You are designing a backup solution using an NDMP redirector and throttler. What is the default threshold
percentage of CPU resources that the throttler limits NDMP to?
An Isilon customer's administrator created the nested directory structure, shown in the exhibit, using SmartQuotas. However, a user needs to write an additional 650 GB of data to "/ifs/data/acct/recv".
Which steps will enable the user to complete this task?
An Isilon customer needs to grant a specific administrator on RBAC privilege. What does the customer need to do?
A company currently has multiple fileservers to provide home directories for its employees. Each department has a separate fileserver. Most corporate users are on Windows clients and utilize Active Directory, except for the Engineering department, which uses Linux and NIS for authentication. The company is looking for a solution with minimal administrative overhead and a single namespace for the home directories.
What is the recommended solution that will meet this company's requirements?
When an Isilon SyncIQ replication job completes, how many SnapshotIQ policies can be created on a target cluster directory?
An Isilon customer implemented a retention period at the directory level. They set individual retention periods on individual files within those directories.
Which retention periods will be enforced?
-- Exhibit --
A large manufacturing company is an existing Isilon customer with a cluster consisting of four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file system shows that it is 60% utilized. Home directories and file shares comprise 75% of the existing content and the remainder is inactive deep archive. The company has 1,000 employees using Windows and Mac clients participating in a single Active Directory (AD) forest.
During a meeting with the CIO and Director of IT you discuss the company’s recent acquisition – an engineering firm that specializes in Computer Aided Design (CAD). The engineering firm has 400 UNIX workstations that produce technical drawings which are currently stored on another vendor’s SAN solution. The all UNIX environment uses NIS for authentication and name resolution. They do not currently use DNS or LDAP. The engineering company has an old storage system that has been experiencing problems and the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to eliminate all tape and recover the data onto disk.
The CIO is concerned about security of the company’s intellectual property, especially with the rapid adoption of mobile devices and external cloud content sharing services such as DropBox, Egnyte, and SugarSync. They would like to implement an alternative that provides external file sharing and mobile device synchronization while maintaining security control over the company’s data.
The Director of IT reports that users are storing non-work related content on the Isilon cluster. They would like to limit the amount of capacity that each user can consume in their home directory and want to ensure you provide the capability to easily visualize which users are over their allotment.The company’s Windows users currently leverage Windows Shadow Copy to recover files that have been accidentally deleted. The IT department wants to ensure that Mac and incoming UNIX clients have the same functionality.
The Director of IT also mentions that users are reporting slow response times when browsing their home directories and shared folders. They are concerned that Isilon cannot scale to support their combined requirements.
-- Exhibit --
Based on the meeting with the customer, which Isilon cluster configuration would you recommend?
A customer is trying to read data from Node 1 to Node 5 in an Isilon cluster. The two Isilon nodes have the same content in the private caches. Cached data is consistent across both instances. What is the correct sequence of steps that OneFS uses to ensure that all data is consistent across the entire shared cache?
There is a need to carry out a tech refresh of an Isilon cluster. Old nodes must be removed because of space constrains in the data center. What methodology is least disruptive and will retain the file system structure, configuration, data, and DNS information?
What is appropriate for capturing packets for later analysis of I/O request sizes and randomness on Isilon clusters?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
EMC Free Exams |
---|
|