprange D. interface
A. innset
138
You need to verify the number of IP addresses for a dynamic Smart Connect pool. What formula should you use, where N represents the number of nodes in the cluster? A. N x P, where P is the number of ports B. N x (N + 1) C. (N x N) + 1 D. N x (N - 1)
D. N x (N - 1)
139
In a Dell EMC Isilon SyncIQ policy, what is a feature of the “synchronize” replication type? A. Protects from file deletion on the source and target B. Retains deleted source data on the target C. Protects the source cluster data D. Includes the file filter criteria
C. Protects the source cluster data
140
When performing a patch install during an upgrade in OneFS 8.2.0, how many patches can be installed as part of the upgrade process? A. 0 B. 1 C. 2 D. 3
B. 1
141
Which Isilon cluster quota events can be triggered for an advisory quota? A. Grace period expired Limit remains exceeded 28 / 99 B. Grace period expired Write access denied C. Limit exceeded Limit remains exceeded D. Limit remains exceeded Write access denied
C. Limit exceeded
142
In a Dell EMC Isilon environment, what is the number of tolerable drive failures in an N+3d:1n protection scheme before data loss can occur? A. 1 B. 2 C. 3 D. 4
C. 3
143
A customer is worried about the possibility of exceeding the node pool storage capacity when a data rebuild is required from a failed hard drive. What configuration setting(s) should be verified and included when you configure the cluster? A. Enable VHS, and deny data writes to reserved disk space B. Enable L3 cache C. Enable GNA D. Increase the node pool default requested protection level
A. Enable VHS, and deny data writes to reserved disk space
144
When configuring LACP between an Ethernet switch and an Isilon node, what is an important consideration? A. Isilon cluster side is considered passive B. Switch must be configured as passive C. Dynamic pool must be used D. SmartConnect Advanced must be licensed
A. Isilon cluster side is considered passive
145
A storage administrator added three X410 nodes to an existing cluster with three X400 nodes. However, the administrator did not realize that a decision was made to update the InfiniBand back-end switches from DDR to QDR. Which type of cables must be used to connect the X400 nodes to the new switches? A. Hybrid (QSFP-to-CX4) B. IB (Cx4-to-CX4) C. QSFP (QSFP-to-QSFP) D. Ethernet (DB45 CAT-6)
A. Hybrid (QSFP-to-CX4)
146
A Dell PowerScale cluster has four A200 nodes. The data protection level and access patterns are 29 / 99 set to default values. How many drives, per node, are used to protect a 1 MB file? A. 1 B. 2 C. 3 D. 4
B. 2
147
What is a key benefit that an EMC Isilon cluster provides for a Hadoop environment? A. Name Node caching B. Primary and Secondary Name Node support only C. Metadata striping D. Distributed (Clustered) Name Node support
D. Distributed (Clustered) Name Node support
148
What command(s) must be run to update available service entries for each SmartConnect zone name and SmartConnect zone alias? A. isi auth ads spn check B. isi update C. isi config D. >>> ipset E. isi_for_array -s isi services
A. isi auth ads spn check
149
Which cache stores blocks from previous read and write operations, and interacts with the node's drive subsystem? A. L2 Cache B. Endurant Cache C. L1 Cache D. FAST Cache
A. L2 Cache
150
What is the estimated space savings from audit log compression on an Isilon cluster? A. 25% B. 50% C. 75% D. 90%
D. 90%
151
Which system job pauses all lower priority jobs when initiated? A. ShadowStoreDelete B. MediaScan C. FlexProtect D. SetProtectPlus 30 / 99
C. FlexProtect
152
Which Avamar utility shows the total amount of data in each checkpoint? A. status.dpn B. mccli C. cplist D. cps
D. cps
153
A company has a 4-node Dell PowerScale F800 cluster dedicated for a high-performance workflow. The administrator wants to convert their cluster SSD strategy from SSD metadata read acceleration to L3 cache. What should be considered? A. Selecting L3 cache has no impact on the workflow B. Migration of metadata from the SSDs to L3 cache can take hours C. Once enabled, metadata read acceleration cannot be disabled D. L3 cache is not supported on All Flash nodes
D. L3 cache is not supported on All Flash nodes
154
Which Data Domain feature generates a point-in-time read-only copy of a specified MTree? A. Snapshot B. Checkpoint C. Fastcopy D. Bitmap
A. Snapshot
155
At which level in the network hierarchy is the allocation method configured? A. Subnet B. Pool C. Groupnet D. Rule
B. Pool
156
A customer has 15 X410 nodes in their cluster. What is the difference between N+3n and N+3d:1n1d? A. N+3n requires only 3 nodes minimum in the node pool N+3d:1n1d requires 7 nodes minimum B. N+3n uses multiple drives per node N+3d:1n1d uses a single drive per node C. N+3n stripes across up to 9 nodes N+3d:1n1d stripes across up to 19 nodes D. N+3n provides additional node loss protection N+3d:1n1d provides additional drive loss protection
D. N+3n provides additional node loss protection
157
In Dell EMC Isilon, which license is required to create a read/write copy of data in the same cluster? A. SyncIQ B. SmartQuota C. SmartDedupe D. SnapshotIQ
A. SyncIQ
158
What is an NFSv4 prerequisite? A. Kerberos B. NIS C. DNS D. Realm
C. DNS
159
What are the main functional components of the Job Engine? A. Coordinator, Managers, Phase, Item B. Director, Coordinator, Task, Item C. Managers, Phase, Job, Workers D. Coordinator, Director, Managers, Workers
D. Coordinator, Director, Managers, Workers
160
Which event notification options are available when setting up an Isilon cluster in an SNMP- managed environment? A. SMTP and SNMP B. HTTPS and IMAP C. SNMP and HTTP D. SMTP and HTTP
A. SMTP and SNMP
161
A storage administrator needs to configure an Isilon cluster to support both UNIX and Microsoft Windows file access to the same directories. Which options, under the ACLs page in the web administration interface, can be selected for this environment? A. Balanced UNIX only B. Microsoft Windows only Configure permission policies manually C. Balanced Configure permission policies manually D. UNIX only Microsoft Windows only
C. Configure permission policies manually
162
An EMC Isilon customer requires quotas for their users' home directories to prevent the filesystem from filling up. What type of quota is appropriate for users who generate large numbers of temporary files that are quickly deleted? A. Hard quota B. User quota C. Soft quota D. Advisory quota
C. Soft quota
163
What is an advantage of using MTrees in a Data Domain system? A. Allows selective data encryption B. Segregates management and replication traffic C. Allows for management of quotas separately D. Data from different MTrees are not deduplicated against each other
C. Allows for management of quotas separately
164
Recently an EMC Isilon cluster was upgraded from version 7.0.1.3 to version 7.0.2.9. What is included in this degree of upgrade? A. Maintenance release, new features, functions, and fixes B. Code patches and minor functionality enhancements only C. Major change in functionality, new features, and functions D. Code patches and minor fixes only
A. Maintenance release, new features, functions, and fixes
165
What is the only way a Microsoft Windows user can restore data from a snapshot? A. Snapshot schedule is enabled on the cluster B. Snapshot licenses are enabled on the cluster C. User can never directly perform a restore from a snapshot D. Shadow Copy Client is installed locally on their computer
D. Shadow Copy Client is installed locally on their computer
166
An EMC Isilon cluster running OneFS version 7.1.1.1 needs to have its drive firmware updated via DSP. What is the cluster status during the update? A. Nodes remain online during the update, but will require rebooting when all drives are updated B. Nodes on the cluster remain online during the drive update process C. Nodes will be offline during the drive update process and be brought online when all drives are updated D. Nodes will be offline during the drive update process and reboot when all drives are updated
B. Nodes on the cluster remain online during the drive update process
167
If a company is required to comply with Governance and National Security standards, which Data Domain feature should be recommended? 33 / 99 A. Retention Lock Compliance B. Retention Lock Governance C. Encryption D. Extended Retention
A. Retention Lock Compliance
168
A NetWorker customer wants to copy data from a DDBoost device to tape for a long-term archive. Which feature is used to create the tape copy of the data? A. Clone Controlled Replication B. Direct File Access C. Cloning D. Staging
C. Cloning
169
Which access protocols are included in the Isilon auditing capability? A. NFS, FTP, and HDFS B. SMB, FTP, and Swift C. NFS, SMB, and Swift D. NFS, SMB, and HDFS
D. NFS, SMB, and HDFS
170
What is the maximum number of data stripe units contained in a file stripe? A. 8 B. 16 C. 64 D. 128
B. 16
171
An organization wants to monitor disk performance on their Isilon cluster. Which software module will provide this functionality? A. InsightIQ B. SmartQuotas C. SmartConnect D. SmartPools
A. InsightIQ
172
While in a diagnostic mode, a NetWorker administrator sets the Retention Policy for a client as three months. However, the administrator was not able to select the Browse Policy for this client. What restricts the administrator to select the Browse Policy? A. Disable diagnostic mode and set desired Browse Policy B. Restart GST services on NMC host C. Enable debug mode and set the Browse Policy D. Browse Policy will be the same as Retention Policy and cannot be changed
D. Browse Policy will be the same as Retention Policy and cannot be changed
173
Which network technology is used to connect the backend of an EMC Isilon cluster? A. InfiniBand B. Serial Attached SCSI C. Fibre Channel D. 10Gb Ethernet
A. InfiniBand
174
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled. What serial settings must be used to initially configure this cluster? A. 9,600 bps, 8 data bits, no parity, 1 stop bit, hardware flow control B. 38,400 bps, 8 data bits, no parity, 1 stop bit, software flow control C. 115,200 bps, 8 data bits, no parity, 1 stop bit, hardware flow control D. 128,000 bps, 8 data bits, no parity, 1 stop bit, software flow control
C. 115,200 bps, 8 data bits, no parity, 1 stop bit, hardware flow control
175
Based on the output shown below, which user(s) has Read and Write privileges to file1.txt? ls -l file1.txt -r-xrwxr-x 2 Oracle admin 512 Dec 19 06:17 file1.txt Users: uid=10(Oracle) gid=1000(it) groups=600(finance),20(staff),300 engineering) uid=20(Pete) gid=500(admin) groups=600(finance),300(engineering uid=30(Greg) gid=1000(it) groups=600(finance),20(staff),500(admin) A. Pete only B. Pete and Greg C. Oracle only D. Pete, Greg, and Oracle
B. Pete and Greg
176
Which command provides cluster statistics including protocol, disk input, and disk output? A. isi statistics client B. isi statistics system C. isi statistics drive D. isi statistics protocol
B. isi statistics system
177
How does Isilon One FS use data striping to accomplish redundancy within the cluster? A. Across nodes B. Across RAID group C. Across disks D. Across volumes
A. Across nodes
178
What does auditing keeps track of? A. Data that is accessed, modified, created, and deleted 35 / 99 B. Jobs that are scheduled, modified, created, and deleted C. Data that is backed up, restored, created, and deleted D. Jobs that are running, stopped, paused, and resumed
A. Data that is accessed, modified, created, and deleted
179
A Dell EMC Isilon customer wants to upgrade their cluster from OneFS version 7.2.1.0 to 8.0. What should the customer be made aware of before proceeding with the upgrade? A. All upgrades to OneFS 8.0 from earlier versions are rolling upgrades B. Upgrading and rebooting cluster nodes are performed one node at a time C. All upgrades to OneFS 8.0 from earlier versions are simultaneous upgrades D. Direct upgrades to a supported version are possible even if the current version is not supported
C. All upgrades to OneFS 8.0 from earlier versions are simultaneous upgrades
180
A customer has an existing cluster with 10 S200 nodes in a single node pool, and 15 NL400 nodes in a second node pool. They need to add capacity to their S200 node pool. The sales team has indicated they should purchase an S210 node to obtain the additional capacity. What is required to add the new node to the existing node pool? A. S210 node must have the same number and capacity of HDDs and SSDs as the S200s B. S210 node must have the identical memory capacity as the S200s C. S200 nodes must be upgraded to the same firmware as the S210s D. S200 node pool must be modified to use L3 cache
A. S210 node must have the same number and capacity of HDDs and SSDs as the S200s
181
Which command is used to display the on-disk permissions and print Microsoft Windows ACLs from the security descriptor? A. ls –l B. chmod +a C. chmod +ai D. ls -le
D. ls -le
182
A storage administrator wants to gather NFS performance numbers on an Isilon cluster. The administrator does not currently have a license for InsightIQ. What is another Isilon tool that can be used to monitor the cluster? A. isi statistics B. isi nfs C. isi set D. isi networks
A. isi statistics
183
Which Isilon cluster quota events can be triggered for a soft quota? A. Soft quota limit exceeded, limit remains exceeded, grace period expired, and write access denied. B. Soft quota limit exceeded, grace period expired, write access denied, and advisory limit exceeded. C. Soft quota limit exceeded, limit remains exceeded, grace period expired, and report generation failed. 36 / 99 D. Soft quota write access denied, grace period expired, write access denied, and report generation failed.
