New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How many disk drives arc available in a Dell PowerScale F200 node?

A.

4

B.

8

C.

12

D.

10

An Isilon administrator is receiving “permission denied” while accessing a file on a cluster that an end-user created through an SMB share. The end-user is unable to access the share from their UNIX server.

The end-user “mydomain.com\win_user1” as the login name to access the Microsoft Windows share and then used an LDAP account name of “ux_user1” to access the UNIX mount. The Isilon cluster is joined to the “mydomain.com” Active Directory domain. In additional, the cluster has an LDAP provider attached to it while the on-disk identity is set as “Native”.

What is a possible cause for this permission issue?

A.

Usermapping rule is not present.

B.

RFC2307 is not configured on the Active Directory.

C.

On-disk identity is set as “Native”.

D.

Fake UID generation in the cluster is disabled.

A Dell PowerScale cluster has ten A200 nodes and the node pool data protection level is set to N+2. The data access pattern is currently set to streaming If the data access pattern is changed to concurrency, how many stripes for a 1 MB file are moved to other drives?

A.

4

B.

0

C.

2

D.

6

A company has a 5-node Dell PowerScale cluster on which they want to configure dynamic IP allocation. The pool consists of one. 40 Gbps Ethernet external interface on each of the nodes. Because address space is limited at the company's site, they need to use a minimum number of addresses, evenly allocated across the nodes. The company puts all interfaces in one pool and sets it to dynamic with Round Robin tailover. They need to ensure that, in the case of a node failure, all other nodes take on failover traffic.

How many addresses must be configured on the IP address pool?

A.

8

B.

4

C.

20

D.

15

Which OneFS 8.0 feature can be added to an NFSv4 export to assist with seamless failover in the event of a disconnect?

A.

Transparent failover

B.

Stateless connection

C.

Stateful connection

D.

Continuous availability

Based on the exhibit, what is the actual protection level of the FEATURE.wmv file?

A.

N+1

B.

N+2

C.

N+2n

D.

N+2d: 1n

Which access information is represented in the exhibit?

A.

Real ACL is applied and group “DEES\domain users” has read access to the file

B.

Real ACL is applied and group “DEES\sales” has read access to the file

C.

Synthetic ACL is applied and group “DEES\sales” has read access to the file

D.

Synthetic ACL is applied and user “DEES\john” has read access to the file

An NFS export is created on a Dell PowerScale cluster. No clients are listed in the export rules What is the result of this condition?

A.

No clients on the network can access the export

B.

Clients can access the export with read-only permissions

C.

All clients on the network can access the export

D.

Clients that access the export are mapped as root

If configuration auditing is enabled, where are the audit logs stored?

A.

/ifs/.ifsvar/audit/audit.log

B.

/var/log/audit_config

C.

/ifs/.ifsvar/audit/config/log

D.

/var/log/isi_papi_d_audit.log

A company wants to re-use HD400 nodes into a new cluster with OneFS 8.2.0. What is the minimum number of HD400 nodes required?

A.

3

B.

4

C.

5

D.

6