Exam4Training

DELL EMC D-PSC-DS-23 Dell PowerScale Design 2023 Exam Online Training

Question #1

Which Isilon tool can be run from the cluster to display Isilon statistics such as CPU activity?

  • A . iperf
  • B . iostat
  • C . InsightIQ
  • D . MiTrend

Reveal Solution Hide Solution

Correct Answer: C
Question #2

What is a correct statement concerning InsightIQ, excluding FSA?

  • A . InsightIQ runs on separate hardware from the cluster and does not take cluster resources beyond the data collection process.
  • B . InsightIQ runs on separate hardware from the cluster and provides data used by the isi statistics CLI command set.
  • C . InsightIQ runs on the lowest logical node (LNN) on the cluster and provides data used by InsightIQ appliance for graphical output.
  • D . InsightIQ runs on the lowest logical node (LNN) on the cluster and provides data used by the isi statistics CLI command set.

Reveal Solution Hide Solution

Correct Answer: A
Question #3

A customer has two Isilon clusters in an Active-Passive setup. The customer has latency sensitive media editing workflows. Most of the media editing work occurs prior to broadcasting between 7:00-8:00, 11:00- 12:00, 17:00-18:00 and 19:00-20:00.

What should be recommended to minimize the risk of including latency to the client workflow?

  • A . Retain the default job impact policies that would run the Job Engine jobs. Do not run SyncIQ policies during the given hours.
  • B . Create and set a custom job impact policy that would exclude the running SyncIQ policies during the given hours.
  • C . Create and set a custom job impact policy that would exclude the running of the Job Engine jobs. Do not run SyncIQ policies during the given hours.
  • D . Retain the default job impact policies that would run the Job Engine jobs. Run SyncIQ policies during the given hours.

Reveal Solution Hide Solution

Correct Answer: C
Question #4

During initial configuration of a PowerScale cluster, OneFS creates a network using the default internal network interface without a failover option.

What is the default back-end network interface used?

  • A . eth-0
  • B . int-a
  • C . int-b
  • D . eth-1

Reveal Solution Hide Solution

Correct Answer: B
Question #5

How are clients, L1 cache, L2 cache, and disks interconnected?

  • A . Clients connect to L1 Cache and write coalescer L1 cache is connected to L2 on the local node L2 cache connects to disks on all nodes via internal network
  • B . Clients connect to L2 Cache and write coalescer L1 cache connects to disks on all nodes via internal network L2 cache is connected to L1 on the local node
  • C . Clients connect to L2 Cache and write coalescer L1 cache connects to disk on its local node L2 cache is connected to L1 on all nodes via internal network
  • D . Clients connect to L1 Cache and write coalescer L1 cache is connected to L2 on all nodes via internal network L2 cache connects to disks on its local node

Reveal Solution Hide Solution

Correct Answer: A
Question #6

Which type(s) of data is predominately associated with home directories and file shares?

  • A . E-mail files, PPT, Word documents
  • B . Oracle directories
  • C . SQL database files
  • D . XML data

Reveal Solution Hide Solution

Correct Answer: A
Question #7

A customer has two PowerScale clusters. Cluster1 has eight H700 nodes, and Cluster2 has twelve A300 nodes. The customer wants to monitor real-time performance data of both clusters and track file growth.

Which tool should be recommended?

  • A . IOZone
  • B . Iperf
  • C . InsightIQ
  • D . Iometer

Reveal Solution Hide Solution

Correct Answer: C
Question #8

A customer has a 2 GB file that is tiered to the cloud by CloudPools. The Isilon cluster is running OneFS 8.1.2. Approximately how many cloud data objects will be created for this file?

  • A . 1,024
  • B . 2,048
  • C . 4,096
  • D . 16,416

Reveal Solution Hide Solution

Correct Answer: A
Question #9

Which feature will provide data immutability without the ability for the administrator to delete the files under any condition?

  • A . Access Control Entries
  • B . Role-based Access Controls
  • C . Enterprise SmartLock
  • D . Compliance SmartLock

Reveal Solution Hide Solution

Correct Answer: D
Question #10

What method does the MediaScan job leverage to locate and clear media-level errors?

  • A . MD5
  • B . FEC
  • C . SHA256
  • D . CRC

Reveal Solution Hide Solution

Correct Answer: D

Question #11

One of your customers is interested in a PowerScale Gen6 solution. They have provided basic solution requirements, but their security policies do not allow them to perform detailed data collection for infrastructure and workload analysis.

Which tool should you use to design the new PowerScale solution?

  • A . Iometer
  • B . Power Calculator
  • C . SolVE Online
  • D . PowerSizer

Reveal Solution Hide Solution

Correct Answer: D
Question #12

Which Isilon Gen 6 node models can use only L3 cache?

  • A . A200 and A2000
  • B . A200 and H5600
  • C . F800 and H600
  • D . F800 and A2000

Reveal Solution Hide Solution

Correct Answer: D
Question #13

A large hospital organization is looking for a vendor neutral archive solution for their imaging data. When proposing an Isilon solution, which benefits should be discussed?

  • A . Consolidation of imaging applications and ability to switch PACS systems
  • B . Deduplication of image data and Data at Rest Encryption
  • C . Data at Rest Encryption and high performance storage platform
  • D . Consolidation of imaging applications and global namespace acceleration

Reveal Solution Hide Solution

Correct Answer: A
Question #14

A potential customer has a requirement for 4 PB of usable capacity to store media files. Their data center has limited physical space, so efficient use of that space is important. However, the customer is concerned about using 3 TB or larger drives because of rebuild times.

How does an Isilon cluster address this customer’s concern?

  • A . Drive recovery takes the same amount of time regardless of drive size
    Short-stroking 4 TB drives to reduce drive seek and access time
  • B . Proactive hot sparing eliminates most drive rebuilds
    Endurant Cache reduces the overhead during drive rebuild operations
  • C . Nodes have more drives per rack unit
    Proactive hot sparing eliminates most drive rebuilds
  • D . OneFS protects data rather than rebuilding drives
    Splitting drives into failure domains reduces risk

Reveal Solution Hide Solution

Correct Answer: D
Question #15

Where does SmartCache stage its write cache?

