What does Isilon OneFS use to re-write data when a disk read fails?
A. Dynamic Sector Repair
B. NVRAM
C. Isilon Data Integrity
D. CRC
Where are file system operations initiated on an Isilon node?
A. L1
B. NVRAM
C. L2
D. Disk
A company currently has numerous file servers providing home directories for its employees. Some departments have their own file servers. All corporate users authenticate using Active Directory. The engineering department has their own untrusted AD domain for their file servers.
The company is looking for a consolidated solution that requires minimal changes to the environment, and that creates a single namespace for the home directories.
What is the recommended solution that will meet this company's requirements?
A. Implement an Isilon cluster and utilize Access Zones.
B. Configure two separate clusters, one for each AD domain.
C. Utilize SmartPools to create two pools to separate the domains.
D. Consolidate onto a single cluster and merge the domains.
A customer plans to replace an existing array that is supported by the MiTrend Workload Profile Assessment (WPA) service. You receive performance data from the customer and run a WPA report that shows the array has 50TB of usable capacity.
In discussions with the customer, you learn the content is comprised of four million 6MB files and 400 million 64KB files. The customer explains they have a small budget and very limited rack space available in their datacenter. Performance is not a concern because the files are rarely accessed.
Which configuration provides the needed usable capacity using N+2:1 protection, and requires the least amount of rack space?
A. 3 x NL400 nodes with 2TB Drives
B. 3 x X400 nodes with 1TB Drives
C. 5 x X200 nodes with 1TB Drives
D. 6 x X200 nodes with 1TB Drives
Where does Endurant Cache stage its write cache?
A. SSD
B. DISK
C. NVRAM
D. DRAM
What determines how a user is directed to the correct secure multi-tenancy access zones?
A. External protocols
B. Isassd daemon
C. External providers
D. Incoming IP
What is the minimum size and the maximum size, respectively, of a single pre-Gen 6 node pool?
A. 3 and 144
B. 3 and 288
C. 4 and 144
D. 4 and 288
Which type of link aggregation is supported with Isilon nodes?
A. Aggregation of up to eight similar ports in the same cluster
B. Aggregation across Ethernet ports in a node
C. Aggregation of 10 GbE and 40 GbE ports
D. Aggregation across two or four nodes
A customer has a cluster running with a single access zone and serves multiple internal departments. The clients access the cluster over both SMB and NFS protocols. A department user has been assigned the task of auditing SMB activity and enforcing appropriate quotas for certain users.
How should the cluster administrator grant this access?
A. Create a custom RBAC role
B. Create a secondary root account credential
C. Provide the AuditAdmin RBAC role
D. Provide the SecurityAdmin RBAC role