A company has decided to buy a new Isilon cluster and ECS appliance for their disaster recovery (DR) site.
Which files are expected to be replicated to the DR site?
- A . Stubs and non-archived files
- B . Archived and non-archived files
- C . Stubs only
- D . Non-archived files only
When a disk state is suspect, what are the allowable disk operations?
- A . Read
- B . Write
- C . Read and write
- D . No operations allowed
By default, how long does ECS retain capacity utilization data in monitoring history?
- A . 1 day
- B . 7 day
- C . 60 days
- D . 1 year
When enabling Dell EMC NetWorker with CloudBoost and ECS integration, which configuration task is optional in ECS?
- A . Generate a S3 secret key to add to the CloudBoost configuration
- B . Create a dedicated storage pool for CloudBoost storage
- C . Create a dedicated namespace for CloudBoost storage
- D . Create an object user account for CloudBoost access
An administrator is trying to configure a Cloud Unit in Data Domain System Manager for access to an ECS and receives the following error: The Access Key ID you provided does not exist in our records.
What needs to be checked?
- A . ECS access key ID in the Object User Name configured in the ECS Portal
- B . ECS access key ID in the Management User Name configured in the ECS Portal
- C . ECS .PEA file in the Object User Name configured in the ECS Portal
- D . ECS .PEA file in the Management User Name configured in the ECS Portal
Which type of object access user is required on the ECS for Dell EMC Isilon CloudPools?
- A . CAS
- B . S3
- C . Swift
- D . HDFS
Which type of data service does ECS provide?
- A . NFSv3
- B . Block
- C . CIFS
- D . SMB
A storage administrator is trying to create a new bucket using s3curl.pl. They use a URL pointing to their load balancer. The SSL connection is terminated on the load balancer.
What port number should be used at the command line?
- A . 9020
- B . 9021
- C . 9023
- D . 9025
When SEC Compliance is enabled, what action can be taken on a retention period?
- A . Shortened
- B . Extended
- C . Deleted
- D . Deleted with privileged delete
Which component of ECS includes NFS tools to support object storage?
- A . Zookeeper
- B . Storage Engine
- C . Fabric
- D . Data Services
Compliance monitoring has been enabled for an ECS system.
Under which conditions will a BAD event be received?
- A . UNKNOWN and NOT READY
- B . SUSPECT and UNKNOWN
- C . DEGRADED and UNTRACKED
- D . BAD and NOT READY
Which elements appear in the ECS S3 service using the Signature Version 2 authorization header?
- A . Namespace and signature
- B . HMAC and secret key
- C . Access key ID and signature
- D . Secret key and signature
If the ECS S3 API “Put” method is used to create a new object with the same name as an existing object, what is the expected behavior of the S3 operation?
- A . Error will be generated
- B . Operation will stop
- C . Warning will be generated
- D . File will be overwritten
What is a benefit of deploying an ECS software-only solution?
- A . Uses Dell EMC hardware exclusively for high performance
- B . Provides a single hardware and software solution offering
- C . Uses low cost, commodity hardware that does not compromise enterprise storage capabilities
- D . Deployed as a virtual machine for a lower total cost of ownership
A company is integrating Dell EMC Isilon CloudPools with the ECS and would like to enable CloudPools for disaster recovery failover.
Which deep copy option should be used?
- A . Force
- B . Stub sync
- C . Allow
- D . Deny
Which log file should you check if you suspect that an authorized user has been logging in to an ECS system?
- A . eventsvc.log
- B . authsvc.log
- C . resourcesvc.log
- D . provisionsvc.log
A company deploys an ECS geo-federated setup. They need to read and write the accessible copy of the object if a temporary site failure occurs.
What must they do during ECS configuration to meet this requirement?
- A . Enable Access During Outage flag in the bucket.
- B . Enable the Replicate to All Sites flag in the VDC.
- C . Enable Cold Storage in the storage pool.
- D . Create a Retention Policy in the namespaces.
What is a characteristic of ECS support for NFSv3 ACLs?
- A . Supports rich access control lists for NFSv3
- B . Enforces permissions inherited from the S3 protocol
- C . Supports NFSv3 but has no support for ACLs
- D . Must be connected to an LDAP server or Active Directory
An ECS is configured as backend storage for OpenStack Cinder.
Which type of data will it store?
- A . Disk and server images
- B . OpenStack Swift client access information
- C . Multimedia files
- D . Volume data backups
What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?
- A . ECS does not support external key management
- B . Bucket creation will fail with an error to provide a key in the header
- C . Encryption will not be enabled
- D . A system generated key will be used instead
Which program installs and manages ECS CLI?
- A . EMCO MSI
- B . Pip
- C . WinSCP
- D . RDP
A company has a long-term plan to apply many S3 client applications that will integrate with ECS. The systems administrator is required to implement all the needed configurations for all possible S3 client bucket-style addressing methods.
Which configuration will meet the requirements?
- A . Create the DNS wild card record, the host record for the load balancer, and the required SSL certificate on the load balancer
- B . Create the DNS wild card record, the host record for the load balancer, and the base URL on the ECS
- C . Create the DNS wild card record for the load balancer, the required SSL certificate on the load balancer, and the base URL on the ECS
- D . Create the DNS host record for the load balancer, the base URL on the ECS, and the required S3 client configuration files
What is the purpose of creating ECS Virtual Data Centers?
- A . Present nodes within a site as a single logical unit
- B . Function as a container for object data
- C . Expose storage pools from replication groups to applications
- D . Define protection and availability of storage pools
Which task is the responsibility of the emcsecurity user?
