A company’s Isilon cluster has reached the capacity limit. The cluster consists of eight H500 nodes in a single node pool.
Which action can be taken to resolve the capacity issue while new nodes are being delivered?
- A . Activate SmartPools
- B . Enable GNA
- C . Enable Spillover
- D . Release VHS drives
You are looking through the EMC Isilon Configuration Guide for client specific site data.
Which tab of the document contains this information?
- A . Core
- B . Topology
- C . Design Intent
- D . Customer Information
What is a characteristic of access tokens on a Dell EMC Isilon cluster?
- A . Cannot contain both an SID and a UID
- B . One token is generated for every Access zone
- C . Generated when the client accesses the cluster
- D . Requires the use of external authentication providers
A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the administrator has some concerns about the available capacity on the H600 nodes.
Which feature should be configured to accept writes, even after the H600 nodes become full?
- A . VHS
- B . Spillover
- C . SmartPools
- D . GNA
In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the shares the client is able to view?
- A . SmartConnect
- B . Access zone
- C . Access Control List
- D . Mode bit
You are looking through the EMC Isilon Configuration Guide for file sizes and workflows.
Which tab of the document contains this information?
- A . Design Intent
- B . Customer Information
- C . Topology
- D . Core
How many nodes should be set up to coordinate NTP for an Isilon cluster?
- A . All nodes
- B . Two only
- C . Every node connected to the network
- D . One only
A systems administrator has an Isilon cluster with three X410 nodes in their environment. The default protection setting is 2d:1n at the node pool level. Billions of very small image files, less than 50 KB size, are stored on the cluster.
Recently, the administrator has seen an issue where the cluster’s used capacity is getting full. However, the cumulative size of the files copied appears to be less.
What is a possible reason for the storage usage level?
- A . Small files are stored with 4x mirror protection and consuming more capacity
- B . Small files are stored with 2x mirror protection and consuming more capacity
- C . Metadata of billions of files is consuming most of the capacity
- D . Small files are spread across all nodes and consuming more capacity
A customer has SAP, Oracle, and file system information in a VMAX3. The customer is looking for a backup solution to receive the least amount of RTO and RPO as possible.
Which solutions should be recommended?
- A . NetWorker, DD9500, SnapVX, FAST.X, and RecoverPoint for XtremIO
- B . Protect Point, DD990, Snap VX, FAST.X, and Recover Point for XtremIO
- C . Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
- D . NetWorker, Protect Point, DD9500, Snap VX, FAST.X, and Recover Point for XtremIO
A Dell EMC Isilon cluster with Gen 6 nodes has reached 90% capacity.
To increase the cluster’s capacity, what is the minimum number of Gen 6 nodes that can be added?
- A . 1 node
- B . 2 nodes
- C . 3 nodes
- D . 4 nodes
What information does the isi statistics command display?
- A . Protocol status, general performance, hardware condition, and critical alerts
- B . General status, node management, Job Engine status, and drive statistics
- C . Drive statistics, protocol status, node statistics, and hardware statistics
- D . Drive status, hardware condition, critical alert, and protocol status
You are using a RHEL server and mounting an export from an EMC Isilon cluster using NFSv3.
Where would the session or state information for the connection be maintained?
- A . Client only
- B . On all nodes in the cluster
- C . Client-connected node only
- D . Client and client-connected node
You are onsite to deploy an EMC Isilon cluster that is already racked and cabled.
What must be done to initially configure this cluster?
- A . Establish a network connection to the management port on a backend switch
- B . Run the cluster configuration wizard from a computer on the same network as the cluster
- C . Connect a monitor, mouse, and keyboard to the utility node of the cluster
- D . Establish a serial connection to the node designated as node 1
A company plans to build two Dell PowerScale clusters in an active-active disaster recovery environment. The initial requirement is to have one access zone for their finance department.
Which recommended directory structure meets the requirement?
