Black Friday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > EMC > Storage Administrator > D-PSC-DY-23

D-PSC-DY-23 Dell PowerScale Deploy 2023 Question and Answers

Question # 4

An Isilon administrator wants to minimize the use of root/admin access to their cluster. In additional, the administrator wants to create specific administrative accounts for specific cluster management activities in different access zones. An administrator of one zone should be able to view or configure objects in a different zone.

Which action will address the administrator’s requirements?

A.

Create ZRBAC role for each zone administrator.

B.

Create ZRBAC role for the administrator on all access zone.

C.

Create a separate management subnet for each administrator.

D.

Create an unique role in the System zone for each administrator.

Full Access
Question # 5

When configuring NTP on a 16-node Gen 6 cluster, how many chimer nodes are automatically configured on the duster?

A.

3

B.

6

C.

1

D.

16

Full Access
Question # 6

In a Dell PowerScale environment, what is a requirement to join multiple, untrusted Active Directory (AD) authentication sources to an access zone?

A.

All untrusted AD provider instances must exist in all access zones

B.

Only one of the AD provider instances can exist in a zone at one time

C.

A common /'ifs tree is required for all access zones

D.

Must only join Active Directory domains in the same forest

Full Access
Question # 7

A new Isilon administrator has created their first quota of 100 TB on a directory called “/ifs/Boston-zone/RnD”. Both the Engineering and QA teams have access to this directory. The directory sits on a 4-node H400 node pool.

Two weeks later, the administrator notices that the team’s available disk space is decreasing faster than anticipated for the “/ifs/Boston-zone/RnD” directory.

What is the most likely cause for the decrease in disk space?

A.

Quota was configured to include overhead.

B.

SmartPools tiering is not enabled.

C.

Quota was configured as an Advisory quota.

D.

SmartPools global spillover is not enabled.

Full Access
Question # 8

Which access layer evaluates file and directory permissions?

A.

Protocol Layer

B.

Authentication Layer

C.

Authorization Layer

D.

Identity Assignment Layer

Full Access
Question # 9

How many NFS exports are supported on a Dell PowerScale cluster running OneFS 9.0?

A.

1 K

B.

4K

C.

10 K

D.

40 K

Full Access
Question # 10

Which job checks for error correction codes?

A.

IntegrityScan

B.

Collect

C.

FlexProtect

D.

MediaScan

Full Access
Question # 11

A company wants to re-use HD400 nodes into a new cluster with OneFS 8.2.0. What is the minimum number of HD400 nodes required?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 12

A user has recently left the company. After two weeks, the Dell PowerScale administrator receives a request to provide some files from the user's directory The administrator then discovers that the required files have been deleted, but a snapshot of the directory is available.

After restoring the files from the snapshot, which additional step is necessary to access the files?

A.

Restored files need to be copied from the .snapshot directory to the .restore directory

B.

Permissions of the user directory need to be changed

C.

Permissions of the restored files need to be changed

D.

Restored files need to be copied from the .restore directory to the user directory

Full Access
Question # 13

How many Active Directory provider instances can be configured per access zone?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 14

A company has an S-node F800 Dell PowerScale cluster with two Z9100 Dell Ethernet back-end switches running on OneFS 9.4.0. The company is planning to add 72 A300 nodes to the cluster.

What is the minimum number of additional switches required to support the configuration?

A.

4

B.

3

C.

6

D.

2

Full Access
Question # 15

Which access information is represented in the exhibit?

A.

Real ACL is applied and group “DEES\domain users” has read access to the file

B.

Real ACL is applied and group “DEES\sales” has read access to the file

C.

Synthetic ACL is applied and group “DEES\sales” has read access to the file

D.

Synthetic ACL is applied and user “DEES\john” has read access to the file

Full Access
Question # 16

What is the lowest level of storage pool grouping on a Dell PowerScale cluster that is user-configurable?

A.

File pool

B.

Neighborhood

C.

Node pool

D.

Disk pool

Full Access
Question # 17

What is a characteristic of FEC link aggregation mode?

A.

