DELL EMC D-PSC-DS-23 Dell PowerScale Design 2023 Exam Online Training
DELL EMC D-PSC-DS-23 Online Training
The questions for D-PSC-DS-23 were last updated at Jan 30,2025.
- Exam Code: D-PSC-DS-23
- Exam Name: Dell PowerScale Design 2023 Exam
- Certification Provider: DELL EMC
- Latest update: Jan 30,2025
What is appropriate for capturing packets for later analysis of I/O request sizes and randomness on Isilon clusters?
- A . Mitrend
- B . Wireshark
- C . tcpdump
- D . iostat
A customer is using Hadoop with direct-attached storage. They are concerned about the cost to build and maintain this infrastructure.
What are the benefits of switching to Hadoop with Isilon OneFS?
- A . Independent scaling of compute and storage
Multi-protocol access to data
ACL-based permissions - B . Independent scaling of NameNodes
Redundant TaskTracker nodes
Multi-protocol access to data - C . Independent scaling of NameNodes
Multi-protocol access to data
Kerberos authentication - D . Independent scaling of compute and storage
Independent NameNodes
Kerberos authentication
A customer has a cluster running with a single access zone and serves multiple internal departments. The clients access the cluster over both SMB and NFS protocols. A department user has been assigned the task of auditing SMB activity and enforcing appropriate quotas for certain users.
How should the cluster administrator grant this access?
- A . Create a secondary root account credential
- B . Create a custom RBAC role
- C . Provide the AuditAdmin RBAC role
- D . Provide the SecurityAdmin RBAC role
A company requires a cluster for deep archiving of data. Storage density is most important and high performance access is not a requirement.
Which node is recommended for this application?
- A . HD-Series
- B . NL-Series
- C . S-Series
- D . X-Series
There is a need to carry out a tech refresh of a PowerScale cluster. Old nodes must be removed because they will soon be at end of service life.
What methodology is least disruptive and will retain the file system structure, configuration, data, and DNS information?
- A . Add the new nodes to the cluster and use SmartPools to move the data to the new nodes
- B . Install the new nodes into the cluster and migrate using a host-based utility
- C . Install the new nodes as a new cluster and use SyncIQ to replicate the data to the new nodes
- D . Install new nodes into the cluster and use SyncIQ to replicate the data from the old to the new nodes
In your second meeting with the customer you ask the following questions about their current unified SAN and NAS platform. "Are you using an application to map users from NFS Exports to SMB shares? Is each site a separate LDAP or AD Domain?"
What functionality are your trying to understand in their environment and what is the comparable feature in Isilon OneFS?
- A . Identity Mapping and Authentication Sources
- B . User Management and AD Authentication
- C . Kerberos Infrastructure and Identity Management
- D . NFS Export Management and OneFS Cluster Management
A customer plans to replace an existing array that is supported by the MiTrend Workload Profile Assessment (WPA) service. You receive performance data from the customer and run a WPA report that shows the array has 50TB of usable capacity.
In discussions with the customer, you learn the content is comprised of four million 6MB files and 400 million 64KB files. The customer explains they have a small budget and very limited rack space available in their datacenter. Performance is not a concern because the files are rarely accessed.
Which configuration provides the needed usable capacity using N+2:1 protection, and requires the least amount of rack space?
- A . 3 x NL400 nodes with 2TB Drives
- B . 3 x X400 nodes with 1TB Drives
- C . 5 x X200 nodes with 1TB Drives
- D . 6 x X200 nodes with 1TB Drives
What are two output options from the PowerScale cluster events log? (Select 2)
- A . Hardware Issues
- B . OneFS Issues
- C . SMTP Email
- D . Logs
Which authentication providers can be used when configuring PowerScale netgroups?
- A . LDAP
NIS
File - B . Active Directory
NIS
Local - C . Local
Active Directory
MIT Kerberos - D . MIT Kerberos
Local
LDAP
A PowerScale administrator has a cluster containing four F600 nodes. They must configure FTP connections for anonymous access that requires no authentication.
What is the result of this configuration?
- A . The limit is 500 for FTP connections per cluster.
- B . The limit is 500 FTP connections per node.
- C . The limit is 200 FTP connections per cluster.
- D . The limit is 200 for FTP connections per node.