New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When configuring NTP on a 16-node Gen 6 cluster, how many chimer nodes are automatically configured on the duster?

A.

3

B.

6

C.

1

D.

16

What is the recommended maximum number of clusters and nodes that a single insightlCJ instance should simultaneously monitor?

A.

3 clusters or 60 nodes

B.

5 clusters or 120 nodes

C.

8 clusters or 150 nodes

D.

6 clusters or 140 nodes

What are the methods to join a node to an Isilon cluster?

A.

Configuration wizard, SSH connection, or CLI only

B.

Serial connection, Configuration wizard, or CLI only

C.

Front panel display, serial cable, or Configuration wizard only

D.

Front panel display, Configuration wizard, WebUI, or CLI only

Which role-based privilege must be granted to a user before they are allowed to log into the web administration interface?

A.

ISI_PRIV_AUTH

B.

ISI_PRIV_LOGIN_PAPI

C.

ISI_PRIV_CLUSTER

D.

ISI_PRIV_LOGIN_CONSOLE

In Isilon OneFS, what is a characteristic of CoW with snapshots?

A.

Used for small changes, inodes, and directories.

B.

Avoids the double write penalty.

C.

Increases file fragmentation.

D.

Used for more substantial changes such as deletes.

When reconciling permissions (or clients using UNIX as well as Microsoft Windows systems, what describes the scope of the permissions?

A.

Windows ACLs and POSIX bits have overlapping semantics, but neither completely reflects the other

B.

POSIX bits have semantics that are a subset of Windows ACLs. but Windows ACLs are more extensive

C.

Windows ACLs have semantics that are a subset of POSIX bits

D.

POSIX bits and Windows ACLs are semantically equivalent

What is a benefit of the Isilon Data Lake solution?

A.

Block-based storage for large databases

B.

Maintains simplicity at petabyte scale

C.

Scale-up approach for petabyte scale

D.

Protects multiple shared repositories at the same level

A Dell PowerScale administrator wants to create a new SMB share on an existing directory structure. The directory contains migrated production data and has an active NFS export What will happen if the administrator selects the Apply Windows default ACLs option during creation?

A.

Existing mode bit rights are overwritten by the Windows default ACLs

B.

Creation of the SMB share fails due to the existing mode bit rights

C.

Windows default ACLs are merged with the existing mode bit rights

D.

Windows default ACLs are overwritten by the existing mode bit rights

An administrator is oonfigunng a 10-node Dell PowerScate cluster with A2000 nodes. They want to minimize the protection overhead and preserve the MTTDL requirements.

Which protection level is recommended?

A.

N+1n

B.

N+2n

C.

N+1d:1n

D.

N+3d:1n1d

A Dell PowerScale administrator wants to minimize admin access to their cluster. In addition, they want to create specific administrative accounts for specific cluster management activities in different access zones. An administrator of one zone should not be able to view or configure objects in a different zone.

What action will address these requirements?

A.

Create a ZRBAC role for the administrator on all access zones

B.

Create a ZRBAC role for each zone administrator

C.

Create a separate management subnet for each administrator

D.

Create a unique role in the System zone for each administrator