  • A . SSD
  • B . DISK
  • C . NVRAM
  • D . DRAM

Reveal Solution Hide Solution

Correct Answer: C
Question #16

Following Dell best practices, at what capacity consumption should an organization begin the process of ordering more nodes to add to a cluster?

  • A . 80%
  • B . 85%
  • C . 75%
  • D . 70%

Reveal Solution Hide Solution

Correct Answer: A
Question #17

What are characteristics of the streaming data access pattern on a PowerScale Gen6 cluster?

  • A . Single stream workflows, very aggressive prefetching
  • B . Clients accessing the same data, aggressive prefetching
  • C . Multiple stream workflows, no prefetching
  • D . Clients accessing the same data, moderate prefetching

Reveal Solution Hide Solution

Correct Answer: A
Question #18

Which SmartConnect policies are used for workloads that have short lived connections such as HTTP and FTP?

  • A . Connection count and round robin
  • B . Round robin and CPU usage
  • C . Throughput and CPU usage
  • D . Throughput and connection count

Reveal Solution Hide Solution

Correct Answer: A
Question #19

When a Gen 6 Isilon cluster receives a file to be stored, which node(s) performs the FEC calculation?

  • A . Node to which the client is connected
  • B . Each node in the cluster
  • C . First node in each node pair
  • D . Node that will be holding the FEC

Reveal Solution Hide Solution

Correct Answer: A
Question #20

By default, which method is used by Isilon OneFS for SSDs?

  • A . Metadata read acceleration
  • B . Metadata read/write acceleration
  • C . Data on SSDs
  • D . Avoid SSDs

Reveal Solution Hide Solution

Correct Answer: A

Question #21

In an NFSv3 only environment, what is the recommended limit for active NFSv3 connections, per Isilon node?

  • A . 500
  • B . 1,000
  • C . 1,500
  • D . 2,500

Reveal Solution Hide Solution

Correct Answer: C
Question #22

A large manufacturing company is an existing Isilon customer with a cluster consisting of four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file system shows that it is 60% utilized. Home directories and file shares comprise 75% of the existing content and the remainder is inactive deep archive. The company has 1,000 employees using Windows and Mac clients participating in a single Active Directory (AD) forest.

During a meeting with the CIO and Director of IT you discuss the company’s recent acquisition – an engineering firm that specializes in Computer Aided Design (CAD). The engineering firm has 400 UNIX workstations that produce technical drawings which are currently stored on another vendor’s SAN solution. The all UNIX environment uses NIS for authentication and name resolution. They do not currently use DNS or LDAP. The engineering company has an old storage system that has been experiencing problems and the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to eliminate all tape and recover the data onto disk.

The CIO is concerned about security of the company’s intellectual property, especially with the rapid adoption of mobile devices and external cloud content sharing services such as DropBox, Egnyte, and SugarSync. They would like to implement an alternative that provides external file sharing and mobile device synchronization while maintaining security control over the company’s data.

The Director of IT reports that users are storing non-work related content on the Isilon cluster. They would like to limit the amount of capacity that each user can consume in their home directory and want to ensure you provide the capability to easily visualize which users are over their allotment. The company’s Windows users currently leverage Windows Shadow Copy to recover files that have been accidentally deleted. The IT department wants to ensure that Mac and incoming UNIX clients have the same functionality.

The Director of IT also mentions that users are reporting slow response times when browsing their home directories and shared folders. They are concerned that Isilon cannot scale to support their combined requirements.

The customer provides the following environment summary from the engineering firm’s recently departed IT staff:

– 20 TB of Home Directory data

– 100 TB of active CAD projects

– 400 TB of archived data stored on tape at an offsite warehouse

The CIO approaches you with a new requirement. They would like to reuse the tape library that was previously used for archiving to now be used to back up some of their data.

What do you recommend to the Director of IT as the best architecture to achieve this goal?

  • A . Connect the Tape Library via Fibre Channel to the Isilon cluster and use a third party backup software to initiate an NDMP backup to an accelerator.
  • B . Implement a Backup Accelerator and use the internal backup software within the Isilon cluster to move data to the tape library.
  • C . Use a Backup Accelerator with SynclQ to push the data to the tape library via the Fibre Channel ports on the accelerator.
  • D . Use a third party backup software and have the Isilon cluster convert the data to LTFS so it can be stored to the tape library.

Reveal Solution Hide Solution

Correct Answer: A
Question #23

You have received a critical task that requires immediate analysis of system performance. Captured data will later be processed by MiTrend, but a current assessment is not available.

Which utility will quickly provide IOPS associated with reads and writes, CPU utilization, and I/O scheduler wait time?

  • A . Wireshark
  • B . tcpdump
  • C . iostat
  • D . NFSstat

Reveal Solution Hide Solution

Correct Answer: C
Question #24

You are sizing a PowerScale Gen6 cluster for a small organization that is concerned about the availability of the journal during an extended power outage.

What is a consideration when sizing?

  • A . Journal must be protected by an external UPS.
  • B . Journal is written to nonvolatile storage if power is lost.
  • C . Journal is replicated to all nodes within a chassis.
  • D . Battery life within each node is a limiting factor.

Reveal Solution Hide Solution

Correct Answer: B
Question #25

What is the sector size of an Isilon 8 TB drive?

  • A . 1024 bytes
  • B . 2048 bytes
  • C . 4096 bytes
  • D . 512 bytes

Reveal Solution Hide Solution

Correct Answer: C
Question #26

A European Sports TV network is considering Isilon for their Media Edit Storage for their editing workloads. They are also considering Isilon for near-line media archiving.

The network receives XDCAM HD footage which is loaded onto their existing Transcoding Storage platform. New footage that needs to be edited will be transferred from their Transcoding Storage platform to the proposed Media Edit Storage platform at the rate of ten simultaneous XDCAM HD files via FTP. Edited files will be transferred back to the Transcoding Storage platform at the rate of ten simultaneous XDCAM HD files via FTP.

The network currently has 15 Final Cut Pro edit stations, 15 Avid edit stations. Proxy software will be used to allow Isilon to act as the storage for the Final Cut Pro and Avid media. Three of those edit stations will be performing content compositing as needed.