A. Soft quota limit exceeded, limit remains exceeded, grace period expired, and write access denied.
184
Which job can be triggered by an such as a drive failure? A. Media Scan B. Collect C. Flex Protect D. Multi Scan
C. Flex Protect
185
Which protocol is used for communication between an Isilon InsightIQ virtual appliance and external storage for monitoring data? A. NFS B. HDFS C. HTTP D. SMB
A. NFS
186
What happens in the Job Engine v2.0 when an error occurs in a phase on an Isilon cluster? A. Job is marked failed B. Job pauses C. Phase pauses D. Task fails
A. Job is marked failed
187
Which use case is a candidate for Dell EMC Isilon SmartDedupe? A. Large number of files across different node pools B. Files with large numbers of copies in snapshots C. Large number of files on a single node pool D. Large number of files that are smaller than 32 KB
C. Large number of files on a single node pool
188
What is required to join an EMC Isilon cluster to an Active Directory domain? A. Microsoft Management Console B. Organizational Unit C. Domain account with rights to join domain D. Reverse lookup zone
C. Domain account with rights to join domain
189
What is a best practice for configuring ESRS for an EMC Isilon cluster? A. Use IPs from static Smart Connect zones B. Use IPs from the node with the lowest LNN C. Use IPs from dynamic Smart Connect zones 37 / 99 D. Use IPs from the node with the highest LNN
A. Use IPs from static Smart Connect zones
190
Which daemon accepts client SMB connections on an EMC Isilon cluster? A. lwiod B. smbd C. srvsvcd D. winbindd
A. lwiod
191
When an Isilon ACL policy is configured as Windows only, what is the default behavior when a UNIX NFSv3 client executes a chmod command? A. Existing synthetic ACL is converted to a Windows ACL B. chmod request is granted and a Windows ACE is added into the ACL file C. UNIX client receives an error on the chmod request D. Existing Windows ACL is converted to UNIX security
C. UNIX client receives an error on the chmod request
192
What administrative access methods are secured by RBAC? A. Platform API and Secure Shell B. Platform API and SNMP C. Secure Shell and SNMP D. SNMP and Secure Shell
A. Platform API and Secure Shell
193
In an Isilon environment, which roles are required to provide full administration privileges to the cluster? A. SystemAdmin and SecurityAdmin B. SystemAdmin and AuditAdmin C. VMwareAdmin and AuditAdmin D. SecurityAdmin and VMwareAdmin
A. SystemAdmin and SecurityAdmin
194
Which access layer determines how an EMC Isilon cluster is reached? A. Protocol B. Identity Assignment C. Authentication D. Permissions
A. Protocol
195
After running EMC Isilon Smart Dedupe for several weeks, a customer complains about the read performance of the deduplicated directories. What steps should be taken to solve this problem? A. Rehydrate the files 38 / 99 Add paths to the deduplication config B. Rehydrate the files Remove the problem path from the deduplication config C. Rehydrate and then re-deduplicate the files Add paths to the deduplication config D. Rehydrate and then re-deduplicate the files Remove the problem path from the deduplication config
B. Rehydrate the files
196
In a NetWorker environment, if a Virtual Synthetic Full operation fails, NetWorker defaults to creating which type of backup? A. Synthetic Full B. Incremental C. Traditional Full D. Cumulative-Incremental
A. Synthetic Full
197
How many disks can fail per disk pool in an N+3d:1n protection scheme before data loss occurs? A. 1 B. 2 C. 3 D. 4
C. 3
198
A Dell PowerScale cluster administrator notices that the capacity of one of the node pools is at 82%. What action is recommended? A. Add more nodes to the node pool B. Add larger capacity drives to the node pool C. Enable global spillover on the node pool D. Redirect writes from the node pool
A. Add more nodes to the node pool
199
When implementing a new Isilon cluster, DNS entries are added to a company's environment that looks like the following: Isilon_node1.isilon.clustercom AAAA fd18:b23e:1659:ad42:0:0:a:a9 What does this entry indicate? A. AAAA record maps hostname to a 32-bit IPv4 address B. AAAA record maps hostname to a 64-bit IPv4 address C. AAAA record maps hostname to a 64-bit IPv6 address D. AAAA record maps hostname to a 128-bit IPv6 address
D. AAAA record maps hostname to a 128-bit IPv6 address
200
What condition must a directory be in before it can be made into an Enterprise SmartLock directory? A. Empty 39 / 99 B. Not existing C. Non-WORM directory D. Compliance SmartLock directory
A. Empty
201
An EMC Isilon administrator configures the cluster's ACL policy to Balanced. After a file or folder on EMC Isilon has been given a Windows ACL, how are the UNIX mode bits displayed for NFSv3-connected clients? A. Evaluated and recalculated independently of the ACE B. Evaluated and recalculated independently of the ACL C. As an estimation of the effective permissions granted by the ACL D. As an exact replica of Windows share-level permissions
C. As an estimation of the effective permissions granted by the ACL
202
What is the maximum number of nodes that can be added into a node pool in Isilon Gen 5 hardware and OneFS 8.2.0? A. 144 B. 252 C. 288 D. 352
A. 144
203
In an Isilon environment, which type of identity information is stored in an access token? A. Primary and secondary identities B. Group identities C. Primary identities only D. Mapped identities
A. Primary and secondary identities
204
A storage administrator is planning a firmware update on a cluster with 10 x NL400, 72 TB nodes. The update will take place during a period of low activity. Approximately how much time would the update of the cluster take? A. 1 Hour and 40 minutes B. 3 Hours and 20 minutes C. 50 minutes D. 2 hours and 30 minutes
A. 1 Hour and 40 minutes
205
What SSD strategy provides similar behavior as L3 cache? A. Use SSDs for metadata read acceleration B. Use SSDs for metadata read/write acceleration C. Use SSDs for data and metadata D. Avoid SSDs
A. Use SSDs for metadata read acceleration
206
After starting a SyncIQ failover disaster recovery test, the Dell PowerScale administrator is told to cancel the test. Data on the target site has been modified. What will happen to the modified data on the target site if the administrator reverts the failover operation? A. Reverted to the source site B. Maintained C. Discarded D. Snapped and snap reverted
C. Discarded
207
An organization requires the ability to segregate various administrative rights. Which EMC Isilon feature enables this functionality? A. RBAC B. SmartConnect C. SmartLock D. InsightIQ
A. RBAC
208
A systems administrator has assigned the following permissions to a set of directories: POSIX 777 root:wheel /ifs POSIX 755 root:wheel /ifs/boston POSIX 750 root:wheel /ifs/boston/financ Real ACL "DEES\finance" "Full Control" /ifs/boston/finance/payroll Real ACL "DEES\finance" "Modify" /ifs/boston/finance/payroll/johndoe.xls After the permissions change, a user from the "DEES\finance" group experienced access issues when opening the johndoe.xls file. Which action will help resolve this problem? A. Make the "DEES\finance" "Full Control" privilege inheritable for /ifs/boston/finance/payroll B. Add "DEES\finance" "Read" privilege to /ifs/boston/finance/payroll/johndoe.xls C. chmod 755 /ifs/boston/finance D. chmod 777 /ifs/boston
C. chmod 755 /ifs/boston/finance
209
Continuous Availability gives which version of SMB the ability to transparently fail over? A. 1 B. 2.0 C. 3 D. 2.1
C. 3
210
A Dell EMC Isilon administrator has granted a user read-only permission at the share level. In addition, the user has read/write permission from the Microsoft Windows ACLs. What is the user's effective permission on the share? 41 / 99 A. Read/write and modify B. Read/write only C. Read and modify D. Read-only
D. Read-only
211
An Isilon cluster with three S210 nodes and three NL400 nodes was expanded to 18 nodes (15 x S210, 3 x NL400). You have been asked to revise the data protection policy initially set to N+3d:1n while optimizing the available writable disk space. What is the recommended data protection strategy for each pool and will the data protection overhead average increase or decrease? A. S210 node pool changes to N+2d:1n NL400 node pool changes to N+2d:1n B. S210 node pool changes to N+2n NL400 node pool remains N+3d:1n C. S210 node pool remains N+3d:1n NL400 node pool changes to N+2d:1n D. S210 node pool remains N+3d:1n NL400 node pool changes to N+2n
A. S210 node pool changes to N+2d:1n
212
What actions or features does SyncIQ provide with regard to DR failover and fail back? A. Cluster preparation activities B. Required networking changes C. DNS changes D. Client redirection
A. Cluster preparation activities
213
You are reviewing the Dell EMC Isilon Configuration Guide for file sizes and workflows. Which tab in the Configuration Guide contains this information? A. Topology B. Design Intent C. Extended D. Core
B. Design Intent
214
In OneFS, what are valid identifiers when comparing an access token to file authorization data? A. SID, UID, and GID B. SID only C. UID and GID only D. File owner and SID only
A. SID, UID, and GID
215
In a Dell EMC Isilon environment, which aggregation mode is considered "dynamic"? 42 / 99 A. FEC B. LACP C. Round Robin D. Active/Passive Failover
B. LACP
216
What can be modified in the subnet settings on an Isilon cluster? A. VLAN ID B. SmartConnect zone name C. Interface membership D. Access zone membership
A. VLAN ID
217
What is the default behavior when a UNIX NFSv3 client executes a chmod command when the EMC Isilon ACL policy is configured as Windows only? A. The UNIX client receives an error on the chmod request B. The chmod request is granted and a corresponding Windows ACE is added into the file or folder's ACL C. The existing Windows ACL is converted to UNIX security D. The existing synthetic ACL is converted to a Windows ACL
A. The UNIX client receives an error on the chmod request
218
What is the target of a Dell PowerScale OneFS snapshot logical pointer? A. Volume B. Stripe C. File system D. Directory
D. Directory
219
What is the order of precedence for NFS export policies? A. 1. Clients 2. Always RO clients 3. Always RW clients 4. Root clients B. 1. Always RW clients 2. Always RO clients 3. Root clients 4. Clients C. 1. Root clients 2. Always RW clients 3. Clients 4. Always RO clients D. 1. Always RO clients 2. Root clients 43 / 99 3. Clients 4. Always RW clients
A. 1. Clients
220
A customer has configured a cluster in Compliance mode. The customer is only using Enterprise SmartLock and non-WORM directories. What mechanism is used to control the data retention expiration period? A. System clock B. Compliance clock C. Autocommit period D. Minimum retention period
A. System clock
221
Where are the compressed, on-disk audit logs located? A. /var/log/node<#>/audit_protocol.log B. /var/log/audit_config.log C. /ifs/.ifsvar/audit/logs/node<#>/topic D. /ifs/.ifsvar/audit/audit.log
C. /ifs/.ifsvar/audit/logs/node<#>/topic
222
Recently a new OneFS version was implemented on an EMC Isilon cluster to perform code patches and minor functionality enhancements. Which version upgrade is an example of this type of upgrade? A. 7.2.0.0 -> 7.2.0.1 B. 7.0.2.8 -> 7.1.0.0 C. 7.1.1.3 -> 7.0.2.9 D. 6.5.5.7 -> 7.0.2.12
A. 7.2.0.0 -> 7.2.0.1
223
A Dell PowerScale administrator is retiring older nodes from their 60-node Gen 5 cluster. After SmartFail is used on the 20 targeted nodes, the administrator is notified that data access is much slower. However, they find no issues with the network bandwidth. What is a possible reason for the slower access issue? A. SSD total capacity dropped below 1.5%, disabling GNA automatically B. SmartFail disabled the L3 cache and must be enabled manually C. Manage I/O optimization settings were not re-enabled D. SSDs are no longer used for SmartCache prefetching
A. SSD total capacity dropped below 1.5%, disabling GNA automatically
224
An Isilon administrator was unsuccessful when adding a new node to an existing Isilon cluster using the Nodes LCD panel. What is a possible cause? A. Internal join mode has been set to ‘secure’ B. Internal join mode has been set to ‘manual’ 44 / 99 C. Nodes can only be added through the console port D. Nodes can only be added through the web administration interface
A. Internal join mode has been set to ‘secure’
225
What is the best practice for configuring shares, exports, and quotas when implementing DR on the source and target clusters? A. Change all quotas to soft quotas on the target cluster B. Configure the source side only when creating shares, exports, and quotas C. Use the exact same names for shares and same aliases for exports D. Use SyncIQ to replicate shares, exports, and quota settings
C. Use the exact same names for shares and same aliases for exports
226
What is the maximum stripe width, including both data and protection, for Protection Level N+4d:1n? A. 8 B. 16 C. 20 D. 30
C. 20
227
