Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

EMC DES-1423 - Specialist - Implementation Engineer, Isilon Solutions Exam

Page: 1 / 2
Total 68 questions

What is the recommended networking design approach when planning subnets?

A.

Use a common subnet for data, replication and backup, and use a dedicated subnet for management.Assign the lowest priority gateway number for the management subnet.

B.

Use a common subnet for management, data, replication and backup.Assign a random priority gateway number for the subnet.

C.

Use a common subnet for data and management and a common subnet for replication and backup.Assign the lowest priority gateway number for the management subnet.

D.

Use dedicated subnets for management, data, replication and backup.Assign the lowest priority gateway number for the data subnet.

A company plans to build two Isilon clusters in an active-active disaster recovery environment. The initial requirement is to have one access zone for their Finance department. Which recommended directory structure meets the requirement?

A.

Cluster_A:/ifs/cluster_a/finance/ifs/cluster_b/financeCluster_B:/ifs/cluster_a/finance/ifs/cluster_b/finance

B.

Cluster_A:/ifs/finance/ifs/financeCluster_B:/ifs/finance/ifs/finance

C.

Cluster_A:/ifs/finance/cluster_a/ifs/finance/cluster_bCluster_B:/ifs/finance/cluster_a/ifs/finance/cluster_b

D.

Cluster_A:/ifs/cluster_a/ifs/cluster_bCluster_B:/ifs/cluster_a/ifs/cluster_b

Based on the exhibit, what is the actual protection level of the FEATURE.wmv file?

A.

N+1

B.

N+2

C.

N+2n

D.

N+2d: 1n

What defines FEC link aggregation mode?

A.

Switches to the next interface when the primary interface becomes unavailable.

B.

Balances outgoing traffic based on hashed protocol header information that includes source and destination addresses, and VLAN tag.

C.

Balances outgoing traffic based on hashed protocol header information that includes source and destination addresses.

D.

Balances outbound traffic across all active ports in the aggregated link.

An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional, the administrator wants to create specific administrative accounts for specific cluster management activities in different access zones. An administrator of one zone should be able to view or configure objects in a different zone.

Which action will address the administrator’s requirements?

A.

Create ZRBAC role for each zone administrator.

B.

Create ZRBAC role for the administrator on all access zone.

C.

Create a separate management subnet for each administrator.

D.

Create an unique role in the System zone for each administrator.

Which OneFS networking option enables Isilon for DNS multitenant functionality?

A.

Groupnet

B.

Access zone

C.

Pool

D.

Subnet

You have been tasked with designing SyncIQ policies for a systems administrator that requires failover and failback testing. What information should be provided to the administrator?

A.

SyncIQ supports failback replication policies that specify directory includes or excludes.

B.

Failback replication policies that specify includes or excludes cannot use data encryption.

C.

Failback replication policies that specify includes or excludes are not supported with SyncIQ.

D.

Failback replication policies that specify includes or excludes cannot use historical snapshots.

A user has recently left the company. After two weeks, the Isilon administrator receive a request to provide some files from the user’s directory called \ifs\user\John_Doe\development. The administrator then discovers that the required files have been deleted, but a snapshot of the directory is available.

After restoring the files from the snapshot, which additional step is necessary to access the files?

A.

Restored files need to be copied from the .snapshot directory to the .restore directory.

B.

Permissions of the restored files need to be changed.

C.

Restored files need to be copied from the .restore directory to the user directory.

D.

Permissions of the user directory need to be changed.

When reviewing the actual protection output of N+4/2, what does the number “4” represent?

A.

FEC stripe units per stripe

B.

Hard drives used per stripe

C.

Volume stripes per file system

D.

FEC stripe units per file system

What is the minimum storage space needed on a datastore to hold InsightIQ?

A.

50 GB

B.

65 GB

C.

70 GB

D.

85 GB