Pass4itsure > EMC > EMC Certification > E20-357 > E20-357 Online Practice Questions and Answers

E20-357 Online Practice Questions and Answers

Questions 4

Which role-based privilege must be granted to a user before they are allowed to log into the web administration interface?

A. ISI_PRIV_LOGIN_PAPI

B. ISI_PRIV_LOGIN_CONSOLE

C. ISI_PRIV_AUTH

D. ISI_PRIV_CLUSTER

Buy Now
Questions 5

A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes.

What refresh process is appropriate in this case?

A. Use SyncIQ to migrate the data from the old cluster to the new cluster

B. Add the new nodes to the existing cluster and use SmartPools to migrate the data

C. Add the new nodes one at a time and SmartFail out the old nodes

D. Downgrade the new nodes to the version of OneFS running on the old nodes

Buy Now
Questions 6

What NIC ports could be used in a valid NIC aggregation configuration?

A. ext-1, ext-2, ext-3, and ext-4

B. ext-1, ext-2, 10gige-1, and 10gige-2

C. ext-1 and 10gige-1 only

D. 10gige-1, 10gige-2, 10gige-3, and 10gige-4

Buy Now
Questions 7

An RHEL client is connecting to an EMC Isilon cluster using NFSv3. How is client response traffic routed out of the cluster?

A. Highest priority gateway

B. 1 GigE NICs on node with highest LNN

C. 10 GigE NICs on node with lowest node ID

D. Lowest priority gateway

Buy Now
Questions 8

Which cache stores blocks from previous read and write operations, and interacts with the node's drive subsystem?

A. L2 Cache

B. Endurant Cache

C. L1 Cache

D. FAST Cache

Buy Now
Questions 9

A customer has created multiple file pool policies on their cluster. Many of the file pool policies include the same filtering criteria.

What determines which file pool policy is applied to the file?

A. The first matching policy in top-down order

B. The first matching policy in bottom-up order

C. File name matches are applied first, followed by File location matches

D. File time matches are applied first, followed by File name matches

Buy Now
Questions 10

You have been tasked with creating file pool policies for a customer as part of the configuration document. Three of the file pool policies are based on matching specific file extensions.

What file pool policy filter type should you select?

A. Filename

B. File type

C. File location

D. User defined attributes

Buy Now
Questions 11

You have been tasked with creating file pool policies for a customer as part of the configuration document. The file criteria indicate that directories that have not changed for over 60 days should be moved to the archive tier.

What file pool policy filter types should you select?

A. File type and mtime

B. Filename and atime

C. File type and atime

D. Filename and mtime

Buy Now
Questions 12

What is the recommended best practice when setting snapshot deletion schedules?

A. Determined by your RTO and RPO SLAs

B. Set to six times the length of the snapshot policy period

C. Set to delete after the next snapshot is taken

D. Set to one year after the snapshot is taken

Buy Now
Questions 13

What configuration is required for clients to have the same user identity on both source and target clusters?

A. Both clusters must be connected to the same LDAP and AD servers

B. Both clusters must have the same SMB shares and NFS exports

C. The SyncIQ policy must be a 'copy' policy

D. The SyncIQ policy must be a 'sync' policy

Buy Now
Exam Code: E20-357
Exam Name: Isilon Solutions Specialist Exam for Implementation Engineers
Last Update: Apr 24, 2024
Questions: 122
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99