A customer has recently purchased a Dell EMC Isilon cluster and wants to use the cluster as a cloud service provider. OneFS 8.x Groupnet and Access zones were recommended for this purpose. What is the primary benefit of this approach? A. Each client can have their own SmartPool policy B. Each client can have their own authentication provider C. Each client can have their own VHS strategy D. Each client can have their own ACL policy
B. Each client can have their own authentication provider
228
A Dell EMC Isilon customer upgraded their cluster from 7.1 to 8.0. Some of their UNIX users can no longer access the cluster. After investigating the issue, you discover that only the UNIX systems using NFSv2 are having issues. What is a possible cause for these issues? A. Cluster read/write clients are deleted B. NFSv2 is not supported on OneFS 8.0 C. Only the "Security Flavors" are upgraded D. Upgrade is destructive to NFS exports
B. NFSv2 is not supported on OneFS 8.0
229
Which type of administrator commands are tracked by configuration auditing? A. Commands run by the root user B. PAPI-enabled commands C. Commands run by the SystemAdmin and CompAdmin roles only D. All UNIX, isi, isi_, and sudo commands
B. PAPI-enabled commands
230
How many Active Directory provider instances can be configured per access zone? A. 1 B. 2 C. 3 D. 4
A. 1
231
What information is displayed by the isi_hw_status command? A. Hardware components and selected statistics B. Health status of both NVRAM batteries C. Subnet and pool membership for the interfaces D. Status of drives in the node
A. Hardware components and selected statistics
232
What accurately describes the behavior of InsightIQ with FSA enabled on an Isilon cluster? A. FSA job runs at 22:00 hours every night by default B. Storage usage statistics will be less accurate C. A separate FSA license is required D. Total number of monitored nodes capacity is reduced by half
A. FSA job runs at 22:00 hours every night by default
233
A new cluster consisting of S nodes and NL nodes is created. SmartPools is unlicensed. Where will the data be written? A. To the node pool with the highest percentage of available space B. To the S node pool first, then to the NL node pool C. To the node pool that was created first, irrespective of node type D. To the NL node pool first, then to the S node pool
A. To the node pool with the highest percentage of available space
234
What are the notification options for Smart Quotas? A. Write to a syslog B. Write to a CEE server C. Send a trap to an SNMP server Generate an event on an SNMP server D. Send an email Generate a cluster event
D. Send an email
235
When configuring a DR cluster with SyncIQ, what should be considered with respect to SmartQuotas? A. Never set hard quotas on SyncIQ target directories B. Always set hard quotas on SyncIQ target directories C. Replicate SmartQuota settings on both source and target clusters 46 / 99 D. If the target cluster is smaller, configure SmartQuotas to limit the SyncIQ target
A. Never set hard quotas on SyncIQ target directories
236
An organization has an Isilon cluster with 15 S210 nodes in a single node pool and 20 NL400 nodes in a second node pool. Which requirements must be achieved before Global Namespace Acceleration can be activated? A. All S210 nodes must contain at least one SSD drive SSD capacity must be at least 2.25% of the total cluster space B. At least seven S210 nodes must contain at least one SSD drive SSD capacity must be at least 1.5% of the total cluster space C. All S210 nodes must contain at least one SSD drive SSD capacity must be at least 20% of the total cluster space D. All S210 nodes must contain one SSD drive SSD capacity must be at least 0.5% of the total cluster space
B. At least seven S210 nodes must contain at least one SSD drive
237
A customer management team requires a data retention system. They need to be able to remove files if necessary and retain full cluster management capabilities. What Smart Lock configuration would you recommend to meet their requirements? A. Compliance mode cluster Enterprise Smart Lock directories with privileged deletes off B. Standard Isilon cluster Enterprise Smart Lock directories with privileged deletes off C. Compliance mode cluster Compliance Smart Lock directories with privileged deletes on D. Standard Isilon cluster Enterprise Smart Lock directories with privileged deletes permanently disabled
B. Standard Isilon cluster
238
Which protocol is used for communication between an Isilon InsightIQ virtual appliance and an end- user system? A. HTTP B. HDFS C. NFS D. SMB
A. HTTP
239
A systems administrator is attempting to manage a Dell PowerScale cluster using the web administration interface. However, some configuration tabs are not displayed. What is the most likely cause of this issue? A. Some features have not been licensed B. Administrator did not log in as CompAdmin C. RBAC has been implemented D. Access zones have been created 47 / 99
C. RBAC has been implemented
240
Based on the command output shown in the exhibit, what does the "+" represent? A. File's mode bits take precedence B. root is a super user C. File has a synthetic ACL D. File has an advanced ACL
D. File has an advanced ACL
241
A financial institution has recently purchased a Dell EMC Isilon cluster. Due to strict regulatory retention guidelines, they plan to use the SmartLock Compliance feature for the cluster. What accurately describes the SmartLock Compliance feature for committed data? A. Data can be modified after the retention period by disabling the SmartLock feature B. System clock can be adjusted to change the retention period and then the data can be deleted C. Data cannot be deleted before its retention period expires D. Only the root user can delete the data with privileged access before the retention period
C. Data cannot be deleted before its retention period expires
242
Where are audit events logged? A. Locally on each node B. /ifs/.ifsvar C. On the node with the lowest LNN D. /ifs/.cluster
A. Locally on each node
243
An implementation engineer has just joined an EMC Isilon cluster to an Active Directory domain. The System zone of the cluster is set to default values. Which AD object is automatically added to the cluster’s administrator group? A. Domain Admin group B. Domain Admin user C. Local Administrators group D. Local Administrator user
A. Domain Admin group
244
What is required to configure link aggregation on an Isilon cluster? 48 / 99 A. Aggregate the same interface on multiple nodes and use different aggregation modes for each pool B. Aggregate both interfaces on a single node and use different aggregation modes for each pool C. Aggregate the same interface on multiple nodes and only use one aggregation mode for all pools D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools
D. Aggregate both interfaces on a single node and only use one aggregation mode for all pools
245
What are the “Three Vs” describing challenges in managing Big Data? A. Volume, Volatile, Vicinity B. Volume, Velocity, Variety C. Velocity, Volatile, Variety D. Variety, Vicinity, Volume
B. Volume, Velocity, Variety
246
Which process is required to run on each NetWorker Storage Node? A. nsrsnmd B. nsrjobd C. nsrd D. nsrlcpd
A. nsrsnmd
247
An Isilon administrator wants to enable quota notifications for their LDAP users. However, the users’ email IDs are not updated in the LDAP environment. What additional configuration needs to be performed? A. Configured the file provider B. Manage local users and groups C. Configure the local provider D. Configure a mapping rule
D. Configure a mapping rule
248
An administrator wants to enable quotas on a group directory in their Isilon cluster. In addition, the administrator wants to monitor and limit the disk usage. Which type of quotas need to be configured? A. Advisory B. Enforcement C. Accounting D. Soft
A. Advisory
249
What is a characteristic of L3 cache on an Isilon cluster? A. Must be the same size as the L2 cache B. Contents will be persistent through a node reboot C. Only holds file data that has been stored on SSDs D. Accessed only by clients connecting to the node it is on
B. Contents will be persistent through a node reboot
250
A systems administrator needs to change the cluster protection level from N+3n to N+2n. Which interfaces can they use? A. HTTP, WebUI, and CLI B. SFTP, HTTP, and CLI C. PAPI, WebUI, and CLI D. PAPI, WebUI, and SFTP
C. PAPI, WebUI, and CLI
251
A customer requires data retention to meet governmental regulatory requirements. They have asked you to explain the EMC Isilon data retention offerings and how these offerings would meet their requirements. What mechanism ensures that data is retained for the required retention period? A. Compliance clock B. System clock C. Autocommit period D. Minimum retention period
A. Compliance clock
252
What standard reporting types are provided by InsightIQ? A. File system and performance reports B. Trending and capacity reports C. Performance and forecasting reports D. Historical and file system reports
A. File system and performance reports
253
Which CLI command(s) properly turns off an EMC Isilon cluster? A. isi config >>> shutdown all B. shutdown -p now C. isi_flush; halt D. isi config >>> quit
A. isi config
254
On an Isilon cluster running OneFS 7.2, what is the recommended maximum number of SyncIQ policies per source cluster? A. 50 B. 100 C. 200 D. 500
C. 200
255
What is an advantage of managed file replication? A. Removes the media server from the data path when creating duplicates B. Specifically an approach to system mirroring C. User must create and replicate snapshots separately D. Uses the collection log to track and update what is missing on the source
A. Removes the media server from the data path when creating duplicates
256
You are using a Windows 2008r2 server and connecting to a share over SMBv2. Where would the session or state information for the connection be maintained? A. Client-connected node only B. Client only C. Client-connected node and client D. All nodes in the cluster
A. Client-connected node only
257
In a Dell EMC Isilon environment, which Gen 6 nodes support 2.5" SAS drives? A. A200 B. H400 C. H500 D. H600
D. H600
258
You want to join your Dell PowerScale cluster with a Microsoft Active Directory (AD) domain. In addition to the AD domain name, what other information is required to join the AD? A. OU name and Kerberos encryption key B. Isilon cluster name and Kerberos encryption key C. AD domain account with rights to join and AD domain account password D. Local account with root privilege and local account password
C. AD domain account with rights to join and AD domain account password
259
You have been tasked with creating file pool policies for a customer as part of the configuration document. Three of the file pool policies are based on matching specific file extensions. What file pool policy filter type should you select? A. Filename B. File type C. File location D. User defined attributes
A. Filename
260
What is the fastest way to back up remote offices? A. Remote library to back up to tape B. Deduplication at the target C. AFTD at the central data center D. Deduplication from the source 51 / 99
D. Deduplication from the source
261
What additional Hadoop feature is provided by an EMC Isilon cluster environment? A. Multi-protocol access to HDFS data B. Reduced compute time C. Dependent compute and storage scaling D. Same security authentication as Hadoop
A. Multi-protocol access to HDFS data
262
A storage administrator needs to create a file pool policy to move files that have not been changed in over two months to their archive tier. The Tiers of nodes with faster and slower node pools already exist. Which file matching criterion should be used to meet this requirement? A. atime is older than 2 months ago B. birthtime is older than 2 months ago C. ctime is older than 2 months ago D. mtime is older than 2 months ago
D. mtime is older than 2 months ago
263
In a Dell EMC Isilon environment, what happens when executing a failover revert? A. Undoes a failback job in progress B. Undoes a failover job in progress C. Redirects clients to the target cluster D. Redirects clients to the source cluster
B. Undoes a failover job in progress
264
What is the minimum recommended protection scheme for 6 TB drives? A. N+3d:1n B. N+2n C. N+2d:1n D. N+3d:1n1d
D. N+3d:1n1d
265
A company has an Isilon cluster on which they want to configure dynamic pools. The cluster consists of 5 nodes. The pool will consist of one 1Gbps Ethernet external interface on each of the nodes. Because the address space is limited at the company's site, they will need to implement dynamic pools using a minimum number of addresses. If the company puts all interfaces in one pool and sets it to dynamic with round robin failover, how many addresses need to be put into the pool to ensure an even number of IP addresses per node after failover distribution should a node fail? A. 4 B. 8 C. 15 D. 20 52 / 99
D. 20
266
A customer is using an EMC Isilon cluster solely for user's home directories. Secure protocol communication was a requirement in the design of their cluster configuration Which feature of the SMB protocol could be disabled to improve performance? A. Oplocks B. Packet signing C. Credit limits D. Stateful