- A . Cluster_A:
/ifs/finance
/ifs/finance
Cluster_B:
/ifs/finance
/ifs/finance - B . Cluster_A:
/ifs/cluster_a/finance
/ifs/cluster_b/finance
Cluster_B:
/ifs/cluster_a/finance
/ifs/cluster_b/finance - C . Cluster_A:
/ifs/cluster_a
/ifs/cluster_b
Cluster_B:
/ifs/cluster_a
/ifs/cluster_b - D . Cluster_A:
/ifs/finance/cluster_a
/ifs/finance/cluster_b
Cluster_B:
/ifs/finance/cluster_a
/ifs/finance/cluster_b
In an Isilon environment, which type of storage node is best suited for high throughput and high concurrency using SATA drives?
- A . NL-Series
- B . S-Series
- C . X-Series
- D . A100-Series
What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?
- A . 40 Gb InfiniBand ports
- B . Decreased journal size for storage performance
- C . Dedicated bootflash drives
- D . NVRAM dependency
Which command is used to enable Source-Based Routing in OneFS 8.2.0?
- A . isi network groupnets modify –sbr=true
- B . isi network subnets modify –sbr=true
- C . isi network pools modify –sbr=true
- D . isi network external modify –sbr=true
What does the isi_upgrade_helper command provide?
- A . Recommended sets of nodes capable of simultaneous node firmware upgrades
- B . Recommended sets of nodes capable of simultaneous drive firmware upgrades
- C . Recommended sets of nodes capable of simultaneous rollup patch upgrades
- D . Recommended sets of nodes capable of simultaneous standard patch upgrades
In an Isilon environment, what are the on-disk identity types that appear in the web administration interface?
- A . SMB, NFS, and Mixed
- B . AD, LDAP, and NIS
- C . GUID, SID, and Mixed
- D . SID, UNIX, and Native
What does it mean if an EMC Isilon cluster is in a NANON state?
- A . One or more nodes are missing Ethernet connections
- B . One or more nodes are missing InfiniBand connections
- C . One or more nodes have critical events
- D . One or more nodes have been improperly shut down
Based on the graphic, what is the correct port to attach to the internal network?
- A . 1
- B . 2
- C . 3
- D . 4
A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site.
What is a key consideration regarding the SyncIQ functionality?
- A . SyncIQ synchronous option must be configured
- B . SyncIQ is only an asynchronous replication tool
- C . SyncIQ source must be modified to replicate
- D . SnapshotIQ must be purchased and the synchronous option configured
What is responsible for handling the SMB protocol and managing the session, protocol negotiations, and operations in One FS?
- A . lsassd
- B . lwsm
- C . lwiod
- D . srvsvc
What are the steps to configure SmartLock on an EMC Isilon cluster in Compliance mode?
- A . Boot cluster as a standard Isilon cluster
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM - B . Boot cluster as a standard Isilon cluster
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM - C . Boot cluster in Compliance mode
Install Smart Lock license
Create and configure Smart Lock directory
Add files Commit files to WORM - D . Boot cluster in Compliance mode
Install Smart Lock license
Set compliance clock
Create and configure Smart Lock directory
Add files Commit files to WORM
In Dell EMC Isilon, what is the purpose of a maintenance release?
- A . Address known issues and minor enhancements to the OS
- B . Address known issues and minor enhancements to the firmware
- C . Update internal and external NICs to address known issues
- D . Update all internal components for known issues
An Implementation Engineer has just joined an EMC Isilon cluster to an Active Directory (AD) domain. The System zone of the cluster is set to default values.
Which AD object is automatically added to the cluster’s users group?
- A . Anonymous
- B . Authenticated users
- C . Guest
- D . Everyone
Which type of issues are resolved by enabling Source-Based Routing on an Isilon cluster?
- A . Asymmetric routing.
- B . IP address space depletion.
- C . TCP retransmission.
- D . SmartConnect load balance.
A customer has purchased a license to allow multiple file pool policies to be applied to their multi-tier cluster.
Which job, when run, enforces file pool policies, and applies any file pool policy changes to the data?
- A . SyncIQ
- B . Auto Balance
- C . Smart Pools
- D . Set Protect Plus
What is the complete list of providers supported by a Dell EMC Isilon cluster?
