Which role-based privilege must be granted to a user before they are allowed to log into the web administration interface?
A. ISI_PRIV_LOGIN_PAPI
B. ISI_PRIV_LOGIN_CONSOLE
C. ISI_PRIV_AUTH
D. ISI_PRIV_CLUSTER
A customer is upgrading their EMC Isilon nodes as part of a technology refresh. The nodes to be replaced cannot be upgraded to the later version of OneFS that is required by the newer nodes.
What refresh process is appropriate in this case?
A. Use SyncIQ to migrate the data from the old cluster to the new cluster
B. Add the new nodes to the existing cluster and use SmartPools to migrate the data
C. Add the new nodes one at a time and SmartFail out the old nodes
D. Downgrade the new nodes to the version of OneFS running on the old nodes
What NIC ports could be used in a valid NIC aggregation configuration?
A. ext-1, ext-2, ext-3, and ext-4
B. ext-1, ext-2, 10gige-1, and 10gige-2
C. ext-1 and 10gige-1 only
D. 10gige-1, 10gige-2, 10gige-3, and 10gige-4
An RHEL client is connecting to an EMC Isilon cluster using NFSv3. How is client response traffic routed out of the cluster?
A. Highest priority gateway
B. 1 GigE NICs on node with highest LNN
C. 10 GigE NICs on node with lowest node ID
D. Lowest priority gateway
Which cache stores blocks from previous read and write operations, and interacts with the node's drive subsystem?
A. L2 Cache
B. Endurant Cache
C. L1 Cache
D. FAST Cache
A customer has created multiple file pool policies on their cluster. Many of the file pool policies include the same filtering criteria.
What determines which file pool policy is applied to the file?
A. The first matching policy in top-down order
B. The first matching policy in bottom-up order
C. File name matches are applied first, followed by File location matches
D. File time matches are applied first, followed by File name matches
You have been tasked with creating file pool policies for a customer as part of the configuration document. Three of the file pool policies are based on matching specific file extensions.
What file pool policy filter type should you select?
A. Filename
B. File type
C. File location
D. User defined attributes
You have been tasked with creating file pool policies for a customer as part of the configuration document. The file criteria indicate that directories that have not changed for over 60 days should be moved to the archive tier.
What file pool policy filter types should you select?
A. File type and mtime
B. Filename and atime
C. File type and atime
D. Filename and mtime
What is the recommended best practice when setting snapshot deletion schedules?
A. Determined by your RTO and RPO SLAs
B. Set to six times the length of the snapshot policy period
C. Set to delete after the next snapshot is taken
D. Set to one year after the snapshot is taken
What configuration is required for clients to have the same user identity on both source and target clusters?
A. Both clusters must be connected to the same LDAP and AD servers
B. Both clusters must have the same SMB shares and NFS exports
C. The SyncIQ policy must be a 'copy' policy
D. The SyncIQ policy must be a 'sync' policy