A. Oplocks
267
If a Dell PowerScale cluster has five unique access zones, in which zone should administration of the cluster occur? A. Any zone can perform administration B. Only access zones for which administration has been enabled C. Zone in which changes need to be made D. Only in the System zone
D. Only in the System zone
268
Which CLI command can be used to display information about requested and actual protection settings on all files in a directory? A. isi zone zones B. isi get C. isi_for_array -s D. isi stat -q
B. isi get
269
What is the correct sequence of actions performed by OneFS to generate an access token? Answer: 53 / 99 270.When they access an EMC Isilon cluster, at which access layer are users associated with a role? A. Permissions B. Identity Assignment C. Authentication D. Protocol
B. Identity Assignment
270
When reviewing the actual protection output of N+4/2, what does the number “4” represent? A. FEC stripe units per stripe B. Hard drives used per stripe C. Volume stripes per file system D. FEC stripe units per file system
A. FEC stripe units per stripe
271
What accurately describes a NetWorker Storage Node? A. Responsible for read and write operations of data B. A dedicated host with a NetWorker database C. Host that maintains NetWorker tracking and configuration information D. Host with a large database to backup itself
A. Responsible for read and write operations of data
272
Which features represent Hadoop? A. Software library framework Single node data storage B. Analyzes data across groups of computers Single node data processing C. Distributed processing of large data sets Single node data storage D. Software library framework Distributed processing of large data sets 54 / 99
D. Software library framework
273
You have been tasked with designing SyncIQ policies for a customer that requires failover and fail back testing. What should you advise the customer? A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ B. SyncIQ will support fail back replication policies that specify directory includes or excludes C. Multiple SyncIQ policies can point to the same directory on the target cluster D. Synchronous replication is supported by SyncIQ
A. Fail back replication policies that specify includes or excludes are not supported with SyncIQ
274
An Isilon cluster has been configured with an autocommit period of 30 minutes for all compliance SmartLock directories. However, the storage administrator has noticed that files recently written to the folders can be deleted or modified. Why is this happening? A. Offset time for autocommit has not been met B. Compliance clock is out of sync with the autocommit function C. Offset time for autocommit has been met D. Manual commit must be used for all compliance SmartLock directories
A. Offset time for autocommit has not been met
275
What can be configured on the SmartPools page in the web administration interface of an Isilon cluster? A. GNA, VHS, L3 cache, Global Spillover B. Address pools, L2 cache, tiers, snapshot storage C. L1 cache, file pool policies, VHS, notifications D. Data access pattern, protection setting, VHS, deduplication
A. GNA, VHS, L3 cache, Global Spillover
276
A drive is being SmartFailed from a node and the data is being rebuilt. Where will the data be rebuilt by default? A. Space reserved as VHS only in the same node pool B. Any available space on the same node pool C. Node pool designated in the global spillover setting D. Node pool specified in the Default file pool policy
B. Any available space on the same node pool
277
An administrator requires SMB Continuous Availability (CA) on all existing SMB shares. What needs to be done to meet this request? A. Nothing; SMB CA is on by default B. All shares must be reshared C. Log into the CLI to access the necessary command D. Run the global command from the web administration interface
B. All shares must be reshared
278
In a Dell EMC Isilon environment, what is a function of the SmartPoolsTree job? A. Directs all files in the cluster to one or more node pools in a single tier B. Allows file pool policies to be applied on a directory rather than on an entire file system C. Enforces the default system pool policies but does not enforce user pool policies D. Maintains the layout of files in the node or file pools according to file pool policies
B. Allows file pool policies to be applied on a directory rather than on an entire file system
279
When using the WebUI to edit an active job, which task can a Dell PowerScale administrator perform? A. Cancel the job B. Change the job priority C. Pause the job D. Restart the job
B. Change the job priority
280
In a Windows ACL, what rules govern how deny permissions are enforced? A. Deny permissions take precedence over allow permissions B. Any inherited permission overrides any explicit permission C. An inherited deny permission overrides an explicit allow permission D. Allow permissions take precedence over deny permissions
A. Deny permissions take precedence over allow permissions
281
In a Dell EMC Isilon environment, what does the command prompt character change to when logged in with only administrator rights? A. Cluster-1# B. Cluster-1% C. Cluster-1* D. Cluster-1:
B. Cluster-1%
282
In a 3-node Isilon cluster using N+1n data protection, a single 128 KB file is written. How are the stripe units distributed over the nodes? A. Node 1: 64 KB stripe unit Node 2: 64 KB mirror Node 3: 64 KB FEC B. Node 1:64 KB stripe unit Node 2: 64 KB stripe unit Node 3: 64 KB FEC C. Node 1: 128 KB stripe unit Node 2: 128 KB FEC D. Node 1: 128 KB stripe unit Node 2: 128 KB mirror Node 3: 128 KB FEC 56 / 99
C. Node 1: 128 KB stripe unit
283
What is the result when SyncIQ is used to replicate a SmartLink file to OneFS 7.2.1? A. Data is deep copied to the destination cluster B. The SyncIQ job fails C. A new Smart Link file is created on the destination cluster D. Contents of the Smart Link file are copied to the destination cluster
A. Data is deep copied to the destination cluster
284
If a Dell EMC Isilon customer is using OneFS v8.0.0.2, what is the maximum number of SyncIQ jobs that can be run concurrently? A. 5 B. 40 C. 50 D. 60
C. 50
285
A customer's Isilon storage administrator is concerned about capacity after recently ingesting 200 TB of file data. The customer has recently added more nodes to the cluster and wants to auto-balance the cluster as soon as possible. The cluster utilization percentages for an average 24-hour period are: - 45% during 00:00-08:59 - 60% during 09:00-17:00 - 30% during 17:01-23:59 While keeping cluster utilization at a minimum, which Impact Policy settings will allow the job to complete quickly without impacting the production workload? A. Medium, Medium, Low. B. Medium, Low, Low. C. High, Medium, Paused. D. High, High, Low.
A. Medium, Medium, Low.
286
Which type of record is needed in DNS to register the name storage.cluster.training.com as 192.168.15.12? A. Name Server B. PTR C. AAAA D. A
D. A
287
An Isilon cluster has ten A200 nodes and the node pool data protection level is set to N+2. The data access pattern is currently set to streaming. If the data access pattern is changed to concurrency, how many stripes for a 1 MB file are moved to the other drive(s)? 57 / 99 A. 0 B. 2 C. 4 D. 6
B. 2
288
Management would like to ensure that all of the dynamic IP addresses from the pool are assigned to ports. Which license needs to be activated to accomplish this? A. Insight IQ B. Smart Pools C. Cloud Pools D. Smart Connect Advanced
D. Smart Connect Advanced
289
What does the FSA job use to track directory activity in OneFS 8.0? A. Customer configured snapshots with a Snapshot IQ license B. Change list API to compare snapshots on the /ifs tree C. Complete LIN scan of the file system D. PAPI interface to query One FS
B. Change list API to compare snapshots on the /ifs tree
290
What is a reason why Dell PowerScale NAS solutions work effectively with Big Data workflows? A. Provide a scale-up solution B. Function as single block-based storage C. Provide multiple aggregates of volumes D. Function as a single repository of data
D. Function as a single repository of data
291
Which RBAC user role(s) provides a user full web administration privileges? A. Audit Admin only B. System Admin and Audit Admin C. System Admin and Security Admin D. Security Admin only
C. System Admin and Security Admin
292
Which setting may be modified on an Isilon cluster by the file system explorer, file pool policies, and the isi set command? A. Data Layout B. VHS Space Reservation C. File Permissions D. Access Zone Membership
A. Data Layout
293
You are using Connection Count to load balance client connections in an Isilon SmartConnect zone. Which connection type is counted when considering which IP to assign? A. Established FTP connections B. Active IP connections C. Active UDP connections D. Established TCP connections
D. Established TCP connections
294
What node pool settings can be modified? A. Tier assignment Requested protection level L3 cache enablement B. Node pool name Requested protection level I/O optimization C. Tier assignment L3 cache enablement I/O optimization D. Node pool name L3 cache enablement Requested protection level
D. Node pool name
295
A customer has a 5 node cluster. Their average file size is 512 KB. The customer requires the ability to withstand a minimum of three simultaneous drive losses without a data loss. What requested protection level should be implemented to minimize protection overhead? A. N+3d:1n1d B. 3X C. N+3n D. N+3d:1n
A. N+3d:1n1d
296
In which directory can you find snapshots stored on an EMC Isilon cluster? A. /ifs/.snapshot B. /ifs/.ifsvar C. /ifs/.isilon D. /ifs/data
A. /ifs/.snapshot
297
In a Dell EMC Isilon environment, what occurs when an Isilon node pool is below the suggested protection level? A. File is striped to an additional drive B. Cluster event is generated C. CELOG event is generated 59 / 99 D. File is mirrored to an additional node
C. CELOG event is generated
298
What accurately describes the behavior of an access token on an Isilon cluster? A. Updated when the client accesses the cluster. B. One token is generated for every access zone. C. Cannot contain both an SID and an UID. D. Requires the use of external authentication providers.
A. Updated when the client accesses the cluster.
299
What will occur when an Isilon node pool is below the recommended protection level? A. CELOG will generate an underprotected event. B. File will be striped to an additional drive. C. File will be mirrored. D. An additional copy of the metadata will be stored on the SSD drives.
A. CELOG will generate an underprotected event.
300
You have just joined an Isilon cluster to an Active Directory (AD). The System access zone of the cluster is set to the default settings. Which AD group is automatically added to the Isilon Users group? A. Domain Users B. Authenticated Users C. Security Admins D. Domain Admins
A. Domain Users
301
Which protocols are referenced when creating multiprotocol permissions in an Isilon implementation? A. NFS and SMB only B. FTP, NFS, and HTTP C. HDFS, SMB, and FTP D. REST and PAPI only
A. NFS and SMB only
302
You are configuring a five-node Isilon cluster with high-density, NL-Series nodes. You want to minimize protection overhead and preserve the required MTTDL requirements. Which protection level is most appropriate for this type of cluster? A. 2X B. N+1n C. N+2n D. N+2d:1n
D. N+2d:1n
303
What is a benefit of the Isilon Data Lake solutions? 60 / 99 A. Protects entirety of lake at same level B. Scale-up approach for petabyte scale C. Block-based storage for large databases D. Stores data from multiple sources
D. Stores data from multiple sources
304
What is the size of the cloud data object on a Dell PowerScale cluster running OneFS 9.0? A. 8 KB B. 128 KB C. 2 MB D. 8 MB
C. 2 MB
305
Which type of node is designed for files that are accessed infrequently, or stored for archival purposes? A. NL-Series B. S-Series C. X-Series D. Backup Accelerator
B. S-Series
306
Which operating system does NetWorker Virtual Edition use? A. RHEL B. SLES C. Solaris D. Windows
B. SLES
307
What is the recommended limit for Access zones in Dell EMC Isilon OneFS 8.0? A. 50 B. 60 C. 70 D. Unlimited
D. Unlimited
308
What is the recommended best practice to delete a container from an Isilon Swift implementation? A. Use the web administration interface B. Use the rmdir command from the Isilon CLI C. Use the DELETE operation to delete the container and its contents D. Ensure the container is empty and then delete the container
D. Ensure the container is empty and then delete the container
309
In an Isilon environment, which physical configuration will enable the internal failover network? A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches. 61 / 99 B. Both int-a and int-b ports of each node in the cluster must be physically connected to one switch. C. Only int-a ports of each node in the cluster must be physically connected to one switch. D. Only int-b ports of each node in the cluster must be physically connected to one switch.