- A . LDAP, AD, NIS, and local and file providers
- B . LDAP, NIS+, and file and local providers
- C . AD, NIS+, local provider, and LDAP
- D . AD, LDAP, and Microsoft Outlook provider
An administrator is attempting an object-level restore of data from a Protect Point backup. However, they are unable to see the desired objects through the Recovery server.
What is a possible cause for this problem?
- A . FTS device did not mount the static image
- B . Recovery server is not zoned to the Data Domain
- C . Static image was not copied to the VMAX3
- D . VMAX3 did not mount the vdisk
A company has two Isilon clusters located in San Francisco, California. One cluster is the source and the other is the target. For efficiency, the dataset is being replicated between the two clusters within the same data center. The target cluster will be moved to the New York area as part of a disaster recovery solution once the initial full copy is complete.
Once the cluster has been moved to New York, what will mitigate re-transmitting the entire dataset over the WAN to the target cluster in the new location?
- A . Enable target compare initial sync and then re-run the policy
- B . Run a sync policy with excluded directories defined
- C . Run a copy policy with excluded directories defined
- D . Enable the policy to run on all nodes in the cluster
You are looking through the EMC Isilon Configuration Guide for management IPs and DNS information.
Which tab of the document contains this information?
- A . Core
- B . Design Intent
- C . Customer Information
- D . Topology
Which information is required to join a Dell EMC Isilon cluster to an Active Directory (AD) domain?
- A . AD domain name, computer account created, and domain account with rights to the Join domain
- B . AD server name, cluster account created in an OU, and authentication account and password
- C . AD server name, port number, and authentication account and password
- D . AD domain name, domain account with rights to the Join domain, and domain account password
A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes.
What refresh process is appropriate in this case?
- A . Use SyncIQ to migrate the data from the old cluster to the new cluster
- B . Add the new nodes to the existing cluster and use SmartPools to migrate the data
- C . Add the new nodes one at a time and SmartFail out the old nodes
- D . Downgrade the new nodes to the version of OneFS running on the old nodes
A customer has a 5-node cluster in which the SIP is answering DNS queries from node 1.
If node 1 goes down, to which node, or LNN, would the SSIP service move?
- A . 2
- B . 3
- C . 4
- D . 5
Which deduplication phase is excluded from the Dry Run process?
- A . Commonality Detection
- B . Sharing
- C . Sampling
- D . Index Updating
When a 104 K data file is written to disk with a protection level of N+2n, what is the protection overhead of the total disk space consumed by the file?
- A . 0.33
- B . 0.5
- C . 0.67
- D . 0.8
What is a benefit of using NANON?
- A . Increased frontend I/O ports and aggregated cache
- B . Increased number of connected frontend network ports
- C . Increased capacity and aggregated cache
- D . Increased bandwidth inside the cluster and GbE links
Which data access advantage does Dell EMC Isilon clusters provide when hosting Hadoop data?
- A . Native Hadoop client access through SMB and NFSv3
- B . Real-time data access with native Hadoop clients only
- C . SMB and NFSv4 data access only
- D . Multi-protocol data access, in place analytics
What is the required configuration for syslog forwarding?
- A . Syslog forwarding works with config auditing only
- B . Local server should be set up to deny remote logging
- C . Remote server should be set up to allow remote logging
- D . Syslog forwarding works with protocol auditing only
You have followed the configuration document and set up a new cluster in Compliance mode. You meet with the customer to plan directory layout and configuration requirements.
What directory types will you be able to consider for this cluster?
- A . Non-WORM and Compliance Smart Lock directories only
- B . Non-WORM, Enterprise Smart Lock, and Compliance Smart Lock directories
- C . Compliance Smart Lock directories only
- D . Enterprise Smart Lock and Compliance Smart Lock directories only
A new file pool policy is configured on a Dell PowerScale cluster to move all media files to A200 nodes. The previously written media files are located on H500 nodes.
What does the administrator need to run to apply the new file pool policy on the old media files?