The network expects 70 hours of new content per week, and 50 hours of edited content per week. They intend to keep the new and edited content on the proposed Media Edit Storage as a performance tier for 30 days. They would like to retain all new and edited footage proposed Media Edit Storage as a near-line tier for two years.

In addition to the current workloads, the network expects to implement a new Media Asset Management (MAM) solution and has requested the Isilon cluster be capable of supporting 120 MBps read and 120 MBps write to support the MAM requirements.

The customer wants to be able to put completed content into a non-editable folder. However, they want to give access to an administrator to delete content if required.

What do you recommend to the customer?

  • A . SmartLock using Enterprise mode
  • B . SmartLock using Compliance mode
  • C . WORM using Compliance mode
  • D . SyncIQ with read-only mode

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Your customer’s site uses an old X-Series cluster, and they are interested in consolidating their two primary workflows. iostat shows that one of the applications is sensitive to latency, while isi statistics indicates sensitivity to disk response times. There are approximately 1000 users accessing 70 TB of file data.

Which node type would you recommend?

  • A . S200
  • B . X400
  • C . X200
  • D . NL400

Reveal Solution Hide Solution

Correct Answer: A
Question #28

A customer has 1,000 at 2 KB files, 5,000 at 4 KB files, and 4,000 at 7 KB files. They want to know the total amount of space on disk with a requested protection level of N+2d:1n.

How much on-disk space will be consumed for the data and protection overhead, excluding metadata?

  • A . ~146 MB
  • B . ~156 MB
  • C . ~164 MB
  • D . ~234 MB

Reveal Solution Hide Solution

Correct Answer: A
Question #29

When installing nodes into a Dell EMC rack, which node type requires the use of a Titan-HD rack?

  • A . H500
  • B . F800
  • C . A2000
  • D . A200

Reveal Solution Hide Solution

Correct Answer: C
Question #30

Which data access pattern uses moderate prefetching?

  • A . Streaming
  • B . Mirroring
  • C . Random
  • D . Concurrency

Reveal Solution Hide Solution

Correct Answer: A

Question #31

A customer wants to replace a legacy storage environment used for high definition video editing. Each workstation connecting to the shared storage needs to sustain 650 MB/s of single stream bandwidth.

Which node type is recommended?

  • A . Performance Accelerator nodes
  • B . NL-Series nodes
  • C . X-Series nodes
  • D . S-Series nodes

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Which tool is used to perform a cluster-wide kernel configuration change on an Isilon Gen 6 cluster?

  • A . gconfig
  • B . isi_tardis
  • C . isi_for_array
  • D . sysct1

Reveal Solution Hide Solution

Correct Answer: C
Question #33

A new customer is interested in an Isilon Gen 6 solution to replace their sprawling and outdated Linux environment.

Which client tool should you use to establish an estimate of the workload and pattern as an input to the sizing process?

  • A . tcpdump
  • B . lometer
  • C . File System Analytics
  • D . iostat

Reveal Solution Hide Solution

Correct Answer: C
Question #34

We have been engaged by a research hospital to help upgrade their Isilon installation. They currently have 12 previous generation Isilon nodes with 200TB of capacity and run on a 1Gbps network. They currently have 6 IIlumina Hi-Seq Sequencers and an HPC cluster to process data.

They would like to expand Isilon to 2PB of active data and 1PB of archive data. They use a third party data and metadata management service (IRODs) to stage data for analysis. The Isilon cluster is mainly used for analysis work with the HPC cluster. The customer has a limited budget.

What would be the best price/performance solution for their active data?

  • A . 14 X-Series nodes with no SSD drives and 96GB of RAM
  • B . 17 X-Series nodes with SSD drives and 48GB of RAM
  • C . 14 NL-Series nodes with 24GB of RAM
  • D . 12 X-Series nodes with no SSD drives and 24GB of RAM

Reveal Solution Hide Solution

Correct Answer: B
Question #35

Where does Endurant Cache stage its write cache?

  • A . SSD
  • B . DISK
  • C . NVRAM
  • D . DRAM

Reveal Solution Hide Solution

Correct Answer: C
Question #36

What is an accurate statement concerning shared journals on node pairs?

  • A . Requires a minimum of 4 nodes
  • B . Directly linked through mid-plane of the chassis
  • C . When a node boots, it first checks its paired node’s resources
  • D . Nodes 1 and 3 and nodes 2 and 4 form node pairs

Reveal Solution Hide Solution

Correct Answer: B
Question #37

What must be configured on a PowerScale in order to store only the customer presentation PPT and PDF files on the cluster and the external repository?

  • A . Enable file filtering on the share repository, denying access to PDF and PPT file extensions.
  • B . Enable file filtering on the share repository, allowing only write PDF and PPT file extensions.
  • C . Enable file filtering only on the share repository, allowing only read-only PDF and PPT file extensions.
  • D . Enable file filtering only on the share repository, denying access to PDF and PPT file extensions.

Reveal Solution Hide Solution

Correct Answer: B
Question #38

What is the behavior of the Isilon time and date settings and what is the best practice?

  • A . SMB time sync takes precedence over the NTP service SMB time is enabled by default on the cluster Best Practice: do not use SMB time, use NTP for cluster and Domain Controller
  • B . NTP service takes precedence over SMB time sync SMB time is enabled by default on the cluster Best Practice: do not use NTP time, use SMB for cluster and Domain Controller
  • C . NTP service takes precedence over SMB time sync SMB time is enabled by default on the cluster Best Practice: do not use SMB time, use NTP for cluster and Domain Controller
  • D . SMB time sync takes precedence over the NTP service SMB time is not enabled by default on the cluster Best Practice: do not use NTP time, use SMB for cluster and Domain Controller

Reveal Solution Hide Solution

Correct Answer: C
Question #39

A large manufacturing company is an existing Isilon customer with a cluster consisting of four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file system shows that it is 60% utilized. Home directories and file shares comprise 75% of the existing content and the remainder is inactive deep archive. The company has 1,000 employees using Windows and Mac clients participating in a single Active Directory (AD) forest.