A. Both int-a and int-b of each node in the cluster must be physically connected to separate switches.
310
An organization wants to provide their client with read-only administrative access to their EMC Isilon data cloud. Which role would best provide the access required? A. Audit Admin B. Backup Admin C. System Admin D. Security Admin
A. Audit Admin
311
What is a minimum requirement to enable GNA in an Isilon cluster? A. Four nodes within a cluster contain SSDs B. L3 cache is enabled C. 20% of the nodes contain SSDs D. Total SSD space equals 1%
C. 20% of the nodes contain SSDs
312
What is a characteristic of static pools? A. Will force an IP to remain on a NIC port even if a node fails B. Can assign more than one IP per NIC port in the pool C. When a node fails, will fail over IPs to the node with the lowest LNN D. Must have the same number of IPs in the range as NIC ports in the pool
A. Will force an IP to remain on a NIC port even if a node fails
313
In an Isilon Hadoop configuration, what changes occur in the event there is a failure of an Isilon node running as a NameNode? A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be preserved B. Administrative intervention will be required to failover the NameNode C. Affected node will be SmartFailed since metadata assigned to the failed NameNode can be compromised D. Administrator can configure a replacement NameNode; all metadata will be preserved
A. Another Isilon node will immediately pick up the function of the NameNode and metadata will be
314
Which command(s) writes uncommitted data from NVRAM to disk on an EMC Isilon node? A. isi_flush B. isi devices C. isi config >>> commit D. isi_for_array -s isi update
A. isi_flush
315
What is a reason for implementing a scale-out NAS solution? A. Solution needs to add capacity without adding compute power or bandwidth B. Solution needs specialized controllers that will run in active-active mode C. Performance of the solution needs to scale consistently to hundreds of petabytes D. Components of the solution need to be distributed across different racks for redundancy
C. Performance of the solution needs to scale consistently to hundreds of petabytes
316
How many rack units are required in a Dell EMC Isilon Gen 6 chassis? A. 1U only B. 1U or 2U C. 2U only D. 4U
D. 4U
317
What is a benefit of using access zones on an EMC Isilon cluster? A. Multi-tenancy B. All users can share data access C. Single tenancy D. All groups can share data access
A. Multi-tenancy
318
What are characteristics of deduplication on an EMC Isilon cluster? A. Asynchronous batch job Does not dedupe blocks within files Occurs within node pools B. Runs during file write Does not dedupe blocks within files Occurs within individual tiers C. Asynchronous batch job Dedupes blocks within files Occurs across node pools D. Runs during file write Dedupes blocks within files Occurs across individual tiers
A. Asynchronous batch job
319
Which command can be used to test connectivity from a client to an Isilon cluster? A. nslookup B. netstat C. ping D. ifconfig
C. ping
320
In a Dell EMC Isilon environment, what is a characteristic of dynamic pools? A. Fails over the IP addresses in a pool to the node with the lowest LNN if a node fails B. Must have the same number of IP addresses in the range as NIC ports in the pool C. Forces the IP addresses to stay with the same NIC port, even if a node fails D. Can allocate more than one IP address per NIC port in the pool
D. Can allocate more than one IP address per NIC port in the pool
321
Which features are part of the traditional Hadoop NameNode? A. Filesystem for the metadata One physical server B. Holds Metadata/location data for the cluster Task Tracker C. Filesystem for the metadata Multiple NameNodes D. One physical server Task Tracker
A. Filesystem for the metadata
322
What is the correct sequence of phases taken in a full deduplication job? A. 1. Index updating 2. Duplicate detection 3. Block sharing 4. Sampling B. 1. Block sharing 2. Duplicate detection 3. Index updating 4. Sampling C. 1. Duplicate detection 2. Sampling 3. Block sharing 4. Index updating D. 1. Sampling 2. Duplicate detection 3. Block sharing 4. Index updating
D. 1. Sampling
323
An organization has a five-node standard Isilon cluster. Due to regulatory requirements, they need to build a compliance mode cluster using the existing production hardware. How can this be achieved? A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster B. SmartFail two of the nodes and use them to build a new compliance mode cluster C. Add the SmartLock license to the existing cluster and create some compliance mode directories D. Purchase a new cluster as there is no way to upgrade an existing cluster or reformat nodes 64 / 99
A. Perform an in-place upgrade of the standard cluster to a compliance mode cluster
324
A Dell PowerScale cluster has six A200 nodes and the node pool data protection level is set to N+2. The data access pattern is currently set to streaming. If the data access pattern is changed to random, how many stripes for a 1 MB file are moved to other drives? A. 0 B. 2 C. 4 D. 6
D. 6
325
What is a major advantage of the DSP in version 7.1.1 and later? A. The nodes remain online during the update process B. The updated node remains offline during the process and joins the cluster after the update C. It will update the node firmware non-disruptively D. It automatically updates all drives simultaneously
A. The nodes remain online during the update process
326
A Dell PowerScale administrator wants to list the snapshots only for /ifs/data/stuGG7. Where can they find the snapshots? A. /ifs/.snapshot only B. /ifs/data/stuGG7/.snapshot and /ifs/.snapshot C. /ifs/data/stuGG7/.snapshot only D. /ifs/data/stuGG7 and /ifs/.snapshot
A. /ifs/.snapshot only
327
What is used to reduce the time to ACK to the client for synchronous writes? A. Endurant Cache B. L1 Cache C. FAST Cache D. L2 Cache
A. Endurant Cache
328
An administrator wants to verify that a file has been moved from the Dell PowerScale cluster to the cloud. The cluster is running Dell PowerScale OneFS 9.0. Which command can the administrator use? A. isi cloud pools view B. isi sync target C. isi filepool D. isi get
D. isi get
329
What is required to perform management operations through the web administration interface? 65 / 99 A. An external IP address reachable over TCP port 8080 B. Direct serial connectivity to any node in the cluster C. TCP port 23 open between Isilon and a remote management server D. ConnectEMC services enabled on the cluster
A. An external IP address reachable over TCP port 8080
330
An implementation engineer has just joined an EMC Isilon cluster to an Active Directory (AD). The System zone of the cluster is set to default settings. Which AD group is automatically added to the Isilon cluster’s users group? A. Domain Users B. Local Users C. Everyone D. Domain Admins
A. Domain Users
331
What is the benefit of sub pools within a node pool? A. Drive loss protection is per sub pool B. Increases the number of drives per node available for streaming writes C. Enables multi-tenancy at the node pool level D. Adds a more granular level of storage management
A. Drive loss protection is per sub pool
332
On which port will a NetWorker client listen? A. 7934 B. 7937 C. 7944 D. 7947
B. 7937
333
Upon review of an existing Isilon cluster, a storage administrator discovers that the cluster is in compliance mode. However, some files are beyond their maximum retention period but are not out of the WORM state. How can this condition be explained? A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up B. Files do not age out of compliance and the WORM state cannot be modified once written C. Files were never updated to free up space D. Users specified shorter individual retention periods than the directory configurations
A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up
334
Which benefit does GNA provide to a Dell EMC Isilon cluster? A. Additional level of cache on SSDs used for metadata B. Metadata read acceleration across the cluster C. Namespace read/write acceleration across the cluster D. Metadata read acceleration for only the Job Engine 66 / 99
B. Metadata read acceleration across the cluster
335
A storage administrator has an Isilon cluster consisting of 20 nodes. The nodes have identical hardware and are members of a single node pool. All files are being protected at N+2d:1n. What is the largest file that can be written in a single stripe on this cluster? A. 1024 KB B. 2048 KB C. 2304 KB D. 2560 KB
B. 2048 KB
336
In an Avamar client, what is used to identify unique data? A. Summary Vectors B. Containers C. Fingerprints D. Cache files
D. Cache files
337
What is the purpose of access zones? A. Isolate data for multi-tenancy Control who can access the data in each zone B. Create configuration settings for authentication Provide identity management services on a cluster C. Configure authentication providers Provision protocol directories D. Create mode bits and access control lists Control client access to files and directories
A. Isolate data for multi-tenancy
338
When a Gen 5 node loses power unexpectedly, which cache performs a vault to flash memory in a Dell EMC Isilon environment? A. NVRAM Cache B. DNS Cache C. Endurant Cache D. L1 Cache
A. NVRAM Cache
339
You are configuring an NS record for an EMC Isilon cluster. What is the best practice for naming the NS record? A. Unique name B. Same name as the A record C. Same name as the cluster D. Same name as the Smart Connect zone
B. Same name as the A record
340
A customer has NFSv3 and SMBv2 clients on the same network which need to access a Dell EMC Isilon cluster. Based on best practice, how should the cluster's network settings be configured? A. 1 subnet with 1 pool B. 1 subnet with 2 pools C. 2 subnets with 1 pool each D. 2 subnets with 2 pools each
B. 1 subnet with 2 pools
341
What benefit does GNA provide to the cluster? A. Metadata read acceleration across the cluster B. Namespace read/write acceleration across the cluster C. An additional level of cache on SSDs used for metadata D. Metadata read acceleration specifically for the job engine
A. Metadata read acceleration across the cluster
342
What is provided by using link aggregation? A. Failover mechanism for stateful protocols B. Failover across EMC Isilon cluster nodes C. Failover mechanism for stateless protocols D. Increased overall throughput for a single client
A. Failover mechanism for stateful protocols
343
You configure DataIQ to monitor the Dell PowerScale cluster. You add a subdirectory to the OneFS volume that DataIQ monitors. However, the subdirectory does not appear in the Data Management > Browse page. What action should you take to resolve this issue? A. Include the subdirectories in the data management configuration file B. Add a file type class to the PowerScale volume C. Run a scan on the PowerScale volume D. Adjust the scan exclusions on the Data Management Configuration page
C. Run a scan on the PowerScale volume
344
When a user accesses a file on a Dell PowerScale cluster, what does the cluster use to verify authorization? A. Active Directory call to LDAP B. Configured authentication service C. Access token D. On-disk identity
C. Access token
345
A storage administrator wants to check the current firmware status of an EMC Isilon cluster as quickly as possible. 68 / 99 Which command should you run to non-disruptively check this information? A. isi firmware status B. isi devices C. isi_for_array isi firmware status D. isi_for_array isi devices
A. isi firmware status
346
A customer has implemented SyncIQ as part of their DR strategy. They are now implementing SmartLock for data retention as part of their continued migration to EMC Isilon as their big data NAS storage provider. What advice should be provided to the customer regarding SmartLock directories and SyncIQ? A. Only non-WORM directories can be failed over and failed back B. Only non-WORM and Enterprise SmartLock directories can be failed over and failed back C. Enterprise SmartLock directories can be synchronized to Compliance SmartLock directories D. Compliance SmartLock directories can be synchronized to Enterprise SmartLock directories
A. Only non-WORM directories can be failed over and failed back
347
What is the minimum required information to create an SMB share? A. Specific share permissions B. Access zone C. Export name D. Description
B. Access zone
348
Refer to the exhibit. What is the actual protection level of the FEATURE.wmv file? A. N+2n B. N+1 C. N+2d:1n D. N+2
A. N+2n
349
What is the maximum object size supported by a Dell PowerScale OneFS S3 bucket? A. 8 TB B. 16 TB C. 32 TB D. 64 TB
B. 16 TB
350
A Dell EMC Isilon user is restricted by a 40 GB quota that includes data protection overhead in its 69 / 99 disk usage calculations. If the cluster is configured with a 2x data protection level and the user writes a 10 GB file to the cluster, how much space is consumed? A. 10 GB B. 20 GB C. 30 GB D. 40 GB
B. 20 GB
351
A company has an 8-node F800 Dell PowerScale cluster with two Z9100 Dell Ethernet back-end switches running on OneFS 8.2.0. The company is planning to add 72 H500 nodes to the cluster. What is the minimum number of additional switches needed to support the configuration? A. 5 B. 6 C. 10 D. 12
C. 10
352
During a Dell PowerScale OneFS rolling upgrade, which protocols offer continuous availability functionality? A. NFSv3 and SMB 2.0 B. NFSv4 and SMB 3.0 C. SMB 2.0 and SMB 3.0 D. SMB 2.0 and NFSv4
B. NFSv4 and SMB 3.0
353
A customer has Smart Failed out a node named "node-1", and replaced it with another. The new node has identified itself as "node-8". Which command(s) would allow the customer to change the identity of the new node to "node-1"? A. isi firmware update B. isi update C. isi devices D. isi config >>> lnnset
D. isi config
354
Which feature of the SMB protocol can be used to adjust protocol overhead? A. Change notify B. Stateless C. Credit limits D. Stateful
A. Change notify
355
What type of identity information is stored in an access token? 70 / 99 A. Primary and secondary identities B. Kerberos tokens C. Primary identities only D. Secondary identities only
A. Primary and secondary identities
356
Which protocol connections could seamlessly fail over to another node if an EMC Isilon node became unavailable? A. NFSv4 B. NFSv3 C. HDFS D. SMBv2.1
B. NFSv3
357
In a Dell EMC Isilon environment, what is provided by using the "and" condition in a file pool policy filter? A. Increases the granularity of the file match criteria B. Reduces the number of file pool policies C. Combines multiple file pool policy filters with the same actions D. Broadens the file pool policy match criteria
A. Increases the granularity of the file match criteria
358
An Internet hosting company has customers requesting a total of 200 TB of storage. The hosting company currently has 50 TB of storage available. What should be implemented to satisfy customer requirements? A. Thin provisioning B. Soft user quotas C. Default group quotas D. Advisory user quotas
A. Thin provisioning
359
A given node pool consists of hard drives only (no SSDs). How many drives are included, per node, in a sub pool? A. 2 B. 3 C. 6 D. 12
C. 6
360
Which interface on an Isilon cluster represents an aggregation of interfaces ext3 and ext4? A. ext-agg-2 B. lagg-2 C. ext-agg-3 D. ext-agg 71 / 99
A. ext-agg-2
361
What is a valid hierarchical structure in the Isilon Job Engine v2.0? A. Jobs contain phases B. Tasks contain phases C. Tasks contain jobs D. Items contain tasks
A. Jobs contain phases
362
What security settings are used to calculate effective permissions for Windows clients when accessing a Windows share? A. Combination of share permissions File or folder ACL B. Combination of local security policies File or folder ACL C. Combination of share permissions only D. Windows group policy settings only
A. Combination of share permissions File or folder ACL
363
What is the minimum number of H400 nodes with OneFS 8.2.0 required to create a new Dell PowerScale cluster? A. 3 B. 4 C. 5 D. 6
B. 4
364
A storage administrator has configured two SmartConnect zones on an Isilon cluster labeled ZoneA and ZoneB. Source-Based Routing has been enabled on the cluster. How will the outgoing network packets from the cluster be routed back to the requesting IP? A. Both zones will use the source IP to route the packets. B. Both zones will use the highest priority default gateway. C. ZoneB will route all packets through ZoneA. D. ZoneA will route all packets through ZoneB.