- A . SetProtectPlus job
- B . MediaScan job
- C . SmartPools job
- D . MultiScan job
Which type of information does the Isilon isi statistics command provide?
- A . Job engine and critical alerts
- B . Drive statistics and hardware condition
- C . Protocol and node statistics
- D . Drive replacement and node management
Which SSH Multi-Factor Authentication (MFA) service is supported by OneFS 8.2.0?
- A . Duo
- B . RSA
- C . Okta
- D . Yubico
A Dell EMC Isilon customer’s existing cluster has Gen 5 nodes. They are using both 1 GbE and 10 GbE connectivity options. The 1 GbE is configured with the management network.
The 10 GbE is connected to the data and replication network. The customer is planning to add new Gen 6 nodes to their cluster. They want to know the available options for front-end connectivity on Gen 6 nodes.
Which information should be provided to the customer?
- A . 1 GbE and 10 GbE front-end Ethernet options are available in Gen 5 nodes
10 GbE and 40 GbE front-end Ethernet options are only available in Gen 6 nodes - B . 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are only available in Gen 6 nodes
- C . 1 GbE, 10 GbE, and 40 GbE front-end Ethernet options are available on both Gen 5 and Gen 6 nodes
- D . 10 GbE and 40 GbE front-end Ethernet options are only available in Gen 5 nodes
1 GbE and 10 GbE front-end Ethernet options are available in Gen 6 nodes
How many Isilon Job Engine v2.0 components will be present on a single node?
- A . One director
- B . Two managers per job
- C . Two workers per task
- D . Three coordinators
What can be determined when auditing is enabled on an EMC Isilon cluster?
- A . Who made the change When the change was made If the change can be undone
- B . When the change was made If the change can be undone If proper ITIL process was followed
- C . Who observed the change When the change was made If the change can be undone
- D . When the change was planned If the change can be undone If proper change control was followed
Which basic administration task can be performed using the front panel of an Isilon node?
- A . Adding the node to a cluster
- B . Creating a Smart Connect zone
- C . Configuring an additional interface
- D . Creating an access zone
What must be done to configure cluster name resolution for SmartConnect?
- A . Create the SSIP, add the DNS delegation, configure the subnet, and configure the node pool
- B . Create a host A record, create an NS record, configure the subnet, and configure the pool
- C . Create the SSIP, create an NS record, configure the subnet, and configure IPv6 and IPv4
- D . Create a host A record, add the DNS delegation, configure the subnet, and configure IPv4
What is the recommended method when cabling an Isilon cluster with dual InfiniBand switches?
- A . All int-a InfiniBand switch ports should be connected to one switch and all int-b ports should be cabled to the second switch.
- B . All internal switch ports on odd-numbered nodes should be attached to switch one and all even numbered nodes should be cabled to switch two.
- C . All int-a switch ports should be cabled to the top row of switch ports on switch one and all int-b ports should be cabled to the bottom row of ports of switch one. Once switch one is full, continue cabling on switch two.
- D . It does not matter which switch ports are used. Any internal switch port can be cabled to either of the InfiniBand switches.
A company deployed an Isilon cluster that consists of eight nodes connected to a main production subnet by all available 10GB ports. Later, the company decided to implement a disaster recovery solution with a separate replication subnet. During the reconfiguration, one of the 10Gb ports from each of the nodes 1-4 was moved into the new pool and SBR was activated.
After activating the replication policies, the administrator noticed that the main production ports on nodes 1-4 reached the bandwidth limit.
What is a possible reason for this behavior?
- A . Default gateway for the replication subnet has a higher priority value.
- B . Default gateway for the replication subnet is not specified.
- C . Default gateway for the replication subnet has a lower priority value.
- D . Main production ports have a smaller bandwidth limit than replication ports.
What does the ‘And’ condition provide in file pool policy filter use?
- A . Increases the granularity of the file match criteria
- B . Reduces the number of file pool policies
- C . Combines multiple file pool policy filters with the same actions
- D . Broadens the file pool policy match criteria
What does the phrase "failover revert" mean?