During a meeting with the CIO and Director of IT you discuss the company’s recent acquisition – an engineering firm that specializes in Computer Aided Design (CAD). The engineering firm has 400 UNIX workstations that produce technical drawings which are currently stored on another vendor’s SAN solution. The all UNIX environment uses NIS for authentication and name resolution. They do not currently use DNS or LDAP. The engineering company has an old storage system that has been experiencing problems and the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to eliminate all tape and recover the data onto disk.

The CIO is concerned about security of the company’s intellectual property, especially with the rapid adoption of mobile devices and external cloud content sharing services such as DropBox, Egnyte, and SugarSync. They would like to implement an alternative that provides external file sharing and mobile device synchronization while maintaining security control over the company’s data.

The Director of IT reports that users are storing non-work related content on the Isilon cluster. They would like to limit the amount of capacity that each user can consume in their home directory and want to ensure you provide the capability to easily visualize which users are over their allotment. The company’s Windows users currently leverage Windows Shadow Copy to recover files that have been accidentally deleted. The IT department wants to ensure that Mac and incoming UNIX clients have the same functionality.

The Director of IT also mentions that users are reporting slow response times when browsing their home directories and shared folders. They are concerned that Isilon cannot scale to support their combined requirements.

The customer provides the following environment summary from the engineering firm’s recently departed IT staff:

– 20 TB of Home Directory data

– 100 TB of active CAD projects

– 400 TB of archived data stored on tape at an offsite warehouse

What steps would you recommend to the IT Director to allow for collaboration between the engineering company and the manufacturing company?

  • A . Set up Access Zones on the Isilon cluster using Active Directory (AD) and NIS authentication.
    Create directories and apply user group permissions from AD and NIS for each collaboration team.
  • B . Repoint the engineering users to the Active Directory controller
    Add the users to the appropriate Active Directory security group.
  • C . Upload a collaboration user csv file into the cluster with usernames and passwords for the collaboration directory.
  • D . Create a new pool for use by the collaboration users.
    Set up Access Zones on the Isilon cluster using AD and NIS authentication.

Reveal Solution Hide Solution

Correct Answer: A
Question #40

In an 18 node Isilon cluster with the default protection setting, what is the layout of a 128 KB file?

  • A . N+3d:1n
  • B . 3x mirrored
  • C . N+2d:1n
  • D . 2x mirrored

Reveal Solution Hide Solution

Correct Answer: B

Question #41

There is a requirement to use dynamic link aggregation to maximize throughput and resiliency on a new Isilon cluster servicing SMB and NFS data.

What is the recommended configuration for the physical network interfaces?

  • A . FEC
  • B . Round robin
  • C . Active/passive failover
  • D . LACP

Reveal Solution Hide Solution

Correct Answer: D
Question #42

Which three external authentication providers can be configured with Dell PowerScale?

(Select 3)

  • A . NIS
  • B . AD
  • C . LDAP
  • D . SAML
  • E . OAuth

Reveal Solution Hide Solution

Correct Answer: ABC
Question #43

When sizing an Isilon cluster for high connection count environments and high streaming I/O rates, which configurable node option is recommended?

  • A . RAM
  • B . SSD
  • C . Disk capacity
  • D . SAS drives

Reveal Solution Hide Solution

Correct Answer: A
Question #44

Which type of interface is used in Isilon hardware nodes for back-end interconnect?

  • A . InfiniBand
  • B . Fibre Channel
  • C . 10GbE
  • D . 40GbE

Reveal Solution Hide Solution

Correct Answer: A
Question #45

An Isilon customer is experiencing less than expected performance and poor space utilization with their cluster. They are using the X400 nodes with an N+2d:1n protection policy to host web server log data.

Upon further analysis, the customer discovers that the web servers write log files 64KiB in size. The log files are then accessed by an analytics application for reporting purposes.

What should be done to increase the write performance of the cluster?

  • A . Change the protection scheme to a mirroring policy
  • B . Add S-Series storage nodes to the cluster
  • C . Add A-Series Performance Accelerator nodes to the cluster
  • D . Change the SSD strategy on the cluster

Reveal Solution Hide Solution

Correct Answer: A
Question #46

You are designing a backup solution using an NDMP redirector and throttler.

What is the default threshold percentage of CPU resources that the throttler limits NDMP to?

  • A . 25
  • B . 45
  • C . 50
  • D . 60

Reveal Solution Hide Solution

Correct Answer: C
Question #47

A Media and Entertainment company is considering changing from 2K resolution to 4K resolution. They will continue to use the DNxHD 220 codec.

Assuming everything else stays the same, how will this change affect storage?

  • A . Storage will be half as large
  • B . Storage requirements will not change
  • C . Storage will be twice as large
  • D . Storage will be four times as large

Reveal Solution Hide Solution

Correct Answer: D
Question #48

Which license is a prerequisite for enabling CloudPools?

  • A . SmartPools
  • B . FilePools
  • C . DiskPools
  • D . NodePools

Reveal Solution Hide Solution

Correct Answer: A
Question #49

What is the minimum size and the maximum size, respectively, of a single pre-Gen 6 node pool?

  • A . 4 and 288
  • B . 4 and 144
  • C . 3 and 288
  • D . 3 and 144

Reveal Solution Hide Solution

Correct Answer: D
Question #50

Which OneFS feature enables you to host multiple tenants from mutually untrusting AD authentication environments from the same DNS namespace?

  • A . SmartConnect
  • B . Groupnets
  • C . SmartQuotas
  • D . Access Zones

Reveal Solution Hide Solution

Correct Answer: D

Question #51

What is appropriate for capturing packets for later analysis of I/O request sizes and randomness on Isilon clusters?

  • A . Mitrend
  • B . Wireshark
  • C . tcpdump
  • D . iostat

Reveal Solution Hide Solution

Correct Answer: B
Question #52

A customer is using Hadoop with direct-attached storage. They are concerned about the cost to build and maintain this infrastructure.

What are the benefits of switching to Hadoop with Isilon OneFS?

