Isilon 100_045 Respuestas

23

Click here to load reader

Transcript of Isilon 100_045 Respuestas

Page 1: Isilon 100_045 Respuestas

Assuming a 3 node cluster configured with +1 data protection, and no data written to the file system, which of the following is the approximateusable capacity of the cluster? (Choose 1)A. Approximately 1/3 of the raw capacity of the clusterB. Approximately 1/2 of the raw capacity of the clusterC. Approximately 2/3 of the raw capacity of the clusterD. Approximately 1/4 of the raw capacity of the cluster

When a cluster is configured, a default NFS export is created. Which of the following statements about the default export is correct? (Choose 1)A. The directory “/ifs” is exported for all hosts in read-only mode.B. The directory “/ifs” is exported for all hostsC. The default export is only accessible via NFS version 2. To enable NFS version 3, the export configuration must be modified.D. The directory “/isilon” is exported for all hosts

Which of the following commands will show alert information from the command line interface? (Choose 1)A. “isi services”B. “isi alerts”C. “isi_alert_info”D. “isi perfstat”

Which of the following statements about the internal network configuration of a IQ 1920 cluster are false? (Choose 2)A. Nodes do not need to have anInternal interface configured.B. All nodes can be connected via the Internal-A and Internal-B interfaces.C. Nodes must have at least oneInternal interface configured.D. All nodes must have the Internal-B interface connected

A CIFS share and a NFS export can have the same root directory? (True/False)A. TrueB. False

Which of the following conditions will activate the red Alert light on the front of a node? (Choose 2)A. A Critical (C) Alert for that nodeB. A Critical (C) Alert for the clusterC. A Warning (W) Alert for the clusterD. An Informational (I) Alert for that node

Which of the following statemen ts about clients connecting to no des is most accurate? (Choose 1)A.  For reads, clients must connect to the node of the cluster that contains the file that the user is requesting. Clients can connect to any node of the cluster to write data.B. Clients must connect to node 1 to read and write data.C. Clients can connect to any node of the cluster in order to read and write data.D. Clients can connect to any nodeof the cluster to read data, but they must connect to node 1 to write data.

Page 2: Isilon 100_045 Respuestas

Which of the following descriptions best defines SmartConnect? (Choose 1)A. SmartConnect profiles are used tomanage external network settingsB. SmartConnect provides client connection load balancing based on DNSC. SmartConnect profiles are used tomanager internal network settingsD. SmartConnect is a client-side software component for managing client connection load balancing

You have a three node IQ 1920 cluster protected at +1.Which of the following is a correct statement about this configuration? (Choose 1)A. Two nodes of the cluster can fail without causing data loss.B. One drive in node 1 and one drive in node 2 can fail simultaneously without causing data loss.C. One drive in any number of nodes can fail.D. One node of the cluster can fail without causing data loss.

Which of the following are valid ways to reboot all nodes of a cluster? (Choose 2)A. From the command line of a node, en ter “isi config”, then “reboot all”B. From the command line of a node, enter “isi reboot” C. On each node of the cluster, press the reset button on the back of the nodeD. From the WebAdmin of a node, from the “Cluster” / “Cluster Management” / “Shutdown / Reboot Cluster” screen.

On node 1 of an existing cluster, a Windows share is created with the share name “data” and a shared path of “/ifs/data”. On which nodes of the cluster will this share be available? (Choose 1)A. This share will be available on node 1B. This share will be available on all nodes defined in the share permissionsC. This share will be available on all nodes of the clusterD. This share will be available on all nodes in the same SmartConnect zone

Which of the following is the best description of the SyncIQ module? (Choose 1)A. SyncIQ is a snapshot tool, allowing for snapshots to be taken of directories on a scheduled basisB. SyncIQ is an asynchronous file-based replication tool, used to replicate data between Isilon IQ clustersC. SyncIQ is a phase of the restriper that synchronizes data between nodes.D. SyncIQ is a synchronous block-based replication tool, used toreplicate data between Isilon IQ clusters

Which of the following best describes the purpose of the NVRAM card in a storage node? (Choose 1)A. The NVRAM card is used for write cachingB. The NVRAM card is used to store OneFS’s file system journalC. The NVRAM card is used for read cachingD. The NVRAM card is used for inter-cluster communication

Page 3: Isilon 100_045 Respuestas

You have a cluster with SmartConnect configured. One node of the cluster goes down due to a power failure. What is the expected behavior of SmartConnect with respect to new client connections? (Choose 1)A. New client connections will be directed to any node of the clusterB. New client connections will be directed tonode 1 of the cluster until the “DOWN” node comes back online.C. New client connections will not be directed to the node in a “DOWN” stateD. New client connections will be suspended until the “DOWN” node comes back online.