- A . Undoing a failover job in progress
- B . Redirecting clients to the source cluster
- C . Redirecting clients to the target cluster
- D . Undoing a fail back job in progress
A customer would like to limit administrative access to a subset of cluster management capabilities.
What method would you implement to meet their requirements?
- A . Create a custom role with only the required privileges
- B . Use the BackupAdmin role and add the required privileges
- C . Use the SecurityAdmin role to remove privileges from the SystemAdmin role
- D . Use the root user to modify the Admin role with the required privileges
Which type of information does the Isilon isi status command provide?
- A . Protocol and node statistics
- B . General status and client connections
- C . Drive statistics and hardware condition
- D . Job engine and critical alerts
In a Dell PowerScale SyncIQ environment, which action requires a SnapshotIQ license?
- A . Saving historical snapshots on the target
- B . Reading the target, read-only instance
- C . Failing over to the target or disaster recovery cluster
- D . System-created snapshot of the source data
What are the benefits of Isilon Scale-Out NAS versus Scale-Up NAS technology?
- A . File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
- B . Block-based storage, file system upper limit 10 PB, nodes contain all components, and RAID protection
- C . Block-based storage, file system upper limit 20 PB+, nodes contain all components, and more granular file protection
- D . File-based storage, file system upper limit 16 TB, quick scalability, and volume level RAID protection
What is the recommended maximum number of configured SyncIQ policies, per source cluster?
- A . 50
- B . 500
- C . 1,000
- D . 2,000
When configuring an NFS export on an Isilon cluster, what is the default mapping for the root account?
- A . Root-to-nobody
- B . Root-to-root
- C . Root-to-admin
- D . User-defined during cluster setup
A UNIX user is accessing a file through an NFS export on an Isilon cluster. The user is successfully authenticated through the LDAP server.
In addition to file permissions, what else must be considered to determine the degree of file access the user will receive?
- A . User’s access token.
- B . Whether the SmartConnect pool is set to `static’.
- C . User SID-defined in the ID Mapper database.
- D . User’s access zone.
Within OneFS, at which level is the data layout managed?
- A . File pool
- B . Node
- C . Cluster
- D . Node pool
When using automatic home directory creation for SMB shares, which variable is used for the NetBIOS domain name?
- A . %D
- B . %N
- C . %S
- D . %Z
What are sources form which an Isilon cluster can obtain authentication data about a user attempting to access the cluster?
- A . NIS+, HTTP, and NIS
- B . FTP, filedb, and samdb
- C . LDAP, NIS, and filedb
- D . HHTP, LDAP, and samdb
Which cache type is used for read-ahead caching on behalf of other nodes?
- A . L1
- B . L2
- C . L3
- D . Endurant
You have configured two new subnets: one for NFS and one for SMB. You have enabled VLAN tag 20 for NFS and VLAN tag 30 for SMB and added the interfaces to the network pools. The ext-1 interface from each node is assigned an address and is active. However, you are unable to ping the gateway on the two subnets.
What action should you take to resolve this issue?
- A . Configure link aggregation on the network switch and each network pool
- B . Configure NS records in DNS for the network pools
- C . Configure Source-Based Routing for each subnet created
- D . Configure trunk ports on the switch for each network interface
Which job scans the cluster to look for orphaned or leaked inodes or blocks?
- A . Collect
- B . Auto Balance
- C . Flex Protect
- D . Media Scan
Which command shows individual drive status?
- A . isi devices
- B . isi_hw_status
- C . isi_gconfig
- D . isi networks
How is Hadoop managed in an Isilon environment?
- A . Files are stored in a specialized HDFS-compatible file system format on the Isilon cluster
- B . HDFS data is on Isilon; computations are handled by Hadoop
- C . HDFS Data is on Hadoop; computations are handled by Isilon
- D . MapReduce on the Isilon cluster allows data to be distributed across both platforms
Which OneFS daemon is responsible for generating each user’s identity token?
- A . lsassd
- B . lwiod
- C . srvscd
netlogon
What is an Ancestry Event on an Isilon cluster?