  • A . Independent scaling of compute and storage
    Multi-protocol access to data
    ACL-based permissions
  • B . Independent scaling of NameNodes
    Redundant TaskTracker nodes
    Multi-protocol access to data
  • C . Independent scaling of NameNodes
    Multi-protocol access to data
    Kerberos authentication
  • D . Independent scaling of compute and storage
    Independent NameNodes
    Kerberos authentication

Reveal Solution Hide Solution

Correct Answer: A
Question #53

A customer has a cluster running with a single access zone and serves multiple internal departments. The clients access the cluster over both SMB and NFS protocols. A department user has been assigned the task of auditing SMB activity and enforcing appropriate quotas for certain users.

How should the cluster administrator grant this access?

  • A . Create a secondary root account credential
  • B . Create a custom RBAC role
  • C . Provide the AuditAdmin RBAC role
  • D . Provide the SecurityAdmin RBAC role

Reveal Solution Hide Solution

Correct Answer: B
Question #54

A company requires a cluster for deep archiving of data. Storage density is most important and high performance access is not a requirement.

Which node is recommended for this application?

  • A . HD-Series
  • B . NL-Series
  • C . S-Series
  • D . X-Series

Reveal Solution Hide Solution

Correct Answer: B
Question #55

There is a need to carry out a tech refresh of a PowerScale cluster. Old nodes must be removed because they will soon be at end of service life.

What methodology is least disruptive and will retain the file system structure, configuration, data, and DNS information?

  • A . Add the new nodes to the cluster and use SmartPools to move the data to the new nodes
  • B . Install the new nodes into the cluster and migrate using a host-based utility
  • C . Install the new nodes as a new cluster and use SyncIQ to replicate the data to the new nodes
  • D . Install new nodes into the cluster and use SyncIQ to replicate the data from the old to the new nodes

Reveal Solution Hide Solution

Correct Answer: A
Question #56

In your second meeting with the customer you ask the following questions about their current unified SAN and NAS platform. "Are you using an application to map users from NFS Exports to SMB shares? Is each site a separate LDAP or AD Domain?"

What functionality are your trying to understand in their environment and what is the comparable feature in Isilon OneFS?

  • A . Identity Mapping and Authentication Sources
  • B . User Management and AD Authentication
  • C . Kerberos Infrastructure and Identity Management
  • D . NFS Export Management and OneFS Cluster Management

Reveal Solution Hide Solution

Correct Answer: A
Question #57

A customer plans to replace an existing array that is supported by the MiTrend Workload Profile Assessment (WPA) service. You receive performance data from the customer and run a WPA report that shows the array has 50TB of usable capacity.

In discussions with the customer, you learn the content is comprised of four million 6MB files and 400 million 64KB files. The customer explains they have a small budget and very limited rack space available in their datacenter. Performance is not a concern because the files are rarely accessed.

Which configuration provides the needed usable capacity using N+2:1 protection, and requires the least amount of rack space?

  • A . 3 x NL400 nodes with 2TB Drives
  • B . 3 x X400 nodes with 1TB Drives
  • C . 5 x X200 nodes with 1TB Drives
  • D . 6 x X200 nodes with 1TB Drives

Reveal Solution Hide Solution

Correct Answer: A
Question #58

What are two output options from the PowerScale cluster events log? (Select 2)

  • A . Hardware Issues
  • B . OneFS Issues
  • C . SMTP Email
  • D . Logs

Reveal Solution Hide Solution

Correct Answer: CD
Question #59

Which authentication providers can be used when configuring PowerScale netgroups?

  • A . LDAP
    NIS
    File
  • B . Active Directory
    NIS
    Local
  • C . Local
    Active Directory
    MIT Kerberos
  • D . MIT Kerberos
    Local
    LDAP

Reveal Solution Hide Solution

Correct Answer: A
Question #60

A PowerScale administrator has a cluster containing four F600 nodes. They must configure FTP connections for anonymous access that requires no authentication.

What is the result of this configuration?

  • A . The limit is 500 for FTP connections per cluster.
  • B . The limit is 500 FTP connections per node.
  • C . The limit is 200 FTP connections per cluster.
  • D . The limit is 200 for FTP connections per node.

Reveal Solution Hide Solution

Correct Answer: D

Question #61

What should be avoided when designing snapshot schedules?

  • A . Setting an expiration
  • B . Running the SnapshotDelete job
  • C . Manual snapshot deletion
  • D . Using aliases

Reveal Solution Hide Solution

Correct Answer: C
Question #62

You are involved with a Proof of Concept where the performance is not what you expect.

What can you use to collect process stack information and a listing of process waiting on I/O?

  • A . netstat
  • B . tcpdump
  • C . isi statistics
  • D . isi_get_itrace

Reveal Solution Hide Solution

Correct Answer: D
Question #63

An insurance company is using PowerScale H700 nodes to store their data. A systems administrator conducts a capacity assessment and notices that the available space has decreased significantly.

During investigation, the administrator finds that several users are storing their PST and MP4 files on the cluster which occupies a large amount of storage space.

What can the administrator do to prevent such situation to happen in the future?

  • A . Configure an accounting quota.
  • B . Use file filtering policies.
  • C . Use inline data compression.
  • D . Configure an advisory quota.

Reveal Solution Hide Solution

Correct Answer: B
Question #64

How is data moved to the cloud using the CloudPools software module?

  • A . Files are divided into 1 MB objects and stored in the cloud, leaving small stub files on the Isilon cluster
  • B . Files are divided into 1 MB objects and transferred over NDMP to the cloud service, leaving database entries on the Isilon cluster
  • C . Data is transferred to cloud services and encoded based on the cloud configuration, leaving small stub files on the Isilon cluster
  • D . Data is transferred to cloud services based on CloudPools policy settings, leaving nothing on the Isilon cluster

Reveal Solution Hide Solution

Correct Answer: A
Question #65

What happens to worker threads running on the same node when there is an excessive number of workers running at the same time?

  • A . Workers are paused
  • B . Workers are queued
  • C . Impact level of workers is decreased
  • D . Priority level of workers is decreased

Reveal Solution Hide Solution

Correct Answer: B
Question #66

A customer has two Isilon clusters. Cluster 1 has eight H500 nodes and cluster 2 has twelve H500 nodes. The customer needs to be able to monitor real time performance data of the clusters as well as track file growth.

Which supported tool should be recommended?