Which of the following describes the function of the integration between SnapshotIQ and Volume Shadow Copy Service (VSS)? (Choose 1)A. SnapshotIQ’s VSS integration allows Windows clients to take snapshots of files and directories from within Windows ExplorerB. SnapshotIQ’s VSS integration allows Windows clients to manage file sharing configuration from within Windows ExplorerC. SnapshotIQ’s VSS integration allows Windows clients to view and restore previous versions of files inside of Windows Explorer.D. SnapshotIQ’s VSS integration allows Windows clients to backup data from the cluster to local storage.

Which of the following pieces of information are required to join a Windows Active Directory domain? (Choose 2)A. LDAP server nameB. Username and password of a user with proper administrative rightsC. Name of Active Directory domainD. Workgroup nameE. Share name

How much RAM does one IQ 3000 node contain? (Choose 1)A. 1 GBB. 2 GBC. 4 GBD. 8 GB

You have a five node IQ 1920 cluster protected at+2. Which of the following statements about this configuration are correct? (Choose 2)A. Two nodes of the cluster can fail without causing data lossB. Three nodes of the cluster can fail without causing data lossC. Node 1, node 2, and a disk drive in node 3 can fail simultaneously without causing data lossD. One drive in node 1 and one drive in node 2 can fail simultaneously without causing data loss

Which of the following are valid ways to add anunconfigured node to a cluster? (Choose 2)A. From the WebAdmin of the unconfigured nodeB. From the cluster WebAdmin.C. From the serial console of the unconfigured node.D. Via a SNMP command to the cluster

Page 4: Isilon 100_045 Respuestas

After configuring a cluster, the default state of the FTP service is enabled. (True/False)A. TrueB. False

How does an Isilon cluster running OneFS 6.5 enable file level access to Windows clients?(Choose 1)A. Using SMB onlyB. Using CIFS and SMBC. Using CIFS and SambaD. Using CIFS only

What is the maximum tape block size supported by OneFS 6.5? (Choose 1)A. 8 KB. 64 KBC. 128 KBD. 256 KB

The NLM protocol is used in some NFS client connections. What does the NLM protocol do?(Choose 1)A. Provides file locks for NFS v2 and 3 clientsB. Provides file locks for CIFS clientsC. Provides file locks for NFS v2, 3, and 4 clientsD. Provides file locks for SMB v1,2, and 3 clients2

The unlicensed version of SmartPools enables you to do what? (Choose 1)A. Automatically move files from one disk pool to anotherB. Define a subgroup of nodes to allow 12000X nodes and 36000X nodes to reside in a single disk  poolC. Force writes into the virtual hard disks.D. Block manually configured file policies.

How are disk pools provisioned? (Choose 1)A. The cluster automatically creates disk pools.B. By network provisioning rules.C. By disk provisioning rules.D. They must be manually created.

You are configuring a synchronization between two clusters using SyncIQ. Youre root directory is /ifs/data. You create an include statement for /ifs/data/media and an exclude statement of /ifs/data/public. What will be synchronized to the other cluster? (Choose 1)A. Nothing will be synchronized.B. Everything in the ifs/data folder will be synchronized.C. Everything in the ifs/data folder except the /ifs/data/public folder will be synchronized.D. Everything in the /ifs/data/media folder and the /ifs/data/public folder will be synchronized.E. Everything in the /ifs/data/media folder will be synchronized.F. Everything in the ifs/data/public folder will be synchronized.3

Page 5: Isilon 100_045 Respuestas

For what reasons would you increase the default Ethernet frame MTU on an Isilon cluster? (Choose 3.)A. To match the frame size of the client system.B. To improve overall performance.C. To increase the LUN I/O performance.D. There is no good reason to change the default Ethernet frame size. It is automatically optimized  for performance.E. To provide easier trace captures.