- A . First instance of a coalesced event.
- B . ID that an event had prior to being quieted.
- C . An event that has been canceled.
- D . An event that affects multiple nodes.
Which group of authentication sources is completely supported by OneFS?
- A . RSA and AD
- B . LDAP and AD
- C . Smart Card and LDAP
- D . NIS+ and LDAP
Which feature(s) is supported in NFSv3?
- A . Dynamic failover
- B . Stateful failover
- C . ACLs and ACEs
- D . Shares mounted separately
By default, what does EMC Isilon search for when looking up user ID mappings?
- A . Same name in file provider
- B . Presence of a UID/GID
- C . Same name in LDAP
- D . uidAttribute is AD
Which feature distinguishes SMBv2 from SMBv1?
- A . Endurant file handler
- B . Stateless protocol
- C . Change notification
- D . Packet signing
An organization has two different Isilon clusters:
– Six-node cluster in London, England
– Eight-node cluster in Paris, France
They are using SynclQ to replicate between the clusters. Each site has access zones configured and SmartConnect Advanced is licensed.
The organization is actively engaged in a failover from Paris to London. During testing, they realize that users from the Sales department in Paris are receiving authentication errors from the London cluster.
Which step should be taken to troubleshoot this issue?
- A . Verify that the Sales access zones for Paris are configured on the London cluster
- B . Verify that the Sales access zones for London are configured on the Paris cluster
- C . Verify that the SmartConnect zone for Sales in Paris is set to the system access zone
- D . Verify that the London cluster retained the Paris user list
Which client connection policy is the default?
- A . Round Robin
- B . Connection Count
- C . Network Throughput
- D . CPU Utilization
A service provider has an Avamar server supporting many of their customer’s backup requirements. They need to create customized reports for each customer for billing purposes. Currently, existing reports on Avamar do not meet this requirement.
How can the service provider generate customized reports?
- A . Configure Crystal Reports to extract data using Avamar MCCLI
- B . Configure Microsoft Excel to access the Avamar MySQL database
- C . Use Backup and Recovery Manager to track backup capacity usage per customer
- D . Use Data Protection Advisor to access the Avamar PostgreSQL database
Which type of administrator commands does configuration auditing track?
- A . PAPI-enabled commands
- B . Commands run by the “root” user
- C . Commands run by the SystemAdmin and CompAdmin users only
- D . All UNIX, isi, isi_ and sudo commands
A Dell EMC Isilon administrator wants to create file pool policies using templates available in the operating system.
Which management interface is used to create these templates?
- A . GUI only
- B . GUI and CLI
- C . CLI only
- D . Windows MMC
Which capabilities are enabled after activating an Isilon SnapshotIQ license?
- A . Create and schedule snapshots, and modify SnapshotIQ settings
- B . View and delete snapshots, and access snapshot data
- C . View, create, and schedule snapshots, and access snapshot data
- D . Create snapshot schedules, access snapshot data, and delete snapshots
What client protocols are supported to provide access to EMC Isilon clusters?
- A . SMB, NFS, HTTP, FTP, and HDFS
- B . AFP, CIFS, NFS, TCP, and UDP
- C . SMB, NFS, HTTP, FTP, and SMTP
- D . TFTP, CIFS, NFS, SSL, and TCP
While troubleshooting issues with a new directory services added to an Isilon cluster, which command should be used to ensure the configured base DN is correct?
- A . tcpdump
- B . nslookup
- C . ldapsearch
- D . netstat
Which job is a data distribution job on an Isilon cluster?
- A . FlexProtect
- B . Collect
- C . MediaScan
- D . TreeDelete
Which two security roles are required for full administrative privileges when managing an Isilon cluster?
- A . Security Admin and System Admin
- B . System Admin and Audit Admin
- C . Security Admin and Backup Admin
- D . Backup Admin and Audit Admin
What is EMC best practice for creating more than one snapshot per directory?