A. Both zones will use the source IP to route the packets.
365
What is the state of the source data when a failover to the target cluster has been completed? A. Read only B. Read/Write C. Files marked as locked by One FS D. Retention rules are applied
B. Read/Write
366
A Dell EMC Isilon administrator wants to configure SnapshotIQ for optimal efficiency for writes after a change is made. Which information should be provided to the administrator? 72 / 99 A. Redirect on Write should always be used B. Optimizing writes is configurable through sysctl C. Copy on Write should always be used D. OneFS optimizes writes by default
D. OneFS optimizes writes by default
367
A storage administrator is planning to perform a node firmware update on an EMC Isilon cluster. What should you do before installing a new firmware package? A. Remove any previously installed firmware package B. Remove any previously installed drive firmware C. Reboot each node before updating the firmware D. Remove any previously installed node firmware
A. Remove any previously installed firmware package
368
A Dell PowerScale OneFS administrator wants to perform a HealthCheck evaluation. Which command should they use? A. isi services healthcheck B. isi monitor healthcheck C. isi healthcheck run D. isi healthcheck schedules
C. isi healthcheck run
369
How many Dell EMC Isilon clusters are supported on a single pair of back-end InfiniBand or Ethernet switches? A. 1 B. 2 C. 3 D. 4
A. 1
370
A storage administrator needs to enable FTP service on an Isilon cluster to allow internal customers to upload files to the company. However, the administrator does not want to create individual user names and passwords for each internal customer. A. Configure LDAP to support anonymous access B. Enable FTP server-to-server transfers C. Enable FTP anonymous access D. Configure Active Directory to support anonymous access
C. Enable FTP anonymous access
371
A storage administrator is migrating existing Microsoft Windows file data to an Isilon cluster. The administrator discovered that two servers are using the same share name in the environment. Which access zone feature will help in implementing this migration? A. Each SMB share can be represented with a unique name B. Each NFS export can be represented with a unique name 73 / 99 C. Each access zone will contain all available SMB shares by default D. Each access zone will contain all available authentication providers by default
A. Each SMB share can be represented with a unique name
372
What is the recommended best practice when setting snapshot deletion schedules? A. Determined by your RTO and RPO SLAs B. Set to six times the length of the snapshot policy period C. Set to delete after the next snapshot is taken D. Set to one year after the snapshot is taken
A. Determined by your RTO and RPO SLAs
373
A company wishes to test automated fail back between two EMC Isilon clusters. What requirements must be met before the test can occur? A. The same version of OneFS must be running on source and target clusters B. The same number of network connections must exist on source and target clusters C. Both clusters must be running OneFS version 7.0 or greater D. Both clusters must have exactly the same type and number of nodes
C. Both clusters must be running OneFS version 7.0 or greater
374
A company has completed DR testing and wishes to quickly reset a cluster via SyncIQ failback for SmartLock directories. What is the quickest way to return a node or group of nodes to an unconfigured state? A. si_reformat_node B. Reformat the nodes with a USB stick C. isi config >>> shutdown all D. SmartFail the nodes out individually
A. si_reformat_node
375
When using the same Active Directory domain for multiple access zones on an Isilon cluster, which configuration must be considered? A. Each access zone requires a unique Active Directory domain B. All configured access zones will use the system zone's configured Active Directory domain C. Each individual access zone must be configured with the Active Directory domain D. Each access zone must be configured using the same Smart Connect zone and pool
C. Each individual access zone must be configured with the Active Directory domain
376
Which RBAC role is required for an administrator to assign other administrators, roles, and priviledges? A. SecurityAdmin B. AuditAdmin C. SystemAdmin D. BackupAdmin
A. SecurityAdmin
377
Where is the boot drive located on a Dell PowerScale Gen 6 node? A. Cache SSD at the back of the node B. Bootflash drive inside the node C. Data drives of the node D. Mirrored journal drive
C. Data drives of the node
378
Which OneFS 8.0 feature can be added to an NFSv4 export to assist with seamless failover in the event of a disconnect? A. Transparent failover B. Stateless connection C. Stateful connection D. Continuous availability
C. Stateful connection
379
What NIC ports could be used in a valid NIC aggregation configuration? A. ext-1, ext-2, ext-3, and ext-4 B. ext-1, ext-2, 10gige-1, and 10gige-2 C. ext-1 and 10gige-1 only D. 10gige-1, 10gige-2, 10gige-3, and 10gige-4
A. ext-1, ext-2, ext-3, and ext-4
380
What is the minimum number of SSIPs required for an EMC Isilon cluster? A. 1 per cluster B. 1 per pool C. 1 per subnet D. 1 per node
A. 1 per cluster
381
An administrator wants to configure antivirus scanning on an Isilon cluster. What is the best way to accomplish this task? A. Isilon web administration interface => Data Protection => Antivirus, and then click "Add an ICAP Server". B. Install the antivirus client on all nodes in the cluster. C. Install the antivirus client on the logical node number in the cluster. D. Isilon web administration interface => Data Protection, and then click "Install Antivirus Client".
A. Isilon web administration interface => Data Protection => Antivirus, and then click "Add an ICAP
382
A customer has created multiple file pool policies on their cluster. Many of the file pool policies include the same filtering criteria. What determines which file pool policy is applied to the file? A. The first matching policy in top-down order B. The first matching policy in bottom-up order 75 / 99 C. File name matches are applied first, followed by File location matches D. File time matches are applied first, followed by File name matches
A. The first matching policy in top-down order
383
An RHEL client is connecting to an EMC Isilon cluster using NFSv3. How is client response traffic routed out of the cluster? A. Highest priority gateway B. 1 GigE NICs on node with highest LNN C. 10 GigE NICs on node with lowest node ID D. Lowest priority gateway
A. Highest priority gateway
384
A company has a Dell PowerScale cluster with Gen 6 nodes. Due to performance issues, they have added four H400 nodes and created a new node pool. The administrator wants to enable metadata read/write acceleration for the SSDs. However, they are not able to do so. What is the reason for this issue? A. L3 cache is enabled on the new node pool and uses all SSDs B. L3 cache is disabled on the new node pool; therefore, acceleration is not available C. Metadata read/write acceleration needs to be enabled in the CLI D. Only metadata read acceleration is supported with Gen 6 H400 nodes
A. L3 cache is enabled on the new node pool and uses all SSDs
385
Refer to the exhibit: A storage administrator has an Isilon cluster with the following: - Five S210 nodes - Eight X200 nodes - Eight NL400 nodes The cluster default protection level is set to N+2n and the administrator has configured the listed file pool policies. A video capture station saves a new file to /ifs/content/ project as intro.mov. Which node pool is the intro.mov file written to and which protection level is applied? A. NL400_Pool at N+3n protection B. S210 _Pool at N+2n protection C. X200_Pool at N+2n protection D. X200_Pool at N+3n protection 76 / 99
A. NL400_Pool at N+3n protection
386
Before deploying a new EMC Isilon cluster you decide to confirm the details of the installation with the customer. The customer would like to make a change to the subnet pools in the configuration guide. What should you do first? A. Contact the design team B. Update the configuration guide C. Contact EMC change control D. Collect system configuration
A. Contact the design team
387
What is the first step to perform a DR failover test? A. Allow client writes to target SyncIQ policy paths B. Run a final incremental sync on each policy failing over C. Take a snapshot of each policy's root path that is being failed over D. Make the source paths of SyncIQ policies unavailable to client writes
D. Make the source paths of SyncIQ policies unavailable to client writes
388
An Isilon administrator needs to create a new Isilon cluster to support high performance and large capacity storage for a streaming media environment. Which node model is recommended? A. HD-Series B. NL-Series C. S-Series D. X-Series
D. X-Series
389
A storage administrator has just configured a newly acquired Isilon cluster. The administrator connected to the console port of Node 1 and created subnets, pools, and two access zones called “Blue” and “Green”. The administrator then created shares in zone “Blue” and is able to access the shares from their Microsoft Windows clients. In addition, the administrator created exports in the “Green” zone and is able to access the exports from their UNIX clients. However, the administrator is unable to SSH into the cluster and login as root. What is a possible cause for this issue? A. No interfaces exist in the System zone B. No authentication providers are defined in the "Blue" and "Green" access zones C. No failover address was configured for the InfiniBand network D. A local user "root" needs to be created
A. No interfaces exist in the System zone
390
You are deploying an EMC Isilon system using one dynamic Smart Connect pool. How many IP addresses are recommended for a cluster with 10 nodes, of which only 6 nodes participate in the pool? 77 / 99 A. 6 B. 10 C. 30 D. 90
C. 30
391
When enabling mount access to subdirectories, what can the user do? A. Read and write files in the parent directory B. Red files in the parent directory C. Browse the directories in the parent directory D. Directly mount a subdirectory of the export
D. Directly mount a subdirectory of the export
392
When using an X410 node containing HDDs and SSDs, which bay numbers are used to contain SSDs in the standard configurations? A. Bays 1 and 2 only. B. Bays 1 through 6. C. Bays 31 through 36. D. Bays 35 and 36 only.
B. Bays 1 through 6.
393
One FS version 8.0 supports how many NFS exports? A. 1,000 B. 10,000 C. 25,000 D. 40,000
D. 40,000
394
What accurately describes the behavior of On Disk Identity set to native on an Isilon cluster? A. A file will be owned by a user's real SID if no real UID exists for that user. B. All files in shares can only be owned by a SID. C. All files in exports can only be owned by a UID. D. User identities must be defined through external authentication providers.
A. A file will be owned by a user's real SID if no real UID exists for that user.
395
Which task requires preparation for successful failover? A. Creating shares and exports on the target cluster B. Using the same cluster name and IP address for source and target C. Breaking the target associations of SyncIQ policies D. Testing each SyncIQ policy to prepare resync policies
A. Creating shares and exports on the target cluster
396
How are events communicated from the CELOG daemon? A. Sent using SNMP only 78 / 99 B. Sent by the CELOG notifications service C. Sent over ESRS only D. Sent by the MCP
B. Sent by the CELOG notifications service
397
A customer wants to test the failover and fail back capabilities of their SmartLock directories using SyncIQ. What should you advise the customer? A. Failover is a one-way event with SmartLock directories B. Fail back is supported with SmartLock directories C. Committed files on the target can be replicated back to the original source directories D. SyncIQ can revert SmartLock directories on the source cluster
A. Failover is a one-way event with SmartLock directories
398
In OneFS 8.2.0, how many snapshots are supported at the cluster and directory levels? A. 20,000 and 1000 B. 20,000 and 1024 C. 40,000 and 2000 D. 40,000 and 2048
A. 20,000 and 1000
399
If an Isilon has been integrated into an existing Hadoop environment, what explains how the HDFS data will be distributed? A. HDFS data on Isilon and computations will be handled by Hadoop B. HDFS data remains on Hadoop; computations is handled by Isilon C. Files are stored in a specialized HDFS compatible file system format on the Isilon cluster D. MapReduce on the Isilon allows data to be distributed across both platforms
A. HDFS data on Isilon and computations will be handled by Hadoop
400
What are the ways in which a FlexProtect job can start in a Dell EMC Isilon environment? A. Using a batch command and event driven B. Using a batch command and manually driven C. Administrative and event driven D. Non-event driven and unscheduled
C. Administrative and event driven
401
What is the maximum audit log size in Isilon OneFS before rolling over to a new file? A. 512 MB B. 1 GB C. 2 GB D. 4 GB
B. 1 GB
402
You have been tasked with creating file pool policies for a customer as part of the configuration 79 / 99 document. The file criteria indicate that directories that have not changed for over 60 days should be moved to the archive tier. What file pool policy filter types should you select? A. File type and mtime B. Filename and atime C. File type and atime D. Filename and mtime
A. File type and mtime
403
What are the On-Disk Identity types that appear in the web administration interface? A. SID, UNIX, and Native B. GUID, UID/GID, and Mixed C. AD, LDAP, and NIS D. SMB, NFS, and Mixed
A. SID, UNIX, and Native
404
Recently a Dell EMC Isilon cluster was upgraded from version 7.2.0.1 to version 8.0.1.0. What was included in this upgrade? A. Major change in functionality in the same family and theme B. Code patches and firmware revisions only C. Code patches and minor functionality enhancements only D. Major changes and potential core modifications to the OS and data structures
D. Major changes and potential core modifications to the OS and data structures
405
What is the difference between dynamic and static link aggregation? A. Dynamic link aggregation can be configured with the web administration interface. Static link aggregation only supports CLI configurations. B. Dynamic link aggregation negotiates with the switch on the aggregation settings. Static link aggregation does not facilitate the negotiation. C. Dynamic link aggregation balances the frames across the aggregated interfaces. Static link aggregation can only failover across the links. D. Dynamic link aggregation supports Round Robin and FEC aggregation modes. Static link aggregation supports Failover and LACP modes.
