How does an Isilon cluster running OneFS 6.5 enable file level access to Windows clients? (Choose 1)
A. Using SMB only
B. Using CIFS and SMB
C. Using CIFS and Samba
D. Using CIFS only
You just licensed SnapShotIQ on a customer's OneFS v6.5 cluster. Which of the following statements is true? (Choose 1)
A. You can now select COW or PIT snapshot use, as needed.
B. You can now replicate data using SyncIQ from a snapshot.
C. Your snapshot files are now read/write.
D. You now implement Volume Shadow Copy Service for clients.
What is the largest size of LUN that is usable by a Windows client when using Isilon iSCSI? (Choose 1)
A. 16 TB
B. 32 TB
C. 64 TB
D. 128 TB
Which of the following is true about support for IPv6 addresses on an Isilon cluster? (Choose 1)
A. IP version 6 addresses are not supported on an Isilon cluster.
B. IPv6 addresses are not supported on the internal internode network
C. IPv6 addresses are not supported on the external network used for cluster clients.
D. There are no restrictions on using IPv6 addresses
Why would you configure an expiration policy for snapshots? (Choose 1)
A. To automatically delete snapshots
B. To manually delete snapshots
C. To configure reminders for snapshot deletions
D. Snapshots do not have expiration policies
What types of data stores are supported for virtualization on an Isilon cluster? (Choose 2)
A. VMFS
B. iSCSI
C. NFS
D. SMB
What methods can be utilized to discover critical events on the cluster? (Choose 3.)
A. isi status
B. isi status list
C. isi events
D. The Cluster Status page that you open by selecting Status from the Cluster Status menu in the web administration interface.
Which of the following is true about SmartConect Basic? (Choose 1)
A. You can define one subnet per cluster and one pool per subnet.
B. You can define one subnet per cluster and multiple pools per subnet.
C. You can define multiple subnets per cluster and one pool per subnet.
D. You can define multiple subnets per cluster and multiple pools per subnet.
How are effective permissions calculated for Windows clients? (Choose 1)
A. Both share and UNIX permissions are calculated and the most restrictive permission between the two is the effective permission.
B. Both share and UNIX permissions are calculated and the least restrictive permission between the two is the effective permission.
C. Both share permissions and Windows ACLs are calculated and the most restrictive permission between the two is the effective permission.
D. Both share permissions and Windows ACLs are calculated and the least restrictive permission between the two is the effective permission.
In an N+M protection level, increasing the cluster protection level also increases what? (Choose 2.)
A. The number of clients that can connect to the cluster.
B. The amount of space consumed by parity or error correction code increases.
C. The number of drives or nodes or both nodes and drives that can fail.
D. The number of nodes needed for quorum is increased by one.