Which task is the responsibility of the emcsecurity user?
Which task is the responsibility of the emcsecurity user?A . Changing the passwords for admin usersB . Modifying SEC complianceC . Overriding the bucket retention settingD . Locking nodesView AnswerAnswer: D
What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?
What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?A . ECS does not support external key managementB . Bucket creation will fail with an error to provide a key in the headerC . Encryption will not be enabledD ....
Which ECS feature is responsible for protecting and sharing objects for global access?
Which ECS feature is responsible for protecting and sharing objects for global access?A . Replication GroupB . FederationC . VDCD . Storage PoolView AnswerAnswer: B
Under which conditions will a BAD event be received?
Compliance monitoring has been enabled for an ECS system. Under which conditions will a BAD event be received?A . UNKNOWN and NOT READYB . SUSPECT and UNKNOWNC . DEGRADED and UNTRACKEDD . BAD and NOT READYView AnswerAnswer: D
How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?
How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?A . Simple tokenB . Scoped tokenC . PEA fileD . Login and passwordView AnswerAnswer: B
Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?
Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?A . adminB . emcexpertC . emcsecurityD . rootView AnswerAnswer: C
What technology is used in ECS to protect loss of a site in a two-site configuration?
What technology is used in ECS to protect loss of a site in a two-site configuration?A . Full Mirror CopyB . Erasure CodingC . XORD . Dual ParityView AnswerAnswer: A
When SEC Compliance is enabled, what action can be taken on a retention period?
When SEC Compliance is enabled, what action can be taken on a retention period?A . ShortenedB . ExtendedC . DeletedD . Deleted with privileged deleteView AnswerAnswer: B
Which protocol is supported natively on ECS?
Which protocol is supported natively on ECS?A . NFSv3B . SMBC . NFSv2D . CIFSView AnswerAnswer: A
What task is the responsibility of the emcsecurity user?
What task is the responsibility of the emcsecurity user?A . Locking nodesB . Overriding bucket retention settingC . Changing passwords for admin usersD . Modifying SEC complianceView AnswerAnswer: A