Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

D-PSC-DY-23 Questions and Answers

Question # 6

If configuration auditing is enabled, where are the audit logs stored?

A.

/ifs/.ifsvar/audit/audit.log

B.

/var/log/audit_config

C.

/ifs/.ifsvar/audit/config/log

D.

/var/log/isi_papi_d_audit.log

Full Access
Question # 7

What Is the maximum number of criteria blocks with an OR condition that can be configured in a single file pool policy?

A.

5

B.

3

C.

1

D.

2

Full Access
Question # 8

When reconciling permissions (or clients using UNIX as well as Microsoft Windows systems, what describes the scope of the permissions?

A.

Windows ACLs and POSIX bits have overlapping semantics, but neither completely reflects the other

B.

POSIX bits have semantics that are a subset of Windows ACLs. but Windows ACLs are more extensive

C.

Windows ACLs have semantics that are a subset of POSIX bits

D.

POSIX bits and Windows ACLs are semantically equivalent

Full Access
Question # 9

What is a calculated piece of data protection?

A.

Checksum

B.

Data unit

C.

Padding

D.

FEC stripe

Full Access
Question # 10

A Job Engine is running in low space mode and no jobs are in the running state. What is the OneFS8.2 behavior if the AutoBalance job is initiated?

A.

Job is started.

B.

Job is failed.

C.

Job is put into the queue.

D.

Job is not started.

Full Access
Question # 11

An Isilon administrator is receiving “permission denied” while accessing a file on a cluster that an end-user created through an SMB share. The end-user is unable to access the share from their UNIX server.

The end-user “mydomain.com\win_user1” as the login name to access the Microsoft Windows share and then used an LDAP account name of “ux_user1” to access the UNIX mount. The Isilon cluster is joined to the “mydomain.com” Active Directory domain. In additional, the cluster has an LDAP provider attached to it while the on-disk identity is set as “Native”.

What is a possible cause for this permission issue?

A.

Usermapping rule is not present.

B.

RFC2307 is not configured on the Active Directory.

C.

On-disk identity is set as “Native”.

D.

Fake UID generation in the cluster is disabled.

Full Access
Question # 12

A company wants to re-use HD400 nodes into a new cluster with OneFS 8.2.0. What is the minimum number of HD400 nodes required?

A.

3

B.

4

C.

5

D.

6

Full Access
Question # 13

What is the recommended number of delegations for a SmartConnect zone name for each SmarConnect zone alias on a cluster?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 14

When configuring NTP on a 16-node Gen 6 cluster, how many chimer nodes are automatically configured on the duster?

A.

3

B.

6

C.

1

D.

16

Full Access
Question # 15

In a Dell PowerScale environment, what is a requirement to join multiple, untrusted Active Directory (AD) authentication sources to an access zone?

A.

All untrusted AD provider instances must exist in all access zones

B.

Only one of the AD provider instances can exist in a zone at one time

C.

A common /'ifs tree is required for all access zones

D.

Must only join Active Directory domains in the same forest

Full Access
Question # 16

A Dell PowerScale cluster has (our H500 nodes. Data protection Is set to N+ 1 and access is set to random.

How many drives will be used across the disk pool to protect a 1 MB file?

A.

10

B.

8

C.

11

D.

4

Full Access
Question # 17

Which access layer evaluates file and directory permissions?

A.

Protocol Layer

B.

Authentication Layer

C.

Authorization Layer

D.

Identity Assignment Layer

Full Access
Question # 18

What is a benefit of the Isilon Data Lake solution?

A.

Block-based storage for large databases

B.

Maintains simplicity at petabyte scale

C.

Scale-up approach for petabyte scale

D.

Protects multiple shared repositories at the same level

Full Access
Question # 19

An administrator wants to enable quotas on a group directory in their Dell PowerScale cluster. In addition, they want to monitor and limit the disk usage.

Which type of quotas need to be configured?

A.

Enforcement

B.

Advisory

C.

Accounting

D.

Soft

Full Access
Question # 20

Which is statistics subcommand is used to display the most commonly accessed flics and directories in a file system?

A.

system

B.

heat

C.

history

D.

current

Full Access
Question # 21

Based on the exhibit, what is the actual protection level of the FEATURE.wmv file?

A.

N+1

B.

N+2

C.

N+2n

D.

N+2d: 1n

Full Access
Question # 22

In Isilon OneFS, what is a characteristic of CoW with snapshots?

A.

Used for small changes, inodes, and directories.

B.

Avoids the double write penalty.

C.

Increases file fragmentation.

D.

Used for more substantial changes such as deletes.

Full Access
Question # 23

What Is a use case for running HealthCheck on a Dell PowerScale cluster running OneFS 9.0?

A.

Provide analytics on cluster capacity and performance.

B.

Provide performance metrics for the cluster

C.

Provide alerts to potential issues in the cluster

D.

Automatically detect and resolve potential cluster issues

Full Access
Question # 24

What is the maximum supported node limit with a Dell PowerScale Gen 6 cluster running OneFS 9.4?

A.

400 nodes

B.

252 nodes

C.

144 nodes

D.

288 nodes

Full Access
Question # 25

What is the minimum storage space needed on a datastore to hold InsightIQ?

A.

50 GB

B.

65 GB

C.

70 GB

D.

85 GB

Full Access
Question # 26

An Isilon administrator has four H600 nodes and eight A2000 nodes in the cluster. The file pool policy is configured to have all new data written to the H600 nodes. After a few weeks, the administrator has some concerns about the available capacity on the H600 nodes.

Which feature should be configured to accept writes, even after the H600 nodes become full?

A.

SmartPools

B.

GNA

C.

Virtual Hot Spare

D.

Spillover

Full Access
Question # 27

Which data access pattern makes the prefetch caching algorithm to be highly aggressive?

A.

Random

B.

Parallel

C.

Concurrency

D.

Streaming

Full Access
Question # 28

Which job checks for error correction codes?

A.

IntegrityScan

B.

Collect

C.

FlexProtect

D.

MediaScan

Full Access
Question # 29

What is the default HTTP port used when configuring an S3 object?

A.

9020

B.

3124

C.

8080

D.

9021

Full Access
Question # 30

Which access information is represented in the exhibit?

A.

Real ACL is applied and group “DEES\domain users” has read access to the file

B.

Real ACL is applied and group “DEES\sales” has read access to the file

C.

Synthetic ACL is applied and group “DEES\sales” has read access to the file

D.

Synthetic ACL is applied and user “DEES\john” has read access to the file

Full Access