How do you enable anti-virus scanning service for an Isilon cluster? (Choose 1)A. Click Enable on the Anti-virus Summary pageB. Install an ICAP serverC. Configure all of the settings on the Anti-virus Summary pageD. Install an ICMP server

When setting a new disk pool protection level, what should the administrator do to apply the new protection level to existing data? (Select the best answer.)A. The administrator should run the isi protect command to apply the new protection level.B. The administrator should run the isi migrate command to apply the new protection level.C. Nothing. The cluster applies the new protection level automatically to existing data.D. Nothing. You cannot apply new protection level settings until you complete an entire cluster  reboot. 4

Which of the following directory services is not supported by an Isilon cluster? (Choose 1)A. Active DirectoryB. LDAPC. NISD. NIS+E. All are supported.

Which of the following best describes a Network Provisioning rule? (Choose 1)A. You can define one subnet per cluster and one pool per subnet.B. You can define one subnet per cluster and multiple pools per subnet.C. You can define multiple subnets per cluster and one pool per subnet.D. You can define multiple subnets per cluster and multiple pools per subnet.

What is the maximum number of nodes supported by an Isilon cluster? (Choose 1)A. 48B. 64C. 96D. 128E. 144

What should you name the account that runs the Isilon for vCenter Plug-in? (Choose 1)A. vapiB. apiC. vCenterD. vm

Page 6: Isilon 100_045 Respuestas

What are versions of NFS are enabled by default in an Isilon cluster? (Choose 1)A. Versions 1 and 2B. Versions 1, 2, and 3C. Versions 2 and 3D. Versions 3 and 4E. Versions 2, 3, and 4

When representing a cluster protection level as N+M:B, what is B? (Choose 1)A. The number of recoverable disk failures.B. The number of data blocks.C. The number of recoverable node failures.D. The number of data stripes.

A five node 36NL cluster is operating with 50% of its storage capacity used. After a hardware node failure, which of the following statement are true? (Choose 2.)A. No action is needed, the data is automatically regenerated by FlexProtect.B. The administrator must initiate a smartfail action to reprotect the data.C. When the node stopped responding the cluster automatically started regenerating the missing data.D. The administrator receives notification that the node is offline. No other automatic action is  taken.

You have a three node cluster with node three showing a state of DOWN in the isi status command output. Which of the following are possible causes for this state? (Choose 2)A. Node three has lost power.B. Node three has lost a disk drive.C. Node three has lost two or more disk drives.D. Node three has an unplugged InfiniBand cable.E. Node three has too many clients connected at the same time.

SmartConnect management zones are configured at what level? (Choose 1)A. They can only be configured for the entire cluster.B. They can only be configured per subnet.C. The can only be configured per pool.D. They can be configured at the subnet or pool level.

What is the default setting for a virtual hot spare for the cluster? (Choose 1)A. Space is saved that is equivalent to one drive on the node with the lowest LNN.B. Space is saved that is equivalent to a node on the node with the lowest LNN.C. All freespace in the cluster is used for a virtual hot spare.D. An Isilon cluster does not use a virtual hot spare.

FilePools enable you to do what? (Choose 1)A. Create user defined attributes in the web administration interface.B. Set different protection and IO optimization settings for a filtered set of filesC. Copy files access settings for all filesD. Throttle network throughput as needed for file storage

Page 7: Isilon 100_045 Respuestas

When should a cluster implement a firmware update? (Choose 1)A. NeverB. After every OneFS updateC. Whenever a new firmware version is releasedD. Only when directed to by Isilon Support

To configure redundancy for the internal node network, how many non-overlapping sets of IP addresses are required? (Choose 1)A. None. The internal node network does not use TCP/IP.B. 1C. 2D. 3

When configuring anonymous access for FTP, what account must you use? (Choose 1)A. You do not need to configure any account for anonymous access.B. You must use an account named FTP.C. You must use an account named Anonymous.D. You can use any account.

Which features are supported when using an Isilon cluster as a virtualization datastore? (Choose 3)A. Dynamic IP addressingB. SmartStoreIQC. SmartConnect AdvancedD. NFS failoverE. SMB failover

You are trying to increase performance on a SyncIQ job between two five node clusters. What value should you set in the Workers Per Node setting? (Choose 1)A. 2B. 4C. 8D. 16E. 40

Your customer believes that the performance of the cluster is too slow. What hardware changes would you recommend to them to improve performance for searching and indexing and tree walks? (Choose 1)A. NL nodes.B. EX nodes because clients cannot connect to them.C. SSD based nodes to store metadata and inodes.D. A second internal InfiniBand network.

