How many nodes should be set up to coordinate NTP for an Isilon cluster?
How many nodes should be set up to coordinate NTP for an Isilon cluster?A . All nodesB . Two onlyC . Every node connected to the networkD . One onlyView AnswerAnswer: D
What method would you implement to meet their requirements?
A customer would like to limit administrative access to a subset of cluster management capabilities. What method would you implement to meet their requirements?A . Create a custom role with only the required privilegesB . Use the BackupAdmin role and add the required privilegesC . Use the SecurityAdmin role to...
Which command is used to enable Source-Based Routing in OneFS 8.2.0?
Which command is used to enable Source-Based Routing in OneFS 8.2.0?A . isi network groupnets modify --sbr=trueB . isi network subnets modify --sbr=trueC . isi network pools modify --sbr=trueD . isi network external modify --sbr=trueView AnswerAnswer: D
By default, what does EMC Isilon search for when looking up user ID mappings?
By default, what does EMC Isilon search for when looking up user ID mappings?A . Same name in file providerB . Presence of a UID/GIDC . Same name in LDAPD . uidAttribute is ADView AnswerAnswer: B
What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?
What is a requirement when adding Gen 6 nodes to an existing Dell PowerScale Gen 5 cluster?A . 40 Gb InfiniBand portsB . Decreased journal size for storage performanceC . Dedicated bootflash drivesD . NVRAM dependencyView AnswerAnswer: A
What is a key consideration regarding the SyncIQ functionality?
A Dell EMC Isilon customer needs to replicate all data synchronously to a disaster recovery site. What is a key consideration regarding the SyncIQ functionality?A . SyncIQ synchronous option must be configuredB . SyncIQ is only an asynchronous replication toolC . SyncIQ source must be modified to replicateD . SnapshotIQ...
What are sources form which an Isilon cluster can obtain authentication data about a user attempting to access the cluster?
What are sources form which an Isilon cluster can obtain authentication data about a user attempting to access the cluster?A . NIS+, HTTP, and NISB . FTP, filedb, and samdbC . LDAP, NIS, and filedbD . HHTP, LDAP, and samdbView AnswerAnswer: C
Which feature should be configured to accept writes, even after the H600 nodes become full?
A Dell PowerScale administrator has four H600 nodes and eight A2000 nodes in the cluster. The file pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the administrator has some concerns about the available capacity on the H600 nodes. Which feature...
In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the shares the client is able to view?
In a Dell EMC Isilon cluster, what determines the authentication services that will be queried and the shares the client is able to view?A . SmartConnectB . Access zoneC . Access Control ListD . Mode bitView AnswerAnswer: B
What refresh process is appropriate in this case?
A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes. What refresh process is appropriate in this case?A . Use SyncIQ to migrate the data...