An Isilon administrator was unsuccessful when adding a new node to an existing Isilon cluster using the
Nodes LCD panel.
What is a possible cause?
A. Internal join mode has been set to `secure'
B. Internal join mode has been set to `manual'
C. Nodes can only be added through the console port
D. Nodes can only be added through the web administration interface
An Isilon storage administrator is attempting to manage an Isilon cluster using the web administration interface. However, some configuration tabs are not displayed. What is the most likely cause?
A. RBAC has been implemented
B. Some features have not been licensed
C. Access zones have been created
D. Administrator must log in as "compadmin"
A storage administrator needs to create a file pool policy to move files that have not been changed in over two months to their archive tier. The Tiers of nodes with faster and slower node pools already exist. Which file matching criterion should be used to meet this requirement?
A. atime is older than 2 months ago
B. birthtime is older than 2 months ago
C. ctime is older than 2 months ago
D. mtime is older than 2 months ago
Refer to the Exhibit.
A storage administrator has an Isilon cluster with the following:
Five S210 nodes Eight X200 nodes Eight NL400 nodes
The cluster default protection level is set to N+2n and the administrator has configured the listed file pool policies. A video capture station saves a new file to /ifs/content/project as intro.mov.
Which node pool is the intro.mov file written to and which protection level is applied?
A. NL400_Pool at N+3n protection
B. S210 _Pool at N+2n protection
C. X200_Pool at N+2n protection
D. X200_Pool at N+3n protection
A storage administrator needs to enable FTP service on an Isilon cluster to allow internal customers to
upload files to the company. However, the administrator does not want to create individual user names and
passwords for each internal customer.
How can the cluster support this requirement?
A. Enable FTP anonymous access
B. Configure Active Directory to support anonymous access
C. Configure LDAP to support anonymous access
D. Enable FTP server-to-server transfers
An Isilon cluster with three S210 nodes and three NL400 nodes was expanded to 18 nodes (15 x S210, 3 x NL400). You have been asked to revise the data protection policy initially set to N+3d:1n while optimizing the available writable disk space. What is the recommended data protection strategy for each pool and will the data protection overhead average increase or decrease?
A. S210 node pool changes to N+2d:1n NL400 node pool changes to N+2d:1n
B. S210 node pool changes to N+2n NL400 node pool remains N+3d:1n
C. S210 node pool remains N+3d:1n NL400 node pool changes to N+2d:1n
D. S210 node pool remains N+3d:1n NL400 node pool changes to N+2n
Which Isilon protection setting will require the least percentage of overhead for a 1024KB file?
A. N+1n in a 4-node node pool
B. N+2n in a 10-node node pool
C. N+2d:1n in a 4-node node pool
D. N+3d:1n in a 5-node node pool
Which type of information does Isilon InsightIQ display without enabling FSA?
A. Network performance
B. Data usage
C. Maximum file size
D. Node queue depth
What is the estimated space savings from audit log compression on an Isilon cluster?
A. 25%
B. 50%
C. 75%
D. 90%
What accurately describes the behavior of On Disk Identity set to native on an Isilon cluster?
A. A file will be owned by a user's real SID if no real UID exists for that user
B. All files in shares can only be owned by a SID
C. All files in exports can only be owned by a UID
D. User identities must be defined through external authentication providers