Which of the following can be used to implement a Streaming disk access pattern on an Isilon cluster? (Choose 2).A. isi auth commandB. File Pool PoliciesC. sysctl commandD. File System Explorer

Page 8: Isilon 100_045 Respuestas

You just licensed SnapShotIQ on a customers OneFS v6.5 cluster. Which of the following statements is true? (Choose 1)A. You can now select COW or PIT snapshot use, as needed.B. You can now replicate data using SyncIQ from a snapshot.C. Your snapshot files are now read/write.D. You now implement Volume Shadow Copy Service for clients.

What is the largest size of LUN that is usable by a Windows client when using Isilon iSCSI? (Choose 1)A. 16 TBB. 32 TBC. 64 TBD. 128 TB

How do you edit the settings of a quota that is linked to a default quota? (Choose 2)A. You cannot change the settings of a linked quota.B. You must unlink the quota before you can edit the settings.C. You can edit the settings of a linked quota at any time.D. You can change the settings in a linked quota by editing the default quota.E. You cannot change the settings of a default quota.

What data protection level is assigned to an 8KB file in OneFS? (Choose 1)A. 8KB files do not have any data protection.B. 8KB files are individually assigned a data protection level by the administrator.C. 8KB files are mirrored.D. 8KB files are protected with the clusters data protection level.

Which of the following is true about support for IPv6 addresses on an Isilon cluster? (Choose 1)A. IP version 6 addresses are not supported on an Isilon cluster.B. IPv6 addresses are not supported on the internal internode networkC. IPv6 addresses are not supported on the external network used for cluster clients.D. There are no restrictions on using IPv6 addresses

An Isilon cluster automatically mirrors files of a certain size or smaller. What is that file size? (Choose 1)A. 8 KBB. 64 KBC. 128 KBD. 256 KBE. 512 KB

How are inodes are allocated in an Isilon cluster? (Choose 1)A. Inodes are allocated as neededB. Inodes are allocated as needed up to a maximum of 128 per directoryC. 1024 inodes are allocatedD. 1024 inodes are allocated per directory

Page 9: Isilon 100_045 Respuestas

What are the default NFS and SMB permissions set on the /ifs export? (Choose 1)A. No access for all (NFS) and no access for everyone (SMB).B. No access for users, full control for administrators (both NFS and SMB).C. Read and execute for all (NFS) and read and execute for everyone (SMB).D. Full access for all (NFS) and full access for everyone (SMB).

Which of the following is true about SmartConnect Basic? (Choose 1)A. You can define one subnet per cluster and one pool per subnet.B. You can define one subnet per cluster and multiple pools per subnet.C. You can define multiple subnets per cluster and one pool per subnet.D. You can define multiple subnets per cluster and multiple pools per subnet.

Which of following NIC aggregation protocols are supported by an Isilon cluster? (Choose 2)A. LACPB. EtherchannelC. FCED. Legacy LACPE. EtherFCE

What is the correct command to use for modifying file pools? (Choose 1)A. isi smartpools filepools –FilepoolName actionB. There are no isi commands for file pools, so the web administration interface should be used.C. The isi commands are very difficult to learn, so the web administration interface should be used.D. isi sp fp –FilepoolName action

If a file pool policy changes the protection level of a file or folder, what job runs to change that setting? (Choose 1)A. FlexProtectB. SmartPoolsC. SetProtectPlusD. SmartFailE. Protection

Which of following are true about the SmartConnect Service IP address? (Choose 2)A. It must be assigned to a physical network interface card on the node that has the lowest LNN.B. It must be assigned to one physical network interface card on any node in the cluster.C. It must be a virtual IP that is not assigned to any physical network interface card.D. It must not be in the IP subnet used by the cluster.E. It must be in the IP subnet used by the cluster.

Which of the following is true about files and viruses? (Choose 1)A. All files types cause an equal riskB. Only executable files are a riskC. One script files are a riskD. Only virtualization files are at risk

Page 10: Isilon 100_045 Respuestas

What is the maximum size of an NFS datastore that can be used for virtualization on an Isilon cluster? (Choose 1)A. 100 GBB. 32 TBC. 600 TBD. 15 PB

Which backup type provides the best data consistency? (Choose 1)A. hotB. warmC. coldD. All types of VM datastore backups provide the same level data consistency.