B. Dynamic link aggregation negotiates with the switch on the aggregation settings.
406
Users are receiving notification they are out of space even though when they calculate their file usage, they should have 20% to 30% more space still available. What is the probable explanation? A. The quotas are set to include protection overhead B. The group usage is included with their user quota C. Snapshot data has not been deleted D. Deleted files have not been removed from their quota
A. The quotas are set to include protection overhead
407
What is a valid simultaneous job combination on an Isilon Engine v2.0? A. One Restripe job, one Mark job, and one All-Other job B. One Restripe job, one All-Other job and one Multiscan job C. One Restripe job and two Mark jobs D. Two Restripe jobs and one All-Other job
A. One Restripe job, one Mark job, and one All-Other job
408
What are the access layers in EMC Isilon clusters? A. Protocol, Authentication, Identity Assignment, and Permissions B. Physical, Network, Transport, and Session C. Network, Authentication, Identity Assignment, and Permissions D. Physical, Network, Transport, and Application
A. Protocol, Authentication, Identity Assignment, and Permissions
409
What is a reason why Isilon NAS solutions work effectively with Big Data workflows? A. Functions as a single repository of data B. Functions as single block-based storage C. Functions as a scale-up solution D. Provides multiple aggregates of volumes
A. Functions as a single repository of data
410
Which feature of the SMB protocol can be tuned to prevent clients from monopolizing EMC Isilon cluster resources? A. Oplocks B. Change control C. Packet signing D. Credit limits
D. Credit limits
411
What is the maximum number of H400 nodes that can be added to a node pool in a Dell PowerScale cluster running OneFS 8.2? A. 144 B. 252 C. 288 D. 352
B. 252
412
What is the maximum number of concurrent active connections that Swift can support, per node? A. 50 B. 100 C. 150 D. 200
C. 150
413
When creating an SMB share on a Dell EMC Isilon cluster, what should the “Directory ACLs” setting be if adding a new share to an existing directory structure? A. Do not change existing permissions B. Apply Windows Default ACLs C. Allow Variable Expansion D. Auto-Create Directories
B. Apply Windows Default ACLs
414
On the Isilon cluster CLI, which command will display the most active nodes every two seconds, from highest to lowest? A. isi statistics system --top --nodes --interval=2 B. isi alert list --newest=2 --nodes=all C. isi devices -a status -d 2 D. isi_for_array -s isi status
A. isi statistics system --top --nodes --interval=2
415
A Dell EMC Isilon customer is using the CloudPool feature to tier some old data to the Microsoft Azure cloud. At the same time, they are using SyncIQ replication to replicate to a disaster recovery (DR) cluster. What accurately describes this implementation? A. SyncIQ replicates POSIX mode bit permissions along with quota information to the DR cluster B. Files stored in the cloud can be read directly from the cloud without any Isilon intervention C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR cluster D. SyncIQ replicates file and directory permissions of files and directories to the DR cluster
C. SyncIQ fetches the tiered data from the cloud to the primary cluster and then replicates it to the DR
416
In an Isilon Gen 6 cluster, what is the minimum number of nodes required to upgrade an existing H500 cluster using A2000 nodes? A. 1 node B. 2 nodes C. 3 nodes D. 4 nodes
D. 4 nodes
417
What is required to enable Secure NFS on an Isilon cluster? A. Services for NFS must be configured in the AD environment B. LDAP must be configured in the system access zone C. NFS access must use static address pools D. Cluster must be configured to use NTP
A. Services for NFS must be configured in the AD environment
418
A systems administrator is planning an extension of a Dell PowerScale Gen 6 cluster. They are asked to provide redundancy at the chassis level. The node pool protection level is +2d:1n. 82 / 99 What is the minimum number of nodes required to ensure that data is not lost when cycling power to a single chassis? A. 20 B. 22 C. 40 D. 42
C. 40
419
Which data access pattern makes the prefetch caching algorithm to be highly aggressive? A. Random B. Parallel C. Concurrency D. Streaming
D. Streaming
420
After operating an EMC Isilon 3-node cluster for some time, a customer notices that the amount of storage used seems significantly larger that it should be. The filesystem has a tremendous amount of small (<128K) files and the protection level is N+2d:1n. The customer does not want to sacrifice data protection. What should be done to increase available capacity? A. Nothing B. Defragment the disks C. Compress the small files D. Change protection to 2x mirroring
A. Nothing
421
You are creating an A record in DNS for client connections. Which IP should you use? A. SmartConnect Service IP B. IP from a dynamic pool C. SmartConnect zone IP D. IP from a static pool
A. SmartConnect Service IP
422
Which identity type is an example of a primary identifier? A. SID B. MPIO C. Username D. PID
A. SID
423
You are configuring DNS to work with SmartConnect zones. What is the best practice recommendation to the customer? A. Set TTL on NS records to zero 83 / 99 B. Use Linux-based DNS C. Use Windows-based DNS D. Set TTL on A records to zero
A. Set TTL on NS records to zero
424
When using SyncIQ on an Isilon cluster, which setting is used to retain deleted files on the target? A. Copy B. Synchronize C. --target-compare-initial sync on the CLI command option D. Capture snapshots on the target cluster
A. Copy
425
What is one requirement to join multiple authentication sources through an access zone? A. Must belong to only the joined access zone B. Must use a common /ifs tree for all access zones C. Must belong to all access zones D. Must only join AD domains in the same forest
A. Must belong to only the joined access zone
426
An Isilon storage administrator has created a 500 GB quota on a new directory called `/ifs/homedirs'. The administrator then begins migrating files from a Linux server through NFS to the new directory. The migration tool returns a "Disk quota exceeded" error and fails to complete after approximately 400 GB of files are copied to the Isilon cluster. However, the cluster is reporting 10 TB of unused capacity. What is the most likely cause for this error? A. Hard quota includes overhead B. SmartPool tier capacity has been exceeded C. Soft quotas have been exceeded D. Only the root can exceed 80% of quota
A. Hard quota includes overhead
427
What authentication providers are supported on EMC Isilon clusters? A. NT, NIS, Open LDAP, Open ID, and Local B. AD, LDAP, NIS, Local, and File C. AD, LDAP, NIS, Local, and Workgroup D. Windows, UNIX, Hadoop, Open Stack, and MAC OSX
B. AD, LDAP, NIS, Local, and File
428
What is the size of a data stripe unit in KB? A. 8 B. 64 C. 128 D. 256
C. 128
429
In a Dell EMC Isilon environment, which protocol supports source-based routing (SBR)? A. IPv4 B. SMBv2 C. IPv6 D. NFSv3
A. IPv4
430
If an RHEL client is connecting to an Isilon cluster using NFSv3 and SBR is disabled, where does client response traffic move out of the cluster? A. Highest logical node B. Highest priority gateway C. Lowest priority gateway D. Lowest logical node
C. Lowest priority gateway
431
Which protocol does Isilon InsightIQ use when accessing its remote datastore? A. NFS B. SMB C. SCSI D. FTP
A. NFS
432
Which type of deduplication is performed by a Dell EMC Isilon cluster? A. Content Level B. File and Block Level C. Block Level only D. File Level only
D. File Level only
433
What information must be generated to access a Dell PowerScale OneFS S3 bucket using an S3 application? A. Secret key only B. Access token and secret key C. Access token and access ID D. Access ID and secret key
D. Access ID and secret key
434
Which jobs are used to help distribute file data across an Isilon cluster? A. Media Scan, Collect, and AV Scan B. Auto Balance, Auto Balance Lin, and Smart Pools C. Auto Balance, Integrity Scan, and Multi Scan D. Integrity Scan, Tree Delete, and Auto Balance
B. Auto Balance, Auto Balance Lin, and Smart Pools
435
An Isilon storage administrator obtained three X-Series nodes and two S-Series nodes for one cluster. What would be the status of the cluster? A. A cluster could be formed with all nodes online and writeable. B. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would be offline. C. A cluster could not be formed until an S-Series node is added. D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would remain in read-only mode.
D. A cluster could be formed. Only the X-Series nodes would be writeable; the S-Series nodes would
436
After configuring a new NTP server in the Active Directory (AD) environment, the Microsoft Windows clients receive authentication failures and cannot connect to the Dell PowerScale cluster. What key condition should the administrator verify? A. Windows clients can connect to the NTP server B. Cluster time is synchronized with the Windows clients C. Windows clients can connect to other servers D. Cluster time is synchronized with the AD time
D. Cluster time is synchronized with the AD time
437
An EMC Isilon cluster is being configured for a Media and Entertainment customer. The customer's workflow consists primarily of video playback, requiring a very aggressive prefetch. What data layout access pattern is appropriate? A. Streaming B. Concurrency C. Random D. Default
A. Streaming
438
What is the correct hierarchy of the Job elements structure? Answer: 86 / 99 440.Which Isilon global cluster settings are managed by Smart Pools? A. L2 Cache, GNS, and VHS B. L3 Cache, GNA, and VHS C. L3 Cache, L2 Cache, and GNS D. L1 Cache, GNA, and VHS
B. L3 Cache, GNA, and VHS
439
The exhibit shows the components of a conventional Hadoop environment. Which component holds the location information for every file in the cluster? A. Name Node: Can comprise one or two physical servers. B. Compute: A logical component which runs on each node. C. Data: A physical component distributed across the cluster. D. 3X mirror: The first three nodes in the cluster configured as a 3X mirror.
A. Name Node: Can comprise one or two physical servers.
440
A Dell PowerScale administrator needs to secure data access with an appropriate Kerberos-based authentication provider in a non-System zone. The configuration requires balancing connections across the IP address pool. What should be configured? A. Access zones only B. SmartConnect zones and access zones C. SmartConnect zones only D. SmartConnect zones and SmartConnect zone aliases
B. SmartConnect zones and access zones
441
Refer to the exhibit. Which port is used to attach the node to the internal network? A. 1 B. 2 C. 3 D. 4
C. 3
442
What is a characteristic of dynamic pools? A. Can allocate more than one IP per NIC port in the pool B. Must have the same number of IPs in the range as NIC ports in the pool C. If a node fails, will fail over the IPs in a pool to the node with the lowest LNN D. Will force the IPs to stay with the same NIC port, even if a node fails
A. Can allocate more than one IP per NIC port in the pool
443
A customer has recently learned about the Dell EMC Isilon Data Lake feature and purchased an Isilon cluster for use with their Hadoop application. 88 / 99 Which components of a Hadoop cluster will be provided by Isilon? A. NameNode and DataNode only B. NameNode and ComputeNode only C. NameNode, DataNode, and ComputeNode D. DataNode and ComputeNode only
A. NameNode and DataNode only
444
Which role-based privilege must be granted to a user before they are allowed to log into the web administration interface? A. ISI_PRIV_AUTH B. ISI_PRIV_LOGIN_PAPI C. ISI_PRIV_CLUSTER D. ISI_PRIV_LOGIN_CONSOLE
A. ISI_PRIV_AUTH
445
An EMC Isilon administrator is attempting to limit disk usage and control the visible capacity of a share to SMB clients. Which quota type gives the administrator this ability? A. Hard quota on Directory B. Hard quota on Group C. Soft quota on Directory D. Soft quota on User
A. Hard quota on Directory
446
Which OneFS 8.0 feature is incompatible with Swift? A. SyncIQ B. Auditing C. Smart Connect D. Dedupe
B. Auditing
447
While troubleshooting an access issue, an administrator receives the isi auth mapping list output from the Dell PowerScale cluster. The corresponding SID is found within the following line: ["ZID:2", "SID:S-1-5-21-2391006495-4839401849-419739012-5522", [["UID:3000001", 144]]] What can the administrator determine from this output? A. Mapping is done in the System access zone and both identities are real B. Mapping is done in a non-System access zone and both identities are real C. Mapping is done in a non-System access zone and SID is the real identity D. Mapping is done in the System access zone and SID is the real identity
B. Mapping is done in a non-System access zone and both identities are real
448
A company has decided that Compliance Mode will not work for them. Which method is required to reset an EMC Isilon cluster from Compliance mode to a standard EMC 89 / 99 Isilon cluster? A. Use isi_reformat_node to reset each node B. Use a USB stick to re-image each node C. Use isi_config >>> reboot all D. Upgrade the cluster
B. Use a USB stick to re-image each node
449
When creating an SMB share on the Isilon cluster, what is the effect of selecting the "Apply Windows Default ACLs"? A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory automatically created. B. File permissions are automatically set to be the same as the share permissions. C. Share permissions' configuration is no longer required as it too will be set to the default values. D. Ownership of all files in the directory will be set to the default user's SID.
A. An ACL with the equivalent of UNIX 700 mode bit permissions is created for any directory
450
Which mechanisms can provide real time notification of Isilon events? A. ESRS, SNMP traps, and SMTP B. SupportlQ, isi statistics, and SNMP polling C. isi_gather_info, SNMP set, and SupportIQ D. SNMP traps, SNMP set, and SNMP polling
A. ESRS, SNMP traps, and SMTP
451
Which Isilon protection setting will require the least percentage of overhead for a 1024 KB file? A. N+3d:1n in a 5-node node pool B. N+2d:1n in a 4-node node pool C. N+1n in a d-node node pool D. N+2n in a 10-node node pool
D. N+2n in a 10-node node pool
452
What are the considerations when a NANON configuration is used? A. Increase frontend I/O ports and aggregated cache. B. Increases capacity and aggregated cache. C. Increases frontend network ports and capacity. D. Increases bandwidth inside the cluster and GbE links.