- A . Changing the passwords for admin users
- B . Modifying SEC compliance
- C . Overriding the bucket retention setting
- D . Locking nodes
Which configuration task is optional in ECS when enabling NetWorker with CloudBoost and ECS integration?
- A . Create a dedicated Namespace for CloudBoost storage.
- B . Generate an S3 secret key to add to the CloudBoost configuration.
- C . Create a dedicated storage pool for CloudBoost storage.
- D . Create an object user account for CloudBoost access.
Compliance monitoring was enabled for an ECS system. Under which conditions will a BAD event be received?
- A . DEGRADED and UNTRACKED
- B . BAD and NOT READY
- C . UNKNOWN and UNTRACKED
- D . UNKNOWN and NOT READY
Which process allows ECS to reconstruct objects within a storage pool, if that pool loses a disk?
- A . Full mirrored replication
- B . Chunk management
- C . Erasure coding
- D . XOR operation
What happens when a soft quota is reached on a bucket?
- A . No new writes are allowed
- B . Nothing will happen
- C . Only updates are allowed
- D . Warning event is triggered
How does a user apply a license on an ECS system?
- A . Within the ECS portal
- B . Using the command line interface (CLI)
- C . Through SSH
- D . Using the ECS Rest API
A company wants its x64 Linux backup data sent directly to ECS.
Which supported and most efficient configuration would you recommend for this environment?
- A . Use a NetWorker storage node to receive x64 Linux Networker client data and send it to ECS
- B . Use a CloudBoost appliance as a NetWorker storage node to receive x64 Linux NetWorker client data and send it to ECS
- C . Use Client Direct on the x64 Linux NetWorker client to send data to a CloudBoost appliance and then transfer it to ECS
- D . Use Client Direct with CloudBoost agent on the x64 Linux Networker client to transfer data to ECS
On which level(s) is the ECS quota enforced?
- A . Namespace only
- B . Bucket only
- C . Object user
- D . Bucket and namespace
A company has decided to use Dell EMC Isilon CloudPools with ECS as the Cloud storage target. During the initial integration, they discover that the ECS namespace is inaccessible.
What is a possible reason for this issue?
- A . Incorrect Cloud provider type was selected
- B . Object local user is configured as a namespace admin
- C . Management user is configured as a user admin
- D . ECS bucket was already created
When can D@RE be enabled on a bucket or namespace?
- A . Only at the time of creation for a bucket and namespace
- B . Any time for both a bucket and namespace
- C . Any time for a bucket; only at creation of the namespace
- D . Any time for the namespace; only at creation of a bucket
How many ECS appliances can be configured as target object stores, per CloudBoost appliance?
- A . 1
- B . 3
- C . 4
- D . 5
What task is the responsibility of the emcsecurity user?
- A . Locking nodes
- B . Overriding bucket retention setting
- C . Changing passwords for admin users
- D . Modifying SEC compliance
Which protocol is supported natively on ECS?
- A . NFSv3
- B . SMB
- C . NFSv2
- D . CIFS
How is an ECS federation created?
- A . From the first ECS running the primary VDC, create an additional VDC entry for each remote ECS instance.
- B . Add the remote VDC into the replication group configuration for the primary VDC
- C . Create a new federation configuration from any VDC, then add all other VDCs to the configuration
- D . Create the remote VDC then merge both the first VDC and the remote VDC into the federation configuration.
What technology is used in ECS to protect loss of a site in a two-site configuration?
- A . Full Mirror Copy
- B . Erasure Coding
- C . XOR
- D . Dual Parity
An organization is designing a new S3 client that will integrate with ECS. They are evaluating the use of the EMC S3 API and the Amazon S3 API. The business need is to store images of their products along with their specifications and to have fast access to the images based on the stored specifications. The organization decides to use the EMC S3 API as it has the needed S3 API extension to do that.
What is that extension?
- A . Byte range update
- B . File system enabled
- C . Bucket retention period
- D . Metadata search
Which ECS authentication factors are required for a Centera client to authenticate?
- A . Object user and CAS password
- B . Object user and bucket secret key
- C . Bucket certificate and .PEA file
- D . Object user and .PEA file
Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?
- A . admin
- B . emcexpert
- C . emcsecurity
- D . root
Which protocol allows Microsoft Windows servers to access storage on ECS?
- A . HDFS
- B . NFSv3
- C . CIFS
- D . SMBv3
Which security property should be set in the core-site.xml file for ECS-ViPRFS integration with Hadoop?
- A . fs.defaultFS
- B . fs.viprfs.impl
- C . fs.vipr.installations
- D . fs.permissions.umask-mode
A newly configured ECS system contains 16 nodes.
How many fragments will each ECS node contain when a data chunk is broken up by erasure coding?
- A . 1
- B . 4
- C . 8
- D . 16
Which tool is used for validating the .PEA file in the ECS CAS bucket?
- A . JCenteraVerify
- B . bucketdump
- C . cldiff
- D . CyberDuck
Which ECS feature is responsible for protecting and sharing objects for global access?
- A . Replication Group
- B . Federation
- C . VDC
- D . Storage Pool
What is a prerequisite for an end user to obtain the license file?
- A . License Authorization Code (LIC)
- B . ECS access to ELMS website
- C . Software ID (SWID)
- D . Number of ECS nodes
Which mechanism handles the loss of a site in an ECS configuration with three or more sites?
- A . Full mirror copy
- B . Distributed erasure coding
- C . Hybrid erasure coding
- D . XOR scheme
How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?
- A . Simple token
- B . Scoped token
- C . PEA file
- D . Login and password
Which operation is unavailable when network connectivity is interrupted between the VDCs in an environment with two or more VDCs?
- A . Write object
- B . Read object
- C . Update object
- D . Create namespace