You have a cluster that has three disk pools and has global namespace acceleration (GNA)enabled. How can you configure which disk pools benefit from GNA? (Choose 1)A. You cant. GNA is enabled for all disk pools and is cannot be configured beyond that.B. You do not need any additional configuration. GNA is only applied to a single disk pool within a cluster.C. You can configure the SSD strategies settings to avoid one or more disk pools.D. Before you enable GNA, you can select to which disk pool GNA settings apply.

What is the minimum number of storage nodes needed to implement N+2 protection to an Isilon cluster so that the cluster stays in read/write mode if two nodes fail? (Choose 1)A. 1B. 3C. 5D. 7E. 9

What settings does changing the disk access pattern affect? (Choose 2)A. Data layout on disks within a nodeB. File system stripe sizeC. Pre-fetchingD. Disk block size

A legal e-discovery company provides a hosting service that organizes and stores seldom used content for up to 10 years. Which cluster configuration is the most appropriate? (Choose 1)A. A five node X200 cluster.B. A five node X200-SSD cluster.C. A ten node 36NL cluster.D. A 25-node S200 cluster.

A job is running with a low priority when a higher priority job starts. What happens to the lower priority job? (Choose 1)A. The lower priority job continues to run until completion.B. The lower priority job is elevated to higher priority.C. The lower priority job is paused.D. The lower priority job is cancelled.

Page 11: Isilon 100_045 Respuestas

How many NAS heads can an Isilon cluster support? (Choose 1)A. 1B. 2C. 4D. None. Isilon cluster do not use NAS heads.

You just licensed SnapShotIQ on a customers OneFS v6.X cluster. What is the recommended maximum number of snapshots that can be taken per directory? (Choose 1)A. 128B. 256C. 512D. 1024

What is the recommended MTU setting for a virtualization datastore on an Isilon cluster? (Choose 1)A. 1500B. 7500C. 9000D. 15000

What does the HTTP setting Disabled Entirely do? (Choose 1)A. Enables access to HTTP, but not HTTPs connections.B. Denies access to all connections using the HTTP and HTTPS protocols.C. Denies access to all connections using the HTTP protocol and to the web administration interface.D. Denies access to all connections using the HTTP protocol, but allows access to the web administration interface.

When planning to use both LDAP and Active Directory for authentication in your environment . What action can you take to avoid UID/GID coherency issues and having to run the Repair permissions job? (Choose 1)A. You cannot use this configuration. You must configure a separate cluster for LDAP and Active Directory domains.B. Implement LDAP before joining the cluster to an Active Directory domain.C. Joining the cluster to an Active Directory domain before implementing LDAP.D. No action is needed UID/GID coherency is not on issue in this situation.

Why would you configure an expiration policy for snapshots? (Choose 1)A. To automatically delete snapshotsB. To manually delete snapshotsC. To configure reminders for snapshot deletionsD. Snapshots do not have expiration policies

What is the default block size used by the OneFS file system? (Choose 1)A. 4 KBB. 8 KBC. 16 KBD. 128 KB

Page 12: Isilon 100_045 Respuestas

Which file access protocols are enabled by default in an Isilon cluster? (Choose 2)A. SMBB. CIFSC. NFSD. HTTPE. FTP

What types of data stores are supported for virtualization on an Isilon cluster? (Choose 2)20A. VMFSB. iSCSIC. NFSD. SMB

Which command lists the information provided on the Cluster Status page in the web administration interface? (Choose 1)A. isi adminB. isi statusC. isi cluster statusD. isi admin status

When configuring default File Pool Policy settings, selecting Same as data pool when specifying the Snapshot pool allows you to: (Choose 1)A. Assign snapshots to disk pools according to the same settings that are configured for datapools.B. Assign snapshots to file pools according to the same settings that are configured for data pools.C. Assign snapshot pools for file pool use.D. Assign filtered files to snapshot pools without restriction.

What methods can be utilized to discover critical events on the cluster? (Choose 3.)A. isi statusB. isi status listC. isi eventsD. The Cluster Status page that you open by selecting Status from the Cluster Status menu in the web administration interface.

