Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DEE-1421 - Expert - Isilon Solutions Exam

Page: 2 / 2
Total 58 questions

A company is planning to replicate a dataset to a newly implemented Dell EMC Isilon cluster. SyncIQ will be used from the source cluster to the target cluster. The company’s systems administrator wants to know how long the initial synchronization will take without seeding. The administrator provides the following information:

    Link speed between clusters is 1 Gb/s

    Link speed efficiency is 85%

    SyncIQ domain size is 125TB

If no SyncIQ performance rules are set, what is the estimated number of days?

A.

10

B.

12

C.

14

D.

16

A company has an 8-node Dell EMC Isilon cluster configured with SmartConnect. The device IDs of the nodes are 1 through 8. However, the node with the SSIP failed.

Which cluster node will have the SSIP assigned after the failure?

A.

Node with the highest device ID

B.

Highest logical node number

C.

Node with the lowest device ID

D.

Lowest logical node number

A company is adding a 48-node A2000 with 10 TB HDDs for deep archival data to their existing Dell EMC Isilon cluster. The existing cluster consists of a 10-node X210 and an 8-node NL410. What is the minimum recommended protection setting required for the A2000?

A.

N+3d:1n1d

B.

N+4n

C.

N+4d:1n

D.

N+4d:2n

SPECIAL INSTRUCTIONS

The remaining Part1 questions are associated with four case studies that describe various environments or settings. Each case study appears on its own display screen. Questions for each case study will appear on separate display screens.

When displaying a question, you can easily review the related case study by clicking on the “Review Case Study” icon shown below:

Case Study 5 – Refer to the Exhibit.

Backing up data from a Dell EMC Isilon cluster exceeds the company’s backup window. Because the company has a large amount of data with a continuous high growth rate, they want to change their backup strategy. The Gen 6 Isilon cluster consists of 24 nodes. Their current backup strategy is an NDMP three-way backup performing weekly full backups to tape and incremental backups each night. The strategy uses Dell EMC NetWorker. The DMA uses Include paths to specify what data to backup. All data on the cluster must remain accessible.

The company’s IT team is now looking for a method to increase the performance of their backups. After some investigations, you notice that the backup job quiesces the file system. This is creating lock contention issues on open files and not allowing users full access to data when the backup job runs.

What advice should be provided to the team to eliminate lock contention and allow full access to users?

A.

Create a cron job to remove all locks before each backup.

B.

Add A100 Backup Accelerators and configure for three-way NDMP

C.

Stop using an NDMP-based backup strategy.

D.

Enhance the backup strategy using snapshots for backups.

An IT team is implemented a disaster recovery solution. A Dell EMC Isilon cluster will replicate production data from the existing primary cluster to a planned secondary cluster. The primary cluster is licensed for SmartLock Enterprise. A SmartLock enterprise type directory on the primary cluster is planned for SyncIQ replication to the secondary cluster.

When consulting with the IT team. What is a key consideration when replacing the data in a SyncIQ source directory configured with SmartLock Enterprise mode?

A.

Replication is allowed but a failback will copy the entire dataset

B.

SyncIQ will support a failback regardless of the target’s directory type.

C.

Target directory must be a SmartLock enterprise type.

D.

A SyncIQ policy is not supported on a WORM domain.

An IT team is implementing a disaster recovery solution. A Dell EMC Isilon cluster will replicate production data from the existing primary cluster to a planned secondary cluster. The primary cluster is licensed for SmartLock Enterprise whereas the secondary cluster is not.

A SmartLock enterprise type directory on the primary cluster is planned for replication. SyncIQ is used to replicate the data. What is a key consideration when replacing the WORM domain?

A.

Secondary cluster must be licensed for SmartLock Enterprise.

B.

Retention dates and commit status are lost on the target directory.

C.

Files on the primary cluster cannot be committed to a WORM state.

D.

A failback will cause a second copy of the data on the primary cluster.

Case Study 3

A financial services company has file sharing workflows and 2000 home directories which include 70% Microsoft Windows and 30% Linux. The Security team is also interested in credit card usage data analytics such as point of sale, geolocation, and authorization and transaction data. Home directories and file shares do not require D@RE or SEC compliance.

However, due to the sensitivity of the credit card data, the company requires D@RE for credit card information and must adhere to the U.S. SEC 17a-4(f) compliance standards. Additionally, they are interested in auditing user access and anti-virus features.

The compute and storage environment consists of the following:

    200 TB of Fibre Channel drives on NetApp ONTAP 7

    Environment is expected to grow 200 TB over the next three years

In order to remove the encryption key on the SED drives, which steps are required?

A.

SmartFail the cluster and then remove the drive

B.

Suspend the cluster and then SmartFail the drive

C.

SmartFail and then remove the drive

D.

Suspend the node and then remove the drive