C. Increases frontend network ports and capacity.
453
What event notification options are available when setting up an Isilon cluster in an SNMP-managed environment? A. HTTPS and IMAP B. SNMP and HTTP C. SMTP and SNMP D. SMTP and HTTP 90 / 99
C. SMTP and SNMP
454
What can be done to add more nodes to an Isilon cluster that has run out of backend switch ports? A. Migrate to larger switches B. Daisy chain new nodes from existing nodes C. Daisy chain new switches from existing switches D. Deploy a new cluster
A. Migrate to larger switches
455
What information is required to configure the LDAP service on a Dell PowerScale cluster? A. Port number, cluster name, and an LDAP server IP address B. Base distinguished name, LDAP provider name, and at least one LDAP server C. Base distinguished name, cluster name, and port number D. Administrator account and password, and LDAP provider name, and LDAP provider IP address
B. Base distinguished name, LDAP provider name, and at least one LDAP server
456
How many drives are used, per node, with the requested protection represented as N+3n? A. 1 B. 2 C. 3 D. The value of n
A. 1
457
Which command provides information about the current operational situation of the cluster, events, and jobs? A. isi status B. isi devices C. isi events D. isi services
A. isi status
458
What is an advantage of an EMC Isilon cluster using a switched star network for backend connectivity? A. Each node in the cluster is one hop away from any other node B. Each node is able to load balance its I/O across the entire cluster C. Additional switches can be daisy chained to existing switches D. The internal network can be used for more than intra-cluster communication
A. Each node in the cluster is one hop away from any other node
459
Which use case is a good candidate for SmartDedupe? A. Large number of files on a single node pool B. Large number of files across different node pools C. Files with duplicate blocks contained within them D. Files that are smaller than 32 K 91 / 99
A. Large number of files on a single node pool
460
For what purpose is quota management an important consideration on both source and target clusters? A. SyncIQ copy policies B. SyncIQ sync policies C. SyncIQ initial sync compare D. Failover and fail back
D. Failover and fail back
461
A customer is examining their CELOG events on their OneFS 7.2 cluster and identifies an event indicating one of their node pools is underprotected. What is the most likely cause of the CELOG event? A. Additional nodes were added to the cluster B. One or more of their nodes are offline C. The OneFS version on the cluster was recently upgraded D. The Default file pool policy requested protection level was modified
A. Additional nodes were added to the cluster
462
A systems administrator has a Dell PowerScale cluster with four A2000 nodes in their environment. The protection setting is 2d:1n at the node pool level. Billions of very small image files, each less than 50 KB in size, are stored on the cluster. The node pool is now approaching full capacity. However, the cumulative size of the files copied appears to be less. What is a possible reason? A. Small files are stored with 4x mirror protection and consuming more capacity B. Metadata for billions of files is consuming most of the capacity C. Small files are stored with triple mirror protection and consuming more capacity D. Small files are spread across all disk pools, causing greater capacity consumption
C. Small files are stored with triple mirror protection and consuming more capacity
463
What is a characteristic of Data Protection Advisor (DPA) cluster implementation? A. Multiple cluster instances are not supported B. A cluster can span different subnets C. All DPA Database nodes must be configured for clustering D. DPA cluster can have a mix of standalone and clustered application nodes
A. Multiple cluster instances are not supported
464
What is the name of the default access zone in an EMC Isilon cluster? A. System zone B. Static zone C. Dynamic zone D. Configuration zone
A. System zone
465
An Isilon administrator restored an individual user’s 30-day snapshot of a directory. However, that individual has now left the company. What must be done to allow another user to access data inside this directory? A. ACL permission must be updated or changed for the directory or file B. ACL permissions are automatically restored matching the new user C. Mode bits on the restored directory are automatically rwxr-xr-- for the new user D. Mode bits on the restored directory are automatically r-xr-xr-- for the new user
A. ACL permission must be updated or changed for the directory or file
466
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled. Which tool can be used to connect to and initially configure a cluster? A. PuTTY B. PLink C. WinSCP D. Telnet
A. PuTTY
467
How many concurrent jobs can the Job Engine run? A. 2 B. 3 C. 4 D. 5
B. 3
468
What is a characteristic of access tokens on an Isilon cluster? A. Can only contain UIDs defined in the LDAP authentication provider B. May contain supplemental groups inserted through use mapping rules C. Updated when the cluster joins the Active Directory D. Dynamic after initial creation of the access token
B. May contain supplemental groups inserted through use mapping rules
469
A company has an Isilon cluster that is joined to an Active Directory (AD) domain. Previously, the company replaced their primary NTP server and added new NTP settings to the Isilon cluster. Now the users are experiencing authentication failures. What is a possible reason for this behavior? A. Cluster and the AD are configured to use the same NTP server. B. AD is not configured to synchronize its time from the cluster. C. SMB time is not configured on the cluster to synchronize with the AD. D. Time between the NTP and the AD differentiates by more than 5 minutes.
D. Time between the NTP and the AD differentiates by more than 5 minutes.
470
What type of zone does SyncIQ require? A. Default B. Dynamic only 93 / 99 C. Static only D. Static or Dynamic
C. Static only
471
Which protocol or daemon is responsible for handling authentication in OneFS? A. lsassd B. lwiod C. AD D. LDAP
A. lsassd
472
Which requirement must be met on an Isilon cluster to be able to enable node compatibility? A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs. B. New generation nodes must have less RAM than older generation nodes. C. Minimum of three new generation nodes must be added to the existing node pool. D. Any new generation node can be added to any older generation node pool.
A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs.
473
What is the recommended networking design approach when planning subnets? A. Use a common subnet for data, replication and backup, and use a dedicated subnet for management. Assign the lowest priority gateway number for the management subnet. B. Use a common subnet for management, data, replication and backup. Assign a random priority gateway number for the subnet. C. Use a common subnet for data and management and a common subnet for replication and backup. Assign the lowest priority gateway number for the management subnet. D. Use dedicated subnets for management, data, replication and backup. Assign the lowest priority gateway number for the data subnet.
D. Use dedicated subnets for management, data, replication and backup.
474
What is the file protection mechanism used with OneFS file striping? A. Forward error correction B. Redundant array of independent disks C. Non-volatile random access memory D. Drive controller mirroring
A. Forward error correction
475
A customer is planning an Isilon deployment for use with their Hadoop environment. What is one advantage of using Isilon as the HDFS layer in this instance? A. Facilitates independent scaling of compute and storage nodes. B. Provides single protocol access to data. C. Integrates storage into Hadoop compute for more flexibility. D. Allows the compute nodes to apply data protection.
A. Facilitates independent scaling of compute and storage nodes.
476
You have been asked to design a NetWorker backup solution with the following two requirements: - Leverage Microsoft SQL VDI backup AP - Back up SQL database, transaction logs, and file groups Which NetWorker module is recommended? A. Power Snap B. NMDA C. Snap Image D. NMM
D. NMM
477
After enabling auditing on an EMC Isilon cluster, which configuration changes are tracked? A. Changes made through PAPI system only B. Changes made by a user in a shell only C. Changes made by root in a shell only D. Changes made by a batch file only
A. Changes made through PAPI system only
478
In an Isilon environment, what is the total protection level offered by N+2:1? A. Two drives or one node can fail without any data loss in the cluster. B. Two hot spare drives and one cold spare drive are available for disk failures. C. Two hot nodes and one cold node are available for node failures. D. Two drives on one node can fail without causing any data loss in the cluster.
A. Two drives or one node can fail without any data loss in the cluster.
479
Refer to the Graphic. If you notice the symbol illuminated on the Dell EMC Isilon node’s compute module, what does this indicate? A. Unsafe to remove the compute module B. Compute module is running a system check C. Unsafe to reboot the compute module D. Compute module has one or more faulty components
A. Unsafe to remove the compute module
480
Several SyncIQ policies have been defined on an Isilon cluster and are in production on several terabytes of data. The customer wishes to change the directory includes on one of the policies, but is concerned about maintaining their RTO. What will occur after the change is made? A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data; 95 / 99 RTO may be affected B. Policy changes are reflected in the next SyncIQ incremental run; RTO should be unaffected C. If the directory includes are only new data, SyncIQ replicates the new data during the next incremental synchronization; RTO may be affected D. SyncIQ dynamically adjusts for policy changes; RTO will be unchanged
A. Changing includes, excludes, or file matching criteria causes a full re-synchronization of the data;
481
In an Isilon environment, the output of the isi get command on a file shows the level 6+2/2. What does the "6" represent? A. FEC stripe units per stripe B. Mirrored copies per file C. Data stripe units per stripe D. Drive used per node
C. Data stripe units per stripe
482
A node does not shut down properly during a systematic node shutdown process. What is the proper way to restart a node in this state? A. Run isi config >>> reboot B. Power cycle the node C. Run reboot from a shell D. Run halt from a shell
A. Run isi config
483
You are not able to delete a container using Swift. What is the problem? A. You are not logged in as root B. Container is not empty C. You need to be system administrator D. Containers cannot be deleted
B. Container is not empty
484
An administrator wants to enable quotas on a group directory in their Dell PowerScale cluster. In addition, they want to monitor the disk usage for future capacity planning. Which type of quotas need to be configured? A. Accounting B. Enforcement C. Hard D. Advisory
A. Accounting
485
An Isilon storage administrator is attempting to manage an Isilon cluster using the web administration interface. However, some configuration tabs are not displayed. What is the most likely cause? 96 / 99 A. RBAC has been implemented B. Some features have not been licensed C. Access zones have been created D. Administrator must log in as “compadmin”
A. RBAC has been implemented
486
What accurately describes a characteristic of EMC OneFS protocol auditing? A. Can be enabled on a per access zone basis B. Cannot be enabled if the isi_audit_cee daemon is running C. Requires syslog forwarding to also be configured D. Can only audit for success, not failure
A. Can be enabled on a per access zone basis
487
Which command provides an explanation of available isi commands? A. isi events list B. isi config –help C. isi status D. isi --help
D. isi --help
488
Which license is required to retain historical or archival points for SyncIQ replication? A. SnapshotIQ B. SmartConnect C. SmartPools D. InsightIQ
A. SnapshotIQ
489
When are file pool policy actions applied to files? A. When a file is written for path-based filters after SmartPools job has run at least once B. When a file is read for node pool location-based actions after the SmartPools job has run at least once C. When the SetProtectPlus job runs for clusters with multiple file pool policies D. When a file is modified for the first time after the SetProtectPlus job has run at least once
A. When a file is written for path-based filters after SmartPools job has run at least once
490
A customer is implementing two new clusters for DR using recommended best practices. SyncIQ will be used for the filesystem failover and fail back operations. You have been asked to create the initial filesystem structure for home directories for SMBv2.1 clients on both clusters. Which directory structure should you use? A. Source/ClusterA: /ifs/ClusterA/access_zone/home Target/ClusterB: /ifs/ClusterA/access_zone/home B. Source/ClusterA: /ifs/ClusterA/home Target/ClusterB: /ifs/ClusterA/home C. Source/ClusterA: /ifs/home 97 / 99 Target/ClusterB: /ifs/ClusterA/home D. Source/ClusterA: /ifs/ClusterA/system_zone/home Target/ClusterB: /ifs/sync/ClusterA/system_zone/home
A. Source/ClusterA: /ifs/ClusterA/access_zone/home
491
For which IT solution is an Isilon NL-Series node best suited? A. Internet Web 2.0 applications B. Nearline archiving C. Quantitative analysis D. Hadoop workflows
C. Quantitative analysis
492
Which protocols are access zone aware in OneFS 7.2? A. SMB and NFS B. SMB and FTP C. NFS and HTTP D. FTP and NFS
A. SMB and NFS
493
What does Dell PowerScale OneFS use to simplify administration over traditional NAS solutions? A. File System, Data Protection, and Volume Manager B. Drive Partitioning, Volume Manager, and Data Protection C. File Manager, Drive Partitioning, and Volume Manager D. Volume Manager, File System, and Drive Partitioning
A. File System, Data Protection, and Volume Manager
494
Which methods are used for managing jobs on an Isilon cluster? A. Only through feature settings and the web administration interface B. Only CLI and the web administration interface C. PAPI, web administration interface, and through all feature settings D. CLI, web administration interface, and through some feature settings
D. CLI, web administration interface, and through some feature settings
495
When creating custom job schedules in a Dell PowerScale environment, what are the impact policy settings? A. HIGH, LOW, MEDIUM, and PAUSED B. HIGH, LOW, MEDIUM, and OFF_HOURS C. HIGH, LOW, PAUSED, and OFF_HOURS D. JOB, PHASE, TASK, and ITEM
B. HIGH, LOW, MEDIUM, and OFF_HOURS
496
What is the TLD of student.isilon.training.com? A. isilon B. com 98 / 99 C. training D. student
B. com
497
Which RBAC role(s) includes the admin user privileges? A. Security Admin and System Admin B. Security Admin only C. System Admin and Audit Admin D. System Admin only
A. Security Admin and System Admin
498
What effect does enabling GNA on an Isilon node pool have for SSDs? A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration B. Allows SSDs in the same node pool as the data to be used for metadata read acceleration C. Allows SSDs in all node pools to be used as L3 cache and shared between node pools D. Enables cluster-wide read/write metadata acceleration utilizing all SSDs
A. Allows node pools without SSDs to use SSDs in other node pools for metadata read acceleration
499
What is a recommended solution to back up a large number of desktops/laptops? A. Protect Point B. NetWorker C. Data Domain D. Avamar
D. Avamar