Balances outbound traffic across all active ports In the aggregated link

B.

Balances outgoing traffic based on hashed protocol header information that Includes source and destination addresses, and VLAN tag

C.

Balances outgoing traffic based on hashed protocol header information that includes source and destination addresses only

D.

Switches to the next interface when the primary interface becomes unavailable

Full Access
Question # 18

Which OneFS networking option enables Dell PowerScale for DNS multi-tenant functionality?

A.

Subnet

B.

Access zone

C.

Group net

D.

Pool

Full Access
Question # 19

Which is statistics subcommand is used to display the most commonly accessed flics and directories in a file system?

A.

system

B.

heat

C.

history

D.

current

Full Access
Question # 20

Which configuration option is used to create a WORM domain in the WebUI without specifying a day to release the directory?

A.

Maximum retention period

B.

Minimum retention period

C.

WORM domain requires a release day

D.

Default retention period

Full Access
Question # 21

What is the maximum supported node limit with a Dell PowerScale Gen 6 cluster running OneFS 9.4?

A.

400 nodes

B.

252 nodes

C.

144 nodes

D.

288 nodes

Full Access
Question # 22

In Dell PowerScale OneFS 8.2.0 with SmartConnect Basic, what is the maximum number of SSIPs per subnet?

A.

1

B.

6

C.

A

D.

2

Full Access
Question # 23

What is the benefit of having a smaller neighborhood?

A.

Recalls data back to the node pool following a device recovery

B.

Provides a mechanism to ensure space availability and data integrity

C.

Enables data stripes to traverse disk pools

D.

Protects against multiple disks failing simultaneously

Full Access
Question # 24

A 10-node F200 Dell PowerScale cluster Is currently 90% full. The node pool protection level Is set to *2d:1n. If the protection level is increased to +3n, what will happen?

A.

Cluster proceeds with the change and the protection level is changed when the cluster reaches 100% full

B.

Cluster does not proceed with the change until the node pool reaches 100% full

C.

Cluster does not proceed with the change until OneFS moves enough data to another node pool

D.

Cluster proceeds with the change and VHS drives are invoked to protect the data

Full Access
Question # 25

What are the two ways a FlexProtect job can start?

A.

An at or batch command and Non-event driven

B.

Administrative and Even-driven

C.

An at or batch command and Alert-driven

D.

Administrative and Alert-driven

Full Access
Question # 26

An Isilon administrator is receiving “permission denied” while accessing a file on a cluster that an end-user created through an SMB share. The end-user is unable to access the share from their UNIX server.

The end-user “mydomain.com\win_user1” as the login name to access the Microsoft Windows share and then used an LDAP account name of “ux_user1” to access the UNIX mount. The Isilon cluster is joined to the “mydomain.com” Active Directory domain. In additional, the cluster has an LDAP provider attached to it while the on-disk identity is set as “Native”.

What is a possible cause for this permission issue?

A.

Usermapping rule is not present.

B.

RFC2307 is not configured on the Active Directory.

C.

On-disk identity is set as “Native”.

D.

Fake UID generation in the cluster is disabled.

Full Access
Question # 27

An administrator is oonfigunng a 10-node Dell PowerScate cluster with A2000 nodes. They want to minimize the protection overhead and preserve the MTTDL requirements.

Which protection level is recommended?

A.

N+1n

B.

N+2n

C.

N+1d:1n

D.

N+3d:1n1d

Full Access
Question # 28

When configuring NTP on a 4-node Gen 6 cluster, how many chimer nodes are automatically configured on the cluster?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 29

For non-System zone administrators, what privilege is required to modify their zone authentication providers?

A.

ISI_PRIV_SMB

B.

ISI_PRIV_LOGIN_PAPI

C.

ISI_PRIV_C LUSTER

D.

IS1_PRIV_AUTH

Full Access
Question # 30

What is a benefit of the Isilon Data Lake solution?

A.

Block-based storage for large databases

B.

Maintains simplicity at petabyte scale

C.

Scale-up approach for petabyte scale

D.

Protects multiple shared repositories at the same level

Full Access