What does it mean if an EMC Isilon cluster is in a NANON state?
A. One or more nodes are missing Ethernet connections
B. One or more nodes are missing InfiniBand connections
C. One or more nodes have critical events
D. One or more nodes have been improperly shut down
You are using a Windows 2008r2 server and connecting to a share over SMBv2. Where would the session or state information for the connection be maintained?
A. Client-connected node only
B. Client only
C. Client-connected node and client
D. All nodes in the cluster
Which protocols are access zone aware in OneFS 7.2?
A. SMB and NFS
B. SMB and FTP
C. NFS and HTTP
D. FTP and NFS
An implementation engineer has just joined an EMC Isilon cluster to an Active Directory (AD). The System zone of the cluster is set to default settings.
Which AD group is automatically added to the Isilon cluster's users group?
A. Domain Users
B. Local Users
C. Everyone
D. Domain Admins
What is the file protection mechanism used with OneFS file striping?
A. Forward error correction
B. Redundant array of independent disks
C. Non-volatile random access memory
D. Drive controller mirroring
After operating an EMC Isilon 3-node cluster for some time, a customer notices that the amount of storage used seems significantly larger that it should be. The filesystem has a tremendous amount of small (<128K) files and the protection level is N+2d:1n. The customer does not want to sacrifice data protection.
What should be done to increase available capacity?
A. Nothing
B. Defragment the disks
C. Compress the small files
D. Change protection to 2x mirroring
Users are receiving notification they are out of space even though when they calculate their file usage, they should have 20% to 30% more space still available.
What is the probable explanation?
A. The quotas are set to include protection overhead
B. The group usage is included with their user quota
C. Snapshot data has not been deleted
D. Deleted files have not been removed from their quota
Which task requires preparation for successful failover?
A. Creating shares and exports on the target cluster
B. Using the same cluster name and IP address for source and target
C. Breaking the target associations of SyncIQ policies
D. Testing each SyncIQ policy to prepare resync policies
Which semi-automated process with SyncIQ has the capability to interrupt sync jobs in progress?
A. Failover
B. Fail back
C. Continuous mode
D. Initial sync compare
A customer has configured a cluster in Compliance mode. The customer is only using Enterprise SmartLock and non-WORM directories.
What mechanism is used to control the data retention expiration period?
A. System clock
B. Compliance clock
C. Autocommit period
D. Minimum retention period