  • A . InsightIQ
  • B . Data Insights
  • C . Unisphere
  • D . isi statistics

Reveal Solution Hide Solution

Correct Answer: A
Question #67

While designing SyncIQ policies for a new cluster, an architect wants to ensure that data is not deleted.

What should the architect create?

  • A . SyncIQ copy policy
  • B . SyncIQ sync policy
  • C . SyncIQ policy with option: "Whenever the source is modified"
  • D . SyncIQ policy with Encryption

Reveal Solution Hide Solution

Correct Answer: A
Question #68

A company currently has multiple fileservers to provide home directories for its employees. Each department has a separate fileserver.

Most corporate users are on Windows clients and utilize Active Directory, except for the Engineering department, which uses Linux and NIS for authentication. The company is looking for a solution with minimal administrative overhead and a single namespace for the home directories.

What is the recommended solution that will meet this company’s requirements?

  • A . Configure a single Isilon cluster and utilize Access Zones for authentication to Active Directory and NIS.
  • B . Configure two separate clusters, one for Windows clients and the other for Linux.
  • C . Utilize SmartPools to create two different FilePools, and separate Windows users from Linux users.
  • D . Configure a single cluster, and migrate Linux users to Windows.

Reveal Solution Hide Solution

Correct Answer: A
Question #69

There is a concern that there are not enough physical switch ports available for the Isilon cluster in a new implementation with SMB and ICAP requirements.

What course of action should be taken?

  • A . Team the NICs across the nodes and just add one connection to minimize the ports required.
  • B . The customer needs to provide more switch ports for the implementation
  • C . Create a SmartConnect zone across all ports but do not connect all of them
  • D . Leave the archival nodes off the external network switch to save switch ports

Reveal Solution Hide Solution

Correct Answer: B
Question #70

A customer wants to use their large Gen 6 Isilon cluster for ILM. All of their data is written to and read from a single file pool. They need to use multiple file pools, so slightly used data is stored on less expensive, large disks. Heavily used data is stored on a faster tier.

What would satisfy the customer’s needs?

  • A . Configure SmartPools Advanced
  • B . Add an A-series node with SmartPools license
  • C . Enable FAST VP license on each node pair
  • D . Install SmartPools license on the cluster

Reveal Solution Hide Solution

Correct Answer: D

Question #71

A large retail customer is using their PowerScale Gen6 cluster to store receipts. The resulting workflow data consists of only small files.

What configuration change is recommended for this environment to reduce CPU overhead?

  • A . Set the requested protection level as mirrored protection.
  • B . Increase the L2 cache on every node in the cluster.
  • C . Set the requested protection level higher than the default.
  • D . Decrease the L3 cache on every node in the cluster.

Reveal Solution Hide Solution

Correct Answer: A
Question #72

An eight node F900 PowerScale cluster running OneFS 9.4.0 has a dedicated subnet and IP pool for SMB data traffic. SmartConnect Advanced license is applied. The SMB IP pool consists of LACP aggregated 100 GbE interfaces from all the nodes.

What is the maximum number of SmartConnect Service IPs recommended for the SMB subnet?

  • A . 8
  • B . 1
  • C . 4
  • D . 6

Reveal Solution Hide Solution

Correct Answer: D
Question #73

For concurrent I/O, how do SmartCache and Endurant Cache differ?

  • A . Endurant Cache sends an acknowledgement to the client immediately after mirroring writes in NVRAM
  • B . Endurant Cache waits for acknowledgement from all nodes before copying to L2 cache
  • C . SmartCache immediately commits the write to NVRAM on the local node and one peer node
  • D . SmartCache uses sub-file, granular locking whereas Endurant Cache locks the entire file

Reveal Solution Hide Solution

Correct Answer: A
Question #74

A company with a PowerScale cluster wants to apply quotas to restrict the amount of storage space used by every department. They want to set a quota to each department that stores files on the cluster to no more than 1.2 TB. Each department is when they exceed 1 TB.

Which type of quota should be used?

  • A . Advisory
  • B . Enforced
  • C . Soft
  • D . Hard

Reveal Solution Hide Solution

Correct Answer: A
Question #75

A telecommunications company has a substantial amount of data. This data is being created by network elements within their environment. The company wants to change the way the network elements Call Detail Records (CDR) are stored and analyzed.

The existing infrastructure consolidates all of the CDRs into a table structure, and then ingests them into a large database. Once ingested, a query engine accesses the database and performs analysis on these files. The system is functional; however, since the amount of CDRs generated will increase exponentially over the next year, the company is open to alternatives for storing and analyzing these records.

In evaluating alternatives, the key requirements are to reduce cost, the amount of storage, and the amount of time to analyze the data. The customer would like to use Hadoop to analyze the CDRs. After you have conducted an assessment of the workflow, you have recommended an Isilon Cluster to work within the Hadoop environment.

What would be the best recommendation to the customer for the workflow of Hadoop with Isilon?

  • A . Copy the CDRs from the source to an Isilon cluster with NFS, then use Hadoop to analyze the information directly over HDFS
  • B . Write the CDRs directly to an Isilon cluster with an NFS mount, then use Hadoop to analyze the information directly over HDFS
  • C . Copy the CDRs from the source to an Isilon cluster with NFS, then ingest the information into Hadoop for analysis
  • D . Write the CDRs directly to an Isilon cluster with an NFS mount, then ingest the information into Hadoop with NFS then analyze

Reveal Solution Hide Solution

Correct Answer: B
Question #76

A cluster has user quotas that are configured for home directories with hard limits and advisory limits set.

What would be the default setting for calculating user quotas on the cluster?

  • A . User data and data protection overhead only
  • B . User data, snapshot data, and data protection overhead
  • C . User data and snapshot data only
  • D . User data only

Reveal Solution Hide Solution

Correct Answer: B
Question #77

You meet a customer for the first time. They explain that their current environment for NAS does not meet their needs. You want to make sure that Isilon is a good fit for their needs.

What would be a good prequalifying question to ask?

  • A . What Applications access this storage?
  • B . What type of racks are in your datacenter?
  • C . Are you using a KVM to access your storage?
  • D . How many NICs do your clients have?

Reveal Solution Hide Solution

Correct Answer: A
Question #78

You are adding a new node to an existing cluster.

