Exam4Training

DELL EMC D-ECS-OE-23 Dell ECS Operate 2023 Exam Online Training

Question #1

A company has decided to buy a new Isilon cluster and ECS appliance for their disaster recovery (DR) site.

Which files are expected to be replicated to the DR site?

  • A . Stubs and non-archived files
  • B . Archived and non-archived files
  • C . Stubs only
  • D . Non-archived files only

Reveal Solution Hide Solution

Correct Answer: A
Question #2

When a disk state is suspect, what are the allowable disk operations?

  • A . Read
  • B . Write
  • C . Read and write
  • D . No operations allowed

Reveal Solution Hide Solution

Correct Answer: A
Question #3

By default, how long does ECS retain capacity utilization data in monitoring history?

  • A . 1 day
  • B . 7 day
  • C . 60 days
  • D . 1 year

Reveal Solution Hide Solution

Correct Answer: C
Question #4

When enabling Dell EMC NetWorker with CloudBoost and ECS integration, which configuration task is optional in ECS?

  • A . Generate a S3 secret key to add to the CloudBoost configuration
  • B . Create a dedicated storage pool for CloudBoost storage
  • C . Create a dedicated namespace for CloudBoost storage
  • D . Create an object user account for CloudBoost access

Reveal Solution Hide Solution

Correct Answer: B
Question #5

An administrator is trying to configure a Cloud Unit in Data Domain System Manager for access to an ECS and receives the following error: The Access Key ID you provided does not exist in our records.

What needs to be checked?

  • A . ECS access key ID in the Object User Name configured in the ECS Portal
  • B . ECS access key ID in the Management User Name configured in the ECS Portal
  • C . ECS .PEA file in the Object User Name configured in the ECS Portal
  • D . ECS .PEA file in the Management User Name configured in the ECS Portal

Reveal Solution Hide Solution

Correct Answer: A
Question #6

Which type of object access user is required on the ECS for Dell EMC Isilon CloudPools?

  • A . CAS
  • B . S3
  • C . Swift
  • D . HDFS

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Which type of data service does ECS provide?

  • A . NFSv3
  • B . Block
  • C . CIFS
  • D . SMB

Reveal Solution Hide Solution

Correct Answer: A
Question #8

A storage administrator is trying to create a new bucket using s3curl.pl. They use a URL pointing to their load balancer. The SSL connection is terminated on the load balancer.

What port number should be used at the command line?

  • A . 9020
  • B . 9021
  • C . 9023
  • D . 9025

Reveal Solution Hide Solution

Correct Answer: A
Question #9

When SEC Compliance is enabled, what action can be taken on a retention period?

  • A . Shortened
  • B . Extended
  • C . Deleted
  • D . Deleted with privileged delete

Reveal Solution Hide Solution

Correct Answer: B
Question #10

Which component of ECS includes NFS tools to support object storage?

  • A . Zookeeper
  • B . Storage Engine
  • C . Fabric
  • D . Data Services

Reveal Solution Hide Solution

Correct Answer: D

Question #11

Compliance monitoring has been enabled for an ECS system.

Under which conditions will a BAD event be received?

  • A . UNKNOWN and NOT READY
  • B . SUSPECT and UNKNOWN
  • C . DEGRADED and UNTRACKED
  • D . BAD and NOT READY

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which elements appear in the ECS S3 service using the Signature Version 2 authorization header?

  • A . Namespace and signature
  • B . HMAC and secret key
  • C . Access key ID and signature
  • D . Secret key and signature

Reveal Solution Hide Solution

Correct Answer: C
Question #13

If the ECS S3 API “Put” method is used to create a new object with the same name as an existing object, what is the expected behavior of the S3 operation?

  • A . Error will be generated
  • B . Operation will stop
  • C . Warning will be generated
  • D . File will be overwritten

Reveal Solution Hide Solution

Correct Answer: D
Question #14

What is a benefit of deploying an ECS software-only solution?

  • A . Uses Dell EMC hardware exclusively for high performance
  • B . Provides a single hardware and software solution offering
  • C . Uses low cost, commodity hardware that does not compromise enterprise storage capabilities
  • D . Deployed as a virtual machine for a lower total cost of ownership

Reveal Solution Hide Solution

Correct Answer: C
Question #15

A company is integrating Dell EMC Isilon CloudPools with the ECS and would like to enable CloudPools for disaster recovery failover.

Which deep copy option should be used?

  • A . Force
  • B . Stub sync
  • C . Allow
  • D . Deny

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Which log file should you check if you suspect that an authorized user has been logging in to an ECS system?

  • A . eventsvc.log
  • B . authsvc.log
  • C . resourcesvc.log
  • D . provisionsvc.log

Reveal Solution Hide Solution

Correct Answer: B
Question #17

A company deploys an ECS geo-federated setup. They need to read and write the accessible copy of the object if a temporary site failure occurs.

What must they do during ECS configuration to meet this requirement?

