Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is used for migrating data from legacy system volumes to SC default provisioned volumes?

A.

Thin Import

B.

Intelligent Import

C.

Thick Import

D.

Live Migration

Based on best practices, which configuration represents how an SC9000 storage array with one SC420 expansion enclosure is cabled?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

You are installing a new SC9000. Which procedure should be used to install and configure the system?

A.

Connect through the iDRAC port

B.

Connect through a null modem cable to the serial port

C.

Connect through the Dell Storage Manager Client

D.

Connect through the supplied proprietary serial cable to the serial port

How many SC220 enclosures can be supported by an SC4020 storage array?

A.

7

B.

9

C.

14

D.

15

When a SC is in a failover state what will occur in the surviving controller?

A.

Data and metadata will be available

B.

The read cache that is associated with the failed controller will be created

C.

The deduplication dictionary from the failed controller will load

D.

Deduplication will run

A customer wants to add an iSCSI path to a Microsoft Windows Server 2012 R1. The server has an existing Fibre Channel path to an SC7020 array for load balancing and high availability.

Which Windows MPIO policy should be configured to achieve the customer’s requirement?

A.

Fail Over Only

B.

Weighted Paths

C.

Round Robin with Subset

D.

Round Robin

What is the maximum number of Fault Domains on a SCv3000 Storage Center using SAS front-end?

A.

1

B.

2

C.

3

D.

4

Refer to the Exhibit.

A customer needs your assistance in recovering files that were deleted from an SC Series array volume. The files were deleted around 1:00 AM on January 7th. Based on the exhibit of the Dell Storage Manager (DSM), which recommendation allows the customer to recover the most recent deleted files?

A.

Take a manual snapshot and then select “Create Volume from Snapshot”

B.

Select “Create Volume from Snapshot” taken on January 7 and map to a server

C.

Recover from backup, deleted files are unrecoverable from the storage array

D.

Select “Create Volume from Snapshot” taken on January 6 and map to a server

In an SC Series environment, which Fibre Channel zoning method is more secure?

A.

WWN

B.

Single Initiator/Single Target

C.

Single Initiator/Multi-Target

D.

Port

In Storage Manager, what should you do to have the Create Server wizard recognize an HBA properly?

A.

Verify the iSCSI initiator has a valid IP address, subnet and gateway

B.

Ensure that iSCSI traffic is on a separate dedicated network

C.

Add the FC WWNN when asked in the wizard

D.

Ensure that proper FC zoning and the HBA is configured