What OneFS function should you use to remove the old nodes from the cluster?

  • A . SmartFail
  • B . SyncIQ
  • C . AutoBalance
  • D . SmartPools

Reveal Solution Hide Solution

Correct Answer: A
Question #79

Refer to the exhibit.

You want to add redundancy to your network configuration, rather than performance. You have configured all interfaces into the default SmartConnect zone.

How should you configure the switches and Isilon networking to provide your desired network redundancy?

  • A . Configure the switch ports for LACP and use LACP aggregation for subnet0:pool0.
  • B . Configure the switch ports as access points and use LACP aggregation for subnet0:pool0.
  • C . Configure the switch ports for LACP and use FEC aggregation for subnet0:pool0.
  • D . Configure the switch ports as access points, bond ext-0 and ext-1 on all nodes and use Active/Passive aggregation for subnet0:pool0.

Reveal Solution Hide Solution

Correct Answer: D
Question #80

A customer has a 5 node Isilon cluster. The raw capacity of the cluster is 85% used. On average, the cluster has 4,000 users connected during office hours. The average CPU usage is 65%. The customer needs to delete some data to free up capacity.

What should the customer do to minimize the effect of the deletion job?

  • A . Delete the data from a client directly connected to the cluster
  • B . Run the treedelete job with a high impact and high priority during out-of-office hours.
  • C . Run the treedelete job with a high impact and high priority during office hours.
  • D . Run the treedelete job with the default impact and priority during out-of-office hours.

Reveal Solution Hide Solution

Correct Answer: D

Question #81

What is a consideration when designing access zones?

  • A . Authentication providers are restricted to one specific zone
  • B . UID/GID ranges should not overlap for providers in the same zone
  • C . Access zones cannot overlap the same directories
  • D . Share names must be unique between different access zones

Reveal Solution Hide Solution

Correct Answer: C
Question #82

A customer needs to be able to periodically monitor their node live performance for ongoing operational tasks as well as during problem analysis. You have recommended they use the isi statistics command to fulfill this need.

What types of statistics and statuses could be displayed with this command?

  • A . Protocol status, drive statistics, hardware statistics, node statistics
  • B . Node alerts, Job Engine statistics, hardware status, protocol statistics
  • C . Node statistics, general status, drive status, hardware statistics
  • D . Drive statistics, node status, protocol alerts, general performance

Reveal Solution Hide Solution

Correct Answer: A
Question #83

A customer has eight X400 24GB RAM that supports 400 client connections today The customer plans to add 400 more clients in the next few months. They are looking at adding an A-Series node to the cluster to help with client connections.

Before they start adding client connections, what hardware change do you recommend?

  • A . Add RAM to offset concurrent client connections
  • B . Add an A100 to offset concurrent client connections
  • C . Add nodes with SSD to help with connections
  • D . Add more network switches to increase the number of connections

Reveal Solution Hide Solution

Correct Answer: B
Question #84

Your customer is looking for a storage solution that will be able to store seven million 3 MB files, which are written and seldom accessed. Read and write operations are both completed by a webbased application, which requires 1.3 Gbps throughput. The customer’s network has not been upgraded in many years, so the network interfaces are 1Gbps.

Which cluster configuration would best meet the customer’s requirements?

  • A . 3 NL400 nodes
  • B . 3 X400 nodes
  • C . 4 X200 nodes
  • D . 5 S200 nodes

Reveal Solution Hide Solution

Correct Answer: D
Question #85

Refer to the Exhibit.

What is represented by the information shown?

  • A . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB and each user can only store 75 GB for /ifs/data/media/temp.
  • B . Directory quota cannot exceed 2 TB for /ifs/data/media and no quota limit on /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB and each user can only store 75 GB for /ifs/data/media/temp.
  • C . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB for /ifs/data/media/temp.
  • D . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 900 GB and each user can only store 75 GB for /ifs/data/media/temp.

Reveal Solution Hide Solution

Correct Answer: B
Question #86

A customer is inquiring about expanding their primary cluster consisting of six S-Series nodes in order to improve performance. They have a second cluster with 11 X-Series nodes. Both clusters leverage 1GbE, but the customer recently installed a 10GbE network that can be utilized.

They also have multiple Fibre Channel SAN arrays in their environment. They have a variety of workloads on each cluster and are in the process of determining which workloads belong on which cluster.

They have discovered that one of the workloads- a SQL database that resides on the X-Series node cluster – is experiencing timeouts due to latency. The database vendor has suggested limiting latency to 5ms or less to eliminate these timeouts.

How do you advise the customer?

  • A . Consider migrating data from Isilon to one of their SAN platforms or proposing a new solution to handle the performance requirements of SQL.
  • B . Merge the S-Series nodes and X-Series nodes into one cluster, upgrade the 1GbE to 10GbE, and leverage SmartPools to allow for the cluster to determine where data should reside.
  • C . Suggest the customer consider leveraging SSDs in the new nodes they purchase and GNA to boost the performance of each cluster.
  • D . Recommend they increase the amount of DRAM in the cluster or consider an Accelerator node in order to increase the amount of cache in their cluster.

Reveal Solution Hide Solution

Correct Answer: A
Question #87

During a write process in OneFS 8.0, from which cache are blocks copied to disk?

  • A . L3
  • B . L2
  • C . Endurant
  • D . L1

Reveal Solution Hide Solution

Correct Answer: C
Question #88

A customer is implementing a new backup strategy for their two PowerScale clusters. The clusters are in a DR configuration. The customer uses SyncIQ to replicate data from the primary cluster to the DR cluster.

They use CloudPools to tier archival data to a public cloud provider from both clusters. The public cloud provider guarantees a backup of all data that is stored in their cloud.

Which NDMP backup option should be applied to their primary cluster to avoid backing up data that is tiered to their cloud provider?

  • A . NDMP Redirector
  • B . DeepCopy
  • C . ComboCopy
  • D . ShallowCopy

Reveal Solution Hide Solution

Correct Answer: D
Question #89

Refer to Exhibit below.

What is represented by the information shown in the exhibit?