  • A . Enable Access During Outage flag in the bucket.
  • B . Enable the Replicate to All Sites flag in the VDC.
  • C . Enable Cold Storage in the storage pool.
  • D . Create a Retention Policy in the namespaces.

Reveal Solution Hide Solution

Correct Answer: A
Question #18

What is a characteristic of ECS support for NFSv3 ACLs?

  • A . Supports rich access control lists for NFSv3
  • B . Enforces permissions inherited from the S3 protocol
  • C . Supports NFSv3 but has no support for ACLs
  • D . Must be connected to an LDAP server or Active Directory

Reveal Solution Hide Solution

Correct Answer: A
Question #19

An ECS is configured as backend storage for OpenStack Cinder.

Which type of data will it store?

  • A . Disk and server images
  • B . OpenStack Swift client access information
  • C . Multimedia files
  • D . Volume data backups

Reveal Solution Hide Solution

Correct Answer: A
Question #20

What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?

  • A . ECS does not support external key management
  • B . Bucket creation will fail with an error to provide a key in the header
  • C . Encryption will not be enabled
  • D . A system generated key will be used instead

Reveal Solution Hide Solution

Correct Answer: D

Question #21

Which program installs and manages ECS CLI?

  • A . EMCO MSI
  • B . Pip
  • C . WinSCP
  • D . RDP

Reveal Solution Hide Solution

Correct Answer: B
Question #22

A company has a long-term plan to apply many S3 client applications that will integrate with ECS. The systems administrator is required to implement all the needed configurations for all possible S3 client bucket-style addressing methods.

Which configuration will meet the requirements?

  • A . Create the DNS wild card record, the host record for the load balancer, and the required SSL certificate on the load balancer
  • B . Create the DNS wild card record, the host record for the load balancer, and the base URL on the ECS
  • C . Create the DNS wild card record for the load balancer, the required SSL certificate on the load balancer, and the base URL on the ECS
  • D . Create the DNS host record for the load balancer, the base URL on the ECS, and the required S3 client configuration files

Reveal Solution Hide Solution

Correct Answer: B
Question #23

What is the purpose of creating ECS Virtual Data Centers?

  • A . Present nodes within a site as a single logical unit
  • B . Function as a container for object data
  • C . Expose storage pools from replication groups to applications
  • D . Define protection and availability of storage pools

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Which task is the responsibility of the emcsecurity user?

  • A . Changing the passwords for admin users
  • B . Modifying SEC compliance
  • C . Overriding the bucket retention setting
  • D . Locking nodes

Reveal Solution Hide Solution

Correct Answer: D
Question #25

Which configuration task is optional in ECS when enabling NetWorker with CloudBoost and ECS integration?

  • A . Create a dedicated Namespace for CloudBoost storage.
  • B . Generate an S3 secret key to add to the CloudBoost configuration.
  • C . Create a dedicated storage pool for CloudBoost storage.
  • D . Create an object user account for CloudBoost access.

Reveal Solution Hide Solution

Correct Answer: C
Question #26

Compliance monitoring was enabled for an ECS system. Under which conditions will a BAD event be received?

  • A . DEGRADED and UNTRACKED
  • B . BAD and NOT READY
  • C . UNKNOWN and UNTRACKED
  • D . UNKNOWN and NOT READY

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Which process allows ECS to reconstruct objects within a storage pool, if that pool loses a disk?

  • A . Full mirrored replication
  • B . Chunk management
  • C . Erasure coding
  • D . XOR operation

Reveal Solution Hide Solution

Correct Answer: B
Question #28

What happens when a soft quota is reached on a bucket?

  • A . No new writes are allowed
  • B . Nothing will happen
  • C . Only updates are allowed
  • D . Warning event is triggered

Reveal Solution Hide Solution

Correct Answer: D
Question #29

How does a user apply a license on an ECS system?

  • A . Within the ECS portal
  • B . Using the command line interface (CLI)
  • C . Through SSH
  • D . Using the ECS Rest API

Reveal Solution Hide Solution

Correct Answer: A
Question #30

A company wants its x64 Linux backup data sent directly to ECS.

Which supported and most efficient configuration would you recommend for this environment?

  • A . Use a NetWorker storage node to receive x64 Linux Networker client data and send it to ECS
  • B . Use a CloudBoost appliance as a NetWorker storage node to receive x64 Linux NetWorker client data and send it to ECS
  • C . Use Client Direct on the x64 Linux NetWorker client to send data to a CloudBoost appliance and then transfer it to ECS
  • D . Use Client Direct with CloudBoost agent on the x64 Linux Networker client to transfer data to ECS

Reveal Solution Hide Solution

Correct Answer: A

Question #31

On which level(s) is the ECS quota enforced?

  • A . Namespace only
  • B . Bucket only
  • C . Object user
  • D . Bucket and namespace

Reveal Solution Hide Solution

Correct Answer: D
Question #32

A company has decided to use Dell EMC Isilon CloudPools with ECS as the Cloud storage target. During the initial integration, they discover that the ECS namespace is inaccessible.

What is a possible reason for this issue?

