Which task is the responsibility of the emcsecurity user?

Which task is the responsibility of the emcsecurity user?A . Changing the passwords for admin usersB . Modifying SEC complianceC . Overriding the bucket retention settingD . Locking nodesView AnswerAnswer: D

March 14, 2024 No Comments READ MORE +

What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?

What happens when the key missing from the header when creating a bucket using ECS S3 API D@RE key management?A . ECS does not support external key managementB . Bucket creation will fail with an error to provide a key in the headerC . Encryption will not be enabledD ....

March 14, 2024 No Comments READ MORE +

Which ECS feature is responsible for protecting and sharing objects for global access?

Which ECS feature is responsible for protecting and sharing objects for global access?A . Replication GroupB . FederationC . VDCD . Storage PoolView AnswerAnswer: B

March 14, 2024 No Comments READ MORE +

Under which conditions will a BAD event be received?

Compliance monitoring has been enabled for an ECS system. Under which conditions will a BAD event be received?A . UNKNOWN and NOT READYB . SUSPECT and UNKNOWNC . DEGRADED and UNTRACKEDD . BAD and NOT READYView AnswerAnswer: D

March 14, 2024 No Comments READ MORE +

How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?

How do ECS object users authenticate to the ECS OpenStack Swift Service when running the Version 2 protocol?A . Simple tokenB . Scoped tokenC . PEA fileD . Login and passwordView AnswerAnswer: B

March 14, 2024 No Comments READ MORE +

Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?

Which user can lock and unlock nodes through the ECS Portal or the ECS Management API?A . adminB . emcexpertC . emcsecurityD . rootView AnswerAnswer: C

March 13, 2024 No Comments READ MORE +

What technology is used in ECS to protect loss of a site in a two-site configuration?

What technology is used in ECS to protect loss of a site in a two-site configuration?A . Full Mirror CopyB . Erasure CodingC . XORD . Dual ParityView AnswerAnswer: A

March 13, 2024 No Comments READ MORE +

When SEC Compliance is enabled, what action can be taken on a retention period?

When SEC Compliance is enabled, what action can be taken on a retention period?A . ShortenedB . ExtendedC . DeletedD . Deleted with privileged deleteView AnswerAnswer: B

March 13, 2024 No Comments READ MORE +

Which protocol is supported natively on ECS?

Which protocol is supported natively on ECS?A . NFSv3B . SMBC . NFSv2D . CIFSView AnswerAnswer: A

March 12, 2024 No Comments READ MORE +

What task is the responsibility of the emcsecurity user?

What task is the responsibility of the emcsecurity user?A . Locking nodesB . Overriding bucket retention settingC . Changing passwords for admin usersD . Modifying SEC complianceView AnswerAnswer: A

March 12, 2024 No Comments READ MORE +