What does ECS S3 authentication with signature version 2 use to sign requests?
A. Access key ID
B. Secret key
C. Credential scope
D. Namespace name
A company is integrating Dell EMC Isilon CloudPools with the ECS and would like to enable CloudPools for disaster recovery failover. Which deep copy option should be used?
A. Allow
B. Force
C. Stub sync
D. Deny
A storage administrator is trying to create a new bucket using s3curl.pl. They use a URL, pointing to their load balancer. The SSL connection is terminated on the load balancer. What port number should be used all the command line?
A. 9020
B. 9021
C. 9023
D. 9025
Which configuration task is optional in ECS when enabling Dell EMC Isilon CloudPools and ECS integration?
A. Generate a S3 secret key to add to the CloudPools configuration
B. Install the CloudPools license in ECS
C. Create a dedicated storage pool CloudPools storage
D. Create an object user account for CloudPools access
You are creating a VDC during the ECS configuration process. You get the following error.
Error 7000 (http: 500): An error occurred in the API Service
You check the system and this is what you see:
Storage Pool status: Ready
Nodes: Ready to use Licenses: OK What can be causing this error?
A. You have not created the system storage pool
B. You did not want 10 to 15 minutes after creating the storage pool
C. The VDC access key was typed incorrectly
D. The endpoints were not supplied as a comma-separated list
A newly configured ECS system contains 8 nodes. How many fragments will each ECS node contain when a data chunk is broken up by erasure coding?
A. 2
B. 4
C. 8
D. 16
When planning for a multi-site ECS installation, what is the maximum network latency between sites?
A. 100 ms
B. 500 ms
C. 1,000 ms
D. 5,000 ms
What is a characteristic of ECS?
A. Cannot be federated to protect data across multiple sites
B. Cannot be run on-Dell EMC hardware for custom solutions using existing resources
C. Provides offline object access for mobile, desktop, and enterprise applications
D. Provides simultaneous access to data via several standard industry protocols
What is a feature of D@RE?
A. Key management is controlled manually
B. Encryption can occur at namespace level only
C. Offers low-touch server-side encryption
D. Encryption can occur at bucket level only
Which switch is used to daisy-chain three or fewer ECS racks?
A. Customer supplied
B. Rabbit
C. Hare
D. Turtle