Which of the following is true about SmartConect Basic? (Choose 1)A. You can define one subnet per cluster and one pool per subnet.B. You can define one subnet per cluster and multiple pools per subnet.C. You can define multiple subnets per cluster and one pool per subnet.D. You can define multiple subnets per cluster and multiple pools per subnet.

What is the default impact policy level of a FlexProtect job? (Choose 1)A. LowB. MediumC. HighD. There is no default. The priority of each job must be set by an administrator.

Page 13: Isilon 100_045 Respuestas

How are effective permissions calculated for Windows clients? (Choose 1)A. Both share and UNIX permissions are calculated and the most restrictive permission between the two is the effective permission.B. Both share and UNIX permissions are calculated and the least restrictive permission between the two is the effective permission.C. Both share permissions and Windows ACLs are calculated and the most restrictive permission between the two is the effective permission.D. Both share permissions and Windows ACLs are calculated and the least restrictive permission between the two is the effective permission.

In an N+M protection level, increasing the cluster protection level also increases what? (Choose 2.)A. The number of clients that can connect to the cluster.B. The amount of space consumed by parity or error correction code increases.C. The number of drives or nodes or both nodes and drives that can fail.D. The number of nodes needed for quorum is increased by one.

How many simultaneous SyncIQ jobs can run at one time? (Choose 1)A. SyncIQ does not use jobs.B. Only one SyncIQ job can run at a time.C. SyncIQ can run 5 jobs at a time.D. SyncIQ can run an unlimited amount of jobs at a time.

What does the SmartCache setting control? (Choose 1)A. SmartCache acts as a write coalescerB. SmartCache acts as a read coalescerC. SmartCache controls the size of the level 1 cache in nodesD. SmartCache controls the size of the level 2 cache in nodes

Your cluster contains two disk pools. Both disk pools have the same node capacity, file sizes and number of files. One disk pool has more space left than the other disk pool. Why? (Choose 1)A. OneFS calculates each disk pool space differently.B. The default disk pool protection level overrides all other pools.C. Disk pools by rule must have different protection levels.D. Each disk pool has a different protection level.

You update a cluster from OneFS 6.0 to OneFS 6.5. The cluster is a member of an LDAP domain.After the upgrade is complete, you check the LDAP settings, but find that LDAP is not configured on the cluster. What happened? (Choose 1)A. You misconfigured the upgrade, and must retry to upgrade the cluster.B. LDAP standards have changed, so you must rejoin the LDAP domain.C. The cluster has changed how it implements LDAP, so you must rejoin the LDAP domain.D. You must run the isi ldap upgrade command.E. The cluster now only supports Legacy LDAP.

Page 14: Isilon 100_045 Respuestas

You are configuring a synchronization between two clusters using SyncIQ. Youre root directory is /ifs/data. You create an include statement for /ifs/data/media and an exclude statement of /ifs/data/media/video. What will be synchronized to the other cluster? (Choose 1)A. Nothing will be synchronized.B. Everything in the ifs/data folder will be synchronized.C. Everything in the /ifs/data/media folder will be synchronized.D. Everything in the /ifs/data/media folder except the /ifs/data/media/video folder will besynchronized.

With the new Repair Permissions Job in OneFS v6.5, what three permission tasks are you able to select from? (Choose 3)A. Convert permissionsB. Clone permissionsC. Delete permissionsD. Inherit permissionsE. Reconstruct permissions

A cluster is running OneFS v6.5. The customer attempts to add a node to the cluster that is running OneFS v5.5.6. How will the cluster respond when the node is added? (Choose 1)A. The cluster will take no action. The cluster does not perform an OneFS version check on new nodes.B. The cluster will take no action. Different OneFS versions on nodes within a single cluster do not cause any issues.C. The cluster will automatically reimage the node to match the clusters OneFS version.D. The administrator is prompted to downgrade the cluster to OneFS v5.5.6 to match the newly added node.

When should you run an OVT check? (Choose 1)A. Never. Only Isilon Support runs OVT checks.B. After a production cluster is experiencing performance issuesC. After a hard disk is replaced on a cluster.D. Before a newly created cluster is connected to the production network.

