Which OneFS daemon is responsible for generating each user's identity token?

Which OneFS daemon is responsible for generating each user's identity token?A . lsassdB . lwiodC . srvscd netlogonView AnswerAnswer: A

September 20, 2024No CommentsREAD MORE +

By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to "Native" and a user has a synthetic UID?

By default, which ID is stored on a Dell EMC Isilon cluster when the on-disk identity is set to "Native" and a user has a synthetic UID?A . RIDB . GIDC . SIDD . UIDView AnswerAnswer: C

September 20, 2024No CommentsREAD MORE +

In an Isilon environment, what are the on-disk identity types that appear in the web administration interface?

In an Isilon environment, what are the on-disk identity types that appear in the web administration interface?A . SMB, NFS, and MixedB . AD, LDAP, and NISC . GUID, SID, and MixedD . SID, UNIX, and NativeView AnswerAnswer: D

September 19, 2024No CommentsREAD MORE +

When using automatic home directory creation for SMB shares, which variable is used for the NetBIOS domain name?

When using automatic home directory creation for SMB shares, which variable is used for the NetBIOS domain name?A . %DB . %NC . %SD . %ZView AnswerAnswer: A

September 19, 2024No CommentsREAD MORE +

In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access auditing capability

In a OneFS operating environment, which protocols are included in the Dell EMC Isilon post-access auditing capabilityA . NFS, SMB, and HDFSB . NFS, FTP, and SWIFTC . NFS, SMB, and SWIFTD . NFS, FTP, and HDFSView AnswerAnswer: A

September 19, 2024No CommentsREAD MORE +

If node 1 goes down, to which node, or LNN, would the SSIP service move?

A customer has a 5-node cluster in which the SIP is answering DNS queries from node 1. If node 1 goes down, to which node, or LNN, would the SSIP service move?A . 2B . 3C . 4D . 5View AnswerAnswer: D

September 19, 2024No CommentsREAD MORE +

Which type of administrator commands does configuration auditing track?

Which type of administrator commands does configuration auditing track?A . PAPI-enabled commandsB . Commands run by the “root” userC . Commands run by the SystemAdmin and CompAdmin users onlyD . All UNIX, isi, isi_ and sudo commandsView AnswerAnswer: A

September 18, 2024No CommentsREAD MORE +

What must be done to configure cluster name resolution for SmartConnect?

What must be done to configure cluster name resolution for SmartConnect?A . Create the SSIP, add the DNS delegation, configure the subnet, and configure the node poolB . Create a host A record, create an NS record, configure the subnet, and configure the poolC . Create the SSIP, create an...

September 18, 2024No CommentsREAD MORE +

Which capabilities are enabled after activating an Isilon SnapshotIQ license?

Which capabilities are enabled after activating an Isilon SnapshotIQ license?A . Create and schedule snapshots, and modify SnapshotIQ settingsB . View and delete snapshots, and access snapshot dataC . View, create, and schedule snapshots, and access snapshot dataD . Create snapshot schedules, access snapshot data, and delete snapshotsView AnswerAnswer: A

September 18, 2024No CommentsREAD MORE +

What information does the isi statistics command display?

What information does the isi statistics command display?A . Protocol status, general performance, hardware condition, and critical alertsB . General status, node management, Job Engine status, and drive statisticsC . Drive statistics, protocol status, node statistics, and hardware statisticsD . Drive status, hardware condition, critical alert, and protocol statusView AnswerAnswer:...

September 17, 2024No CommentsREAD MORE +