An IT team is implemented a disaster recovery solution. A Dell EMC Isilon cluster will replicate production data from the existing primary cluster to a planned secondary cluster. The primary cluster is licensed for SmartLock Enterprise. A SmartLock enterprise type directory on the primary cluster is planned for SyncIQ replication to the secondary cluster.
When consulting with the IT team. What is a key consideration when replacing the data in a SyncIQ source directory configured with SmartLock Enterprise mode?
Correct Answer:
D
A company plans to deploy N+2d:1n protection on a 7 node Dell EMC Isilon cluster. How much capacity will be used to store a 1536 KB file?
Correct Answer:
D
A company uses a Dell EMC lsilon cluster to store greater than one billion files. The company often restores files from NDMP backups. When backup technology is recommended for the environment?
Correct Answer:
C
A company has three Doll EMC Isilon X200 nodes and needs to configure two Subnets on the cluster. The productionsubnet willonlyme a 10 GgE-1 port from each subnet will use both ext-1and exl-2 ports on each node.The company will access each subnet with its SmartConnectzone name
Given that the second subnet is isolated with no route to the DNS server, how many IP addresses are needed for each subnet lo accommodate the requirements?
Correct Answer:
D
SPECIAL INSTRUCTIONS
The remaining Part1 questions are associated with four case studies that describe various environments or settings. Each case study appears on its own display screen. Questions for each case study will appear on separate display screens.
When displaying a question, you can easily review the related case study by clicking on the “Review Case Study” icon shown below:
Case Study 5– Refer to the Exhibit.
Backing up data from a Dell EMC Isilon cluster exceeds the company’s backup window. Because the company has a large amount of data with a continuous high growth rate, they want to change their backup strategy. The Gen 6 Isilon cluster consists of 24 nodes. Their current backup strategy is an NDMP three-way backup performing weekly full backups to tape and incremental backups each night. The strategy uses Dell EMC NetWorker. The DMA uses Include paths to specify what data to backup. All data on the cluster must remain accessible.
The company’s IT team is now looking for a method to increase the performance of their backups. After some investigations, you notice that the backup job quiesces the file system. This is creating lock contention issues on open files and not allowing users full access to data when the backup job runs.
What advice should be provided to the team to eliminate lock contention and allow full access to users?
Correct Answer:
A