What are the minimum requirements in order to run Global Name Space Acceleration with SSDs?(Choose 2)A. 5% of total cluster capacity needs to be SSDs.B. 2% of total cluster capacity needs to be SSDs.C. 20% of the number of nodes need to have one or more SSDs drives in them.D. All nodes need to have one or more SSD drives in them.

You are configuring a synchronization between two clusters using SyncIQ. Youre root directory is /ifs/data. You create an include statement for /ifs/data/media and an exclude statement of /ifs/data/media/video. What will be synchronized to the other cluster? (Choose 1)A. Nothing will be synchronized.B. Everything in the ifs/data folder will be synchronized.C. Everything in the /ifs/data/media folder will be synchronized.D. Everything in the /ifs/data/media folder except the /ifs/data/media/video folder will be synchronized.

Page 15: Isilon 100_045 Respuestas

What are the available methods for notifying cluster administrators of critical events? (Choose 1)A. Email onlyB. Email and SMTPC. Email and SNMPD. Email or SNMP

What is the minimum number of storage nodes needed to implement N+3 protection to an Isilon cluster so that the cluster stays in read/write mode if three nodes fail? (Choose 1)A. 1B. 3C. 5D. 7E. 9

What is the default setting for the data access pattern on a LUN created on an OneFS 6.5 cluster?(Choose 1)A. RandomB. ConcurrencyC. StreamingD. Dynamic

When configuring the Default File Pool Policy settings, selecting Any pool when specifying the data pool results in what action: (Choose 1)A. Define default file pool policies for the default file pool.B. Use the isi file pools commands.C. Assign storage pools for file pool use.D. Store a filtered set of files on all disk pools.

What does the Rebalance Policy control? (Choose 1)A. Whether or not NFS failover occurs.B. How static IP addresses are distributed to the nodes during NFS failover.C. How dynamic IP addresses are distributed after a failed node comes back online.D. How IP addresses are distributed among the nodes when NFS failover occurs.

In OneFS v5.5 the default protection level was N+1. What is the default protection level in OneFS v6.5 with at least an 18TB cluster? (Choose 1)A. +2:1B. +2C. +3:1D. +3

When can you implement a rolling upgrade to OneFS? (Choose 1)A. Only for firmware updatesB. Only for minor OS upgradesC. For minor and major OS upgradesD. All upgrades can be rolling

Page 16: Isilon 100_045 Respuestas

Why is the anti-virus default maximum file size 2 GB? (Choose 1)A. Because OneFS cannot support files larger than 2 GB.B. Because anti-virus software does not scan files larger than 2 GBC. Because the ICAP protocol does not support files larger than 2 GB.D. There is no specific reason for this maximum. You can set it higher than 2 GB at any time.

What does it mean to truncate an infected file? (Choose 1)A. The file is deleted.B. The file is broken into multiple smaller files.C. All of the files metadata is removed.D. The file is reduced to 0 bytes in size.29

Which of the following are included when files are backed up using an Isilon clusters NDMP backup? (Choose 3.)A. File attributesB. Protection levelsC. SmartQuota settingsD. Alternate data streamsE. ACLs.

Which of the following statements is correct in regards to disabling write caching (SmartCache) in OneFS? (Choose 1)A. Write performance remains the same when write caching is disabled.B. Write performance is improved when write caching is disabled.C. In some cases, write performance is degraded when write caching is disabled.D. Write performance is degraded when write caching is disabled.

If you do not create a schedule for an anti-virus policy, what happens? (Choose 1)A. It runs on the default scheduleB. It will not run. All anti-virus policies require a schedule to run.C. It can only be used as a template policyD. It can be run manually by an administrator

In an Isilon cluster, stripe units are what size? (Choose 1)A. 8 KBB. 16 KBC. 32 KBD. 64 KBE. 128 KB

When is a SnapShot license required? (Choose 2)A. To use Snapshots with NDMP backupsB. To use Snapshots on a source cluster for SyncIQC. To use Snapshots on a target cluster for SyncIQD. To enable Volume Shadow Copy Service.

Page 17: Isilon 100_045 Respuestas

What are Advanced ACLs? (Choose 1)A. Windows permissions that are assigned to a file or folder on an Isilon clusterB. Windows permissions that are not assigned to a file or folder on an Isilon clusterC. UNIX permissions assigned to a file or folder on an Isilon cluster that are translated to Windows permissionsD. UNIX permissions that are assigned to a file or folder on an Isilon cluster