Compliance monitoring has been enabled for an ECS system. Under which conditions will a BAD event be received?
A. UNKNOWN and NOT READY
B. SUSPECT and UNKNOWN
C. DEGRADED and UNTRACKED
D. BAD and NOT READY
You are creating a VDC during the ECS configuration process. You get the following error:
Error 7000 (http: 500): An error occurred in the API Service
You check the system and this is what you see:
Storage Pool status: Ready
Nodes: Ready to use
Licenses: OK
What can be causing this error?
A. The endpoints were not supplied as a comma-separated list
B. You did not wait 10 to 15 minutes after creating the storage pool
C. You have not created the system storage pool
D. The VDC access key was typed incorrectly
Which protocol allows Microsoft Windows servers to access storage on ECS?
A. HDFS
B. NFSv3
C. CIFS
D. SMBv3
Which process allows ECS to reconstruct objects within a storage pool, if that pool loses a disk?
A. Full mirrored replication
B. Chunk management
C. Erasure coding
D. XOR operation
Which configuration task is optional in ECS when enabling DD Cloud Tier integration?
A. Create a special bucket to store DD Cloud Tier objects
B. Create a dedicated namespace for DD Cloud Tier objects
C. Create an object user account for DD Cloud Tier objects
D. Create a dedicated storage pool for DD Cloud Tier objects
An organization is planning to integrate many S3 client applications with ECS. The applications are using virtual host style addressing for bucket identification.
What configuration should the storage administrator use?
A. Apply the DNS host record and create the needed base URL on ECS Make the needed changes to the S3 client configuration file
B. Apply the DNS wild card record and the host record for the load balancer Install the needed SSL certificate on the load balancer
C. Apply the DNS wild card record and the host record for the load balancer Create the needed base URL on ECS
D. Apply the DNS wild card record and the host record for the load balancer Install the needed SSL certificate on the ECS nodes
How is an ECS federation created?
A. From the first ECS running the primary VDC, create an additional VDC entry for each remote ECS instance.
B. Add the remote VDC into the replication group configuration for the primary VDC
C. Create a new federation configuration from any VDC, then add all other VDCs to the configuration
D. Create the remote VDC then merge both the first VDC and the remote VDC into the federation configuration.
What is the difference between S3 authentication signature version 2 and S3 authentication signature version 4?
A. Version 2 uses a shared secret and access key ID Version 4 uses the date/region algorithm
B. Version 2 uses HMAC algorithm Version 4 uses the credentials scope algorithm
C. Version 2 uses a namespace based signature Version 4 uses HMAC algorithm
D. Version 2 uses the secret key to sign the request Version 4 uses a signing key
When a disk state is suspect, what are the allowable disk operations?
A. Read
B. Write
C. Read and write
D. No operations allowed