  • A . Incorrect Cloud provider type was selected
  • B . Object local user is configured as a namespace admin
  • C . Management user is configured as a user admin
  • D . ECS bucket was already created

Reveal Solution Hide Solution

Correct Answer: B
Question #33

When can D@RE be enabled on a bucket or namespace?

  • A . Only at the time of creation for a bucket and namespace
  • B . Any time for both a bucket and namespace
  • C . Any time for a bucket; only at creation of the namespace
  • D . Any time for the namespace; only at creation of a bucket

Reveal Solution Hide Solution

Correct Answer: A
Question #34

How many ECS appliances can be configured as target object stores, per CloudBoost appliance?

  • A . 1
  • B . 3
  • C . 4
  • D . 5

Reveal Solution Hide Solution

Correct Answer: A
Question #35

What task is the responsibility of the emcsecurity user?

  • A . Locking nodes
  • B . Overriding bucket retention setting
  • C . Changing passwords for admin users
  • D . Modifying SEC compliance

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Which protocol is supported natively on ECS?

  • A . NFSv3
  • B . SMB
  • C . NFSv2
  • D . CIFS

Reveal Solution Hide Solution

Correct Answer: A
Question #37

How is an ECS federation created?

  • A . From the first ECS running the primary VDC, create an additional VDC entry for each remote ECS instance.
  • B . Add the remote VDC into the replication group configuration for the primary VDC
  • C . Create a new federation configuration from any VDC, then add all other VDCs to the configuration
  • D . Create the remote VDC then merge both the first VDC and the remote VDC into the federation configuration.

Reveal Solution Hide Solution

Correct Answer: C
Question #38

What technology is used in ECS to protect loss of a site in a two-site configuration?

  • A . Full Mirror Copy
  • B . Erasure Coding
  • C . XOR
  • D . Dual Parity

Reveal Solution Hide Solution

Correct Answer: A
Question #39

An organization is designing a new S3 client that will integrate with ECS. They are evaluating the use of the EMC S3 API and the Amazon S3 API. The business need is to store images of their products along with their specifications and to have fast access to the images based on the stored specifications. The organization decides to use the EMC S3 API as it has the needed S3 API extension to do that.

What is that extension?

  • A . Byte range update
  • B . File system enabled
  • C . Bucket retention period
  • D . Metadata search

Reveal Solution Hide Solution

Correct Answer: D
Question #40

Which ECS authentication factors are required for a Centera client to authenticate?

  • A . Object user and CAS password
  • B . Object user and bucket secret key
  • C . Bucket certificate and .PEA file
  • D . Object user and .PEA file

Reveal Solution Hide Solution

Correct Answer: D

Question #41

Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?

  • A . admin
  • B . emcexpert
  • C . emcsecurity
  • D . root

Reveal Solution Hide Solution

Correct Answer: C
Question #42

Which protocol allows Microsoft Windows servers to access storage on ECS?

  • A . HDFS
  • B . NFSv3
  • C . CIFS
  • D . SMBv3

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which security property should be set in the core-site.xml file for ECS-ViPRFS integration with Hadoop?

  • A . fs.defaultFS
  • B . fs.viprfs.impl
  • C . fs.vipr.installations
  • D . fs.permissions.umask-mode

Reveal Solution Hide Solution

Correct Answer: D
Question #44

A newly configured ECS system contains 16 nodes.

How many fragments will each ECS node contain when a data chunk is broken up by erasure coding?

  • A . 1
  • B . 4
  • C . 8
  • D . 16

Reveal Solution Hide Solution

Correct Answer: A
Question #45

Which tool is used for validating the .PEA file in the ECS CAS bucket?

  • A . JCenteraVerify
  • B . bucketdump
  • C . cldiff
  • D . CyberDuck

Reveal Solution Hide Solution

Correct Answer: A
Question #46

Which ECS feature is responsible for protecting and sharing objects for global access?

  • A . Replication Group
  • B . Federation
  • C . VDC
  • D . Storage Pool

Reveal Solution Hide Solution

Correct Answer: B
Question #47

What is a prerequisite for an end user to obtain the license file?

  • A . License Authorization Code (LIC)
  • B . ECS access to ELMS website
  • C . Software ID (SWID)
  • D . Number of ECS nodes

Reveal Solution Hide Solution

Correct Answer: A
Question #48

Which mechanism handles the loss of a site in an ECS configuration with three or more sites?

  • A . Full mirror copy
  • B . Distributed erasure coding
  • C . Hybrid erasure coding
  • D . XOR scheme

Reveal Solution Hide Solution

Correct Answer: D
Question #49

How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?

  • A . Simple token
  • B . Scoped token
  • C . PEA file
  • D . Login and password

Reveal Solution Hide Solution

Correct Answer: B
Question #50

Which operation is unavailable when network connectivity is interrupted between the VDCs in an environment with two or more VDCs?

  • A . Write object
  • B . Read object
  • C . Update object
  • D . Create namespace

Reveal Solution Hide Solution

Correct Answer: D
Exit mobile version