  • A . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB and each user can only store 75 GB for /ifs/data/media/temp.
  • B . Directory quota cannot exceed 2 TB for /ifs/data/media and no quota limit on /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB and each user can only store 75 GB for /ifs/data/media/temp.
  • C . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 2 TB for /ifs/data/media/temp.
  • D . Directory quota cannot exceed 2 TB for both /ifs/data/media and /ifs/data/media/photo.
    Directory quota cannot exceed 900 GB for /ifs/data/media/video.
    Directory quota can be any size up to 900 GB and each user can only store 75 GB for /ifs/data/media/temp.

Reveal Solution Hide Solution

Correct Answer: B
Question #90

A cluster has user quotas configured for user’s home directories with hard limits and advisory limits set.

What would the default setting be for calculating user quotas on the cluster?

  • A . User data and data protection overhead only
  • B . User data only
  • C . User data, snapshot data, and data protection overhead
  • D . User data and snapshot data only

Reveal Solution Hide Solution

Correct Answer: C

Question #91

Refer to the exhibit.

A large hospital chain has approached you to redesign their storage infrastructure. The head of IT believes their requirement is for 60 TB of RAW capacity. The following are the notes from meetings with the department heads.

Which is the minimum cluster configuration that meets the customer’s requirements?

  • A . 3 NL-Series Nodes using SynqIQ to 3 NL-Series Nodes
  • B . 3 S-Series Nodes using SmartPools and 3 NL-Series Nodes for Archive
  • C . 5 S-Series Nodes
  • D . 4 X-Series Nodes using SynqIQ to 4 NL-Series Nodes

Reveal Solution Hide Solution

Correct Answer: A
Question #92

A potential customer requires 800TB of usable capacity to store medical images for their network of health clinics.

The IT department has limited staff and currently manages four storage arrays from other vendors. During a meeting with the Director of IT, you learn that the company is planning to deploy a scale-out NAS solution from a competitor of EMC.

Which factors can demonstrate a lower TCO using Isilon?

  • A . An IDC study found that Isilon requires 30% less downtime per year compared to other solutions
  • B . Isilon linear scalability eliminates over buying and over provisioning
  • C . An IDC study found that Isilon requires 95% less downtime per year compared to other solutions
  • D . Isilon uses lower speed NL-SAS drives which reduces overall power and cooling requirements
  • E . An IDC study found that Isilon requires 95% less downtime hours per year compared to other competitors
  • F . Isilon linear scalability eliminates over buying and over provisioning
  • G . An IDC study found that Isilon requires 95% less downtime hours per year compared to other competitors
  • H . Isilon linear scalability closely aligns with additional staff requirements as capacity grows

Reveal Solution Hide Solution

Correct Answer: BH
Question #93

The security team at a customer site has created a new requirement that in-flight replication traffic must be encrypted end-to-end. The customer is running OneFS 8.2.1 on their cluster.

What encryption protocol versions does SyncIQ support?

  • A . TLS 1.3 and OpenSSL 1.1.1
  • B . IPSec 2.1 and OpenSSL 1.0.2
  • C . TLS 1.2 and OpenSSL 1.0.2
  • D . x.509 13.37 and OpenSSL 0.9.8

Reveal Solution Hide Solution

Correct Answer: C
Question #94

At which level can retention periods be applied with Isilon SmartLock?

  • A . Directory
  • B . Node
  • C . File system
  • D . Cluster

Reveal Solution Hide Solution

Correct Answer: A
Question #95

You get a call from a customer that has just added 200 user connections to the cluster. They want to know how fast they are writing data with these new users.

What tool would you use to gather this information?

  • A . InsightIQ
  • B . Network Monitor
  • C . Wireshark
  • D . Watch4net

Reveal Solution Hide Solution

Correct Answer: A
Question #96

Which SyncIQ policy is required if the goal is to have all source data replicated and to retain deleted files?

  • A . Async Policy
  • B . AutoBalance Policy
  • C . Copy Policy
  • D . Sync Policy

Reveal Solution Hide Solution

Correct Answer: C
Question #97

A customer is evaluating PowerScale and NetApp FAS solutions. They are storing many unique files and want to understand how each solution deduplicates data.

What is the difference between how PowerScale and NetApp FAS deduplicate data?

  • A . PowerScale uses separate deduplication at the volume level.
    NetApp FAS uses global deduplication across the cluster.
  • B . PowerScale uses global deduplication across the cluster.
    NetApp FAS separates deduplication at the volume level.
  • C . PowerScale does not have deduplication.
    NetApp FAS uses local deduplication.
  • D . PowerScale uses local deduplication.
    NetApp FAS does not have deduplication.

Reveal Solution Hide Solution

Correct Answer: B
Question #98

A customer plans to consolidate 200 TB of digital images and video content. Performance is important for recently created files. However, the customer wants any content that has not been accessed within 30 days to be stored in the cluster at a much lower cost because performance is no longer critical.

Which Isilon configuration should be recommended?

  • A . X-Series nodes, NL-Series nodes, and SmartPools
  • B . X-Series nodes and SmartQuotas
  • C . S-Series nodes, X-Series nodes, and SmartPools
  • D . NL-Series nodes and SmartLock

Reveal Solution Hide Solution

Correct Answer: A
Question #99

What are three benefits of NDMP multistream backup and recovery? (Select 3)

  • A . Backup context is retained
  • B . Different backup context
  • C . Backup concurrently
  • D . Same backup context
  • E . Backup sequentially

Reveal Solution Hide Solution

Correct Answer: ABC
Question #100

A customer has a requirement for a new solution to handle their growing storage requirements. The solution should have the ability to cover storage needs for the next three years.

The environment consists of 100 TBs of file system data spread across five file systems. On average, the file systems grow 1 TB a month. In addition, they have a large VMware cluster supporting 200 VMs and a highly transactional database.

The customer wants the solution to offer good performance, scalability, manageability, and be cost-effective. The sales team is looking to you to recommend a solution.

Which recommendation will meet the customer’s requirements?

  • A . VNX for DB and VMware workloads, and Isilon for file system data
  • B . Isilon scale-out and cluster as required
  • C . VNX Unified platform with FAST Cache
  • D . VMAX with FAST VP and a NAS Gateway

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version