Big Cyber Monday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the EMC Storage Administrator D-PSC-DY-23 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

A Dell PowerScale administrator wants to create a new SMB share on an existing directory structure. The directory contains migrated production data and has an active NFS export What will happen if the administrator selects the Apply Windows default ACLs option during creation?

Options:

A.

Existing mode bit rights are overwritten by the Windows default ACLs


B.

Creation of the SMB share fails due to the existing mode bit rights


C.

Windows default ACLs are merged with the existing mode bit rights


D.

Windows default ACLs are overwritten by the existing mode bit rights


Expert Solution
Questions # 22:

What is a benefit of the Isilon Data Lake solution?

Options:

A.

Block-based storage for large databases


B.

Maintains simplicity at petabyte scale


C.

Scale-up approach for petabyte scale


D.

Protects multiple shared repositories at the same level


Expert Solution
Questions # 23:

When manipulating a job, which task can an Isilon administrator perform?

Options:

A.

Change impact policies.


B.

Update schedules.


C.

Pause a job manually


D.

Create a custom impact level


Expert Solution
Questions # 24:

A company plans to build two Isilon clusters in an active-active disaster recovery environment. The initial requirement is to have one access zone for their Finance department. Which recommended directory structure meets the requirement?

Options:

A.

Cluster_A:/ifs/cluster_a/finance/ifs/cluster_b/financeCluster_B:/ifs/cluster_a/finance/ifs/cluster_b/finance


B.

Cluster_A:/ifs/finance/ifs/financeCluster_B:/ifs/finance/ifs/finance


C.

Cluster_A:/ifs/finance/cluster_a/ifs/finance/cluster_bCluster_B:/ifs/finance/cluster_a/ifs/finance/cluster_b


D.

Cluster_A:/ifs/cluster_a/ifs/cluster_bCluster_B:/ifs/cluster_a/ifs/cluster_b


Expert Solution
Questions # 25:

What is the recommended networking design approach when planning subnets?

Options:

A.

Use a common subnet for data, replication and backup, and use a dedicated subnet for management.Assign the lowest priority gateway number for the management subnet.


B.

Use a common subnet for management, data, replication and backup.Assign a random priority gateway number for the subnet.


C.

Use a common subnet for data and management and a common subnet for replication and backup.Assign the lowest priority gateway number for the management subnet.


D.

Use dedicated subnets for management, data, replication and backup.Assign the lowest priority gateway number for the data subnet.


Expert Solution
Questions # 26:

Which is statistics subcommand is used to display the most commonly accessed flics and directories in a file system?

Options:

A.

system


B.

heat


C.

history


D.

current


Expert Solution
Questions # 27:

An Isilon administrator wants to enable quota notifications for their LDAP users. However, the users’ email IDs are not updated in the LDAP environment. What additional configuration needs to be performed?

Options:

A.

Configured the file provider


B.

Manage local users and groups


C.

Configure the local provider


D.

Configure a mapping rule


Expert Solution
Questions # 28:

An NFS export is created on a Dell PowerScale cluster. No clients are listed in the export rules What is the result of this condition?

Options:

A.

No clients on the network can access the export


B.

Clients can access the export with read-only permissions


C.

All clients on the network can access the export


D.

Clients that access the export are mapped as root


Expert Solution
Questions # 29:

When reconciling permissions (or clients using UNIX as well as Microsoft Windows systems, what describes the scope of the permissions?

Options:

A.

Windows ACLs and POSIX bits have overlapping semantics, but neither completely reflects the other


B.

POSIX bits have semantics that are a subset of Windows ACLs. but Windows ACLs are more extensive


C.

Windows ACLs have semantics that are a subset of POSIX bits


D.

POSIX bits and Windows ACLs are semantically equivalent


Expert Solution
Questions # 30:

Which data access pattern makes the prefetch caching algorithm to be highly aggressive?

Options:

A.

Random


B.

Parallel


C.

Concurrency


D.

Streaming


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions