Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are about to perform the post-setup tasks with the Storage-Center wizard. What information is required before proceeding?

A.

Customer contact information for the Storage Center

B.

Management IPv4 address for the Storage Center

C.

Email address for the default administrator

D.

NTP server IPv4 address for the Storage Center

What is the name of the out-of-band system management connection for SC9000 systems?

A.

iDRAC

B.

MMC

C.

IPMI

D.

iLo

Which best practices should be followed when using iSCSI to connect SC Series arrays and hosts for switches that incorrectly negotiate speed and duplex?

A.

Use a separate supernet or switches for iSCSI trafficGigabit full duplex hard set for all iSCSI portsEnsure switches used for iSCSI are of a blocking design

B.

Use a separate VLAN or switches for iSCSI trafficAuto-negotiate for all switchesEnsure switches used for iSCSI are of a non-blocking design

C.

Use a separate VLAN or switches for iSCSI trafficGigabit full duplex hard set for all iSCSI portsEnsure switches used for iSCSI are of a non-blocking design

D.

Use a separate subnet or switches for iSCSI trafficAuto-negotiate for all switchesEnsure switches used for iSCSI are of a blocking design

A customer is concerned they are over utilizing their 7K drives. Where can information about the real time I/O usage of individual drives be viewed?

A.

Hardware > Disks > [disk folder] > [disk number]

B.

Charting > Disks > [disk folder] IO Charts

C.

Charting > Disks > [disk folder] > [disk number]

D.

Hardware > Disks > [disk folder]

A customer wants to have the SED feature enabled through Dell Storage Manager (DSM) 2016 R2. How is encryption enabled on the SED?

A.

SED feature must be licensed.

B.

External KMS is required and must be activated during installation of the array.

C.

SED feature uses a dedicated ASIC in each controller and can be enabled at any time.

D.

SED encrypts data by default.

Which best practices should be followed when using iSCSI to connect SC Series arrays and hosts?

A.

Use dedicated switches for iSCSI.Two separate VLANS for multipathed iSCSI using separate IP subnets.Gigabit full duplex between Storage Center and all local servers.

B.

Use separate IP subnets for multipathed iSCSI separated by VLANS when using the same switch.Gigabit full duplex between Storage Center and all local servers

C.

Use separate switches for iSCSI.Two separate VLANs for multipathed iSCSI using separate IP subnets.Unicast and multicast storm control enabled on all iSCSI switches.

D.

Use separate VLANs for multipathed iSCSI using separate IP subnets when using the same switch.Bi-directional flow control disabled between Storage Center and servers.

The storage profile of a volume has changed. What is the correct statement regarding the newly written pages of this volume?

A.

Move after 12 cycles of Data Progression

B.

Will follow the new storage profile immediately

C.

Move during the next Data Progression

D.

Move after creation of a view volume

Which SC Series array feature allows all front-end ports to act as active data paths?

A.

Dual Fabric

B.

ALUA

C.

Virtual Port Mode

D.

Legacy Port Mode

Which Live Volume Requirement or Best Practice is necessary for disaster recovery?

A.

Primary and Secondary Storage Centers configured in Unisphere for SC Series

B.

QoS defined on the Primary system

C.

Licensed Live Volume on secondary Storage Center

D.

Fibre Channel or iSCSI with a round trip latency of less than 10 ms

Which operating system runs the Dell Storage Manager (DSM) as a virtual appliance?

A.

CentOS 7

B.

Windows Server 2012 R2

C.

VMware

D.

Windows Server 2010 R2