- A . Create snapshots with shorter expiration periods assigned to snapshots that are generated more frequently; use longer expiration periods assigned to snapshots that are generated less frequently
- B . Create snapshots with longer expiration periods assigned to snapshots that are generated more frequently; use shorter expiration periods assigned to snapshots that are generated less frequently
- C . Only create snapshots with shorter expiration periods assigned to snapshots that are generated more frequently
- D . Only create snapshots with longer expiration periods assigned to snapshots that are generated less frequently
A storage administrator has an Isilon cluster consisting of 10 nodes with identical hardware and are members of a single node pool. A 1024Kb file stored on that cluster is protected at N+3n.
What is the total number of copies of the file’s metadata?
- A . 3
- B . 4
- C . 6
- D . 5
By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to "Native" and a user has a synthetic UID?
- A . RID
- B . GID
- C . SID
- D . UID
In a Dell EMC Isilon environment, which SyncIQ option can be used to copy the SmartLink file to another cluster that supports CloudPools?
- A . Deny
- B . Stub
- C . Allow
- D . Force
Isilon SmartLock Compliance clock has drifted from the system clock.
How can the difference between compliance and system clocks be corrected?
- A . Compliance clock drifts towards system clock automatically
- B . Compliance clock drift correction is not allowed
- C . Administrative user “root” can manually adjust the compliance clock
- D . Administrative user “compadmin” can manually adjust the compliance clock
Which Dell EMC Isilon cluster quota events can be triggered for a hard quota?
- A . Soft quota write access denied, grace period expired, write access denied, and report generation failed
- B . Limit exceeded, limit remains exceeded, grace period expired, and report generation failed
- C . Limit exceeded, grace period expired, write access denied, and advisory limit exceeded
- D . Limit exceeded, limit remains exceeded, and write access denied
Which job gathers data for InsightIQ?
- A . IndexUpdate
- B . Collect
- C . Aenalys
- D . FSAnalyze
An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional, the administrator wants to create specific administrative accounts for specific cluster management activities in different access zones. An administrator of one zone should be able to view or configure objects in a different zone.
Which action will address the administrator’s requirements?
- A . Create ZRBAC role for each zone administrator.
- B . Create ZRBAC role for the administrator on all access zone.
- C . Create a separate management subnet for each administrator.
- D . Create an unique role in the System zone for each administrator.
What NFS protocols are supported by OneFS v7.2?
- A . NFSv3 and NFSv4
- B . NFSv2 and NFSv3
- C . NFSv2 and NFSv4
- D . NFSv4 and NFSv4.1
What is the maximum number of active Swift connections on a 5-node Isilon cluster?
- A . 250
- B . 500
- C . 750
- D . 1000
When using NIC aggregation, which configuration is supported in a Dell PowerScale Gen 6 environment?
- A . ext-1 and ext-2 of node 1 aggregated together
- B . ext-1 of node 1 and ext-2 of node 2 aggregated together
- C . ext-agg of node 1 and ext-agg of node 2 aggregated together
- D . ext-1 of node 1 and ext-1 of node 2 aggregated together
What protection level will guard against three simultaneous node failures anywhere across an EMC Isilon cluster?
- A . N+4d:2n
- B . N+3n
- C . N+3d:1n1d
- D . N+3d:1n
In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access auditing capability
- A . NFS, SMB, and HDFS
- B . NFS, FTP, and SWIFT
- C . NFS, SMB, and SWIFT
- D . NFS, FTP, and HDFS
Which semi-automated process with SyncIQ has the capability to interrupt sync jobs in progress?
- A . Failover
- B . Fail back
- C . Continuous mode
- D . Initial sync compare
A Dell EMC Isilon customer is using scripts based on PAPI to automate some of their storage administration tasks. The cluster is running OneFS 7.2. The PAPI script is using the isi config command, but it returns an error.
- A . OneFS blocked the use of the isi config command
- B . isi config command is not a PAPI-aware command
- C . isi config command is not a OneFS command
- D . PAPI only uses job engine commands
Which component is passive during LACP communication between the cluster and the Ethernet switch?
- A . MAC address
- B . Isilon
- C . Switch
- D . Smart Connect zone