E20-393 Dumps

E20-393 Free Practice Test

EMC E20-393: Unity Solutions Specialist Exam for Implementation Engineers

QUESTION 66

An administrator initially created a Thin Provisioned file system on Dell EMC Unity. They now want to change that file system (FS) to Thick Provisioned.
What is a consideration?

Correct Answer: B

QUESTION 67

Which Unity feature provides a high bandwidth connection for large file transfers, enables proactive Service Request generation and usage license reporting, and operates on a 24x7 basis?

Correct Answer: D
Benefit from secure, high-speed, 24x7 predictive monitoring and remote repair for your EMC information infrastructure. EMC Secure Remote Services (ESRS) enables EMC Customer Service to identify and proactively resolve potential issues before they can impact your business.

QUESTION 68

Which FAST Cache operation can be performed from the Settings window?

Correct Answer: A

QUESTION 69

For high availability within iSCSI, connections should be attached using what?

Correct Answer: A

QUESTION 70

How is encryption set for a Unity storage system?

Correct Answer: D
D@RE is included by default on Unity arrays and included in the Unity license file unless otherwise requested during ordering. Therefore, all that is needed to activate D@RE is to install the D@RE enabled license file. The license installation process is not specific to D@RE, and is required to be performed before using the array. When logging into Unisphere for the first time, license installation appears as a step of the Unisphere Configuration Wizard, prompting the administrator to install the license file obtained from EMC. If this license file includes D@RE functionality, D@RE will be enabled once the license file is installed successfully
Note: Unity storage systems address sensitive data concerns through controller-based Data at Rest Encryption
(D@RE), which encrypts stored data as it is written to disk.
D@RE is a license controlled feature available by default on Unity storage systems, and, being designed to be largely invisible to administrative end users, requires almost no effort to enable or manage. Enabling the feature or backing up the encryption keys externally takes just seconds, and redundant keystore backups stored on array ensure that user data is always as available as it is secure.