In an Isilon environment, what is the total protection level offered by N+2:1?
A. Two drives or one node can fail without any data loss in the cluster
B. Two hot spare drives and one cold spare drive are available for disk failures
C. Two hot nodes and one cold node are available for node failures
D. Two drives on one node can fail without causing any data loss in the cluster
What are the benefits of Isilon Scale-Out NAS versus Scale-Up NAS technology?
A. File-based storage, File system upper limit 20 PB+, quick scalability, and more granular file protection
B. Block-based storage, file system upper limit 10 PB, nodes contain all components, and RAID protection
C. Block-based storage, file system upper limit 20 PB+, nodes contain all components, and more granular file protection
D. File-based storage, file system upper limit 16 TB, quick scalability, and volume level RAID protection
Which requirement must be met on an Isilon cluster to be able to enable node compatibility?
A. Nodes must have the same number and capacity of SSDs, HDDs, or SEDs
B. New generation nodes must have less RAM than older generation nodes
C. Minimum of three new generation nodes must be added to the existing node pool
D. Any new generation node can be added to any older generation node pool
Which interface on an Isilon cluster represents an aggregation of interfaces ext3 and ext4?
A. ext-agg2
B. ext-agg
C. lagg2
D. cxgb0
What is required to enable Secure NFS on an Isilon cluster?
A. Services for NFS must be configured in the AD environment
B. LDAP must be configured in the system access zone
C. NFS access must use static address pools
D. Cluster must be configured to use NTP
Upon review of an existing Isilon cluster, a storage administrator discovers that the cluster is in compliance mode. However, some files are beyond their maximum retention period but are not out of the WORM state. How can this condition be explained?
A. Compliance clock is out of sync with the system clock due to downtime and has not yet caught up
B. Files do not age out of compliance and the WORM state cannot be modified once written
C. Files were never updated to free up space
D. Users specified shorter individual retention periods than the directory configurations
Which type of information does Isilon InsightIQ display without enabling FSA?
A. Network performance
B. Data usage
C. Maximum file size
D. Node queue depth
Which capabilities are enabled after activating an Isilon SnapshotIQ license?
A. Create and schedule snapshots, and modify SnapshotIQ settings
B. View and delete snapshots, and access snapshot data
C. View, create, and schedule snapshots, and access snapshot data
D. Create snapshot schedules, access snapshot data, and delete snapshots
What accurately describes the behavior of an access token on an Isilon cluster?
A. Updated when the client accesses the cluster
B. One token is generated for every access zone
C. Cannot contain both an SID and an UID
D. Requires the use of external authentication providers
Based on the command output shown in the exhibit, what does the "+" represent?
A. File has an advanced ACL on it
B. File has a synthetic ACL on it
C. File's mode bits take precedence
D. Root is a super user