An Isilon customer wants to have different snapshot policies and schedules on the same directory. Why is this possible on an Isilon cluster?
A.
SnapshotIQ snaps at the directory level rather than the volume level
B.
All snapshots are scheduled through the command line interface
C.
A third-party product is used by SnapshotIQ to create different schedules and policies on a directory
D.
SnapshotIQ snaps at the volume level rather than the directory level
SnapshotIQ snaps at the directory level rather than the volume level
An Isilon customer is experiencing less than expected performance and poor space
utilization with their cluster. They are using the X400 nodes with an N+2d:1n protection
policy to host web server log data. Upon further analysis, the customer discovers that the
web servers write log files 64KiB in size. The log files are then accessed by an analytics
application for reporting purposes. What should be done to increase the write performance
of the cluster?
A.
Change the protection scheme to a mirroring policy
B.
Add S-Series storage nodes to the cluster
C.
Add A-Series Performance Accelerator nodes to the cluster
D.
Change the SSD strategy on the cluster
Add A-Series Performance Accelerator nodes to the cluster
A large manufacturing company is an existing Isilon customer with a cluster consisting of
four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file
system shows that it is 60% utilized. Home directories and file shares comprise 75% of the
existing content and the remainder is inactive deep archive. The company has 1,000
employees using Windows and Mac clients participating in a single Active Directory (AD)
forest.
During a meeting with the CIO and Director of IT you discuss the company’s recent
acquisition – an engineering firm that specializes in Computer Aided Design (CAD). The
engineering firm has 400 UNIX workstations that produce technical drawings which are
currently stored on another vendor’s SAN solution. The all UNIX environment uses NIS for
authentication and name resolution. They do not currently use DNS or LDAP. The
engineering company has an old storage system that has been experiencing problems and
the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to
eliminate all tape and recover the data onto disk.
The CIO is concerned about security of the company’s intellectual property, especially with
the rapid adoption of mobile devices and external cloud content sharing services such as
DropBox, Egnyte, and SugarSync. They would like to implement an alternative that
provides external file sharing and mobile device synchronization while maintaining security
control over the company’s data.
The Director of IT reports that users are storing non-work related content on the Isilon
cluster. They would like to limit the amount of capacity that each user can consume in their
home directory and want to ensure you provide the capability to easily visualize which
users are over their allotment.The company’s Windows users currently leverage Windows
Shadow Copy to recover files that have been accidentally deleted. The IT department
wants to ensure that Mac and incoming UNIX clients have the same functionality.
The Director of IT also mentions that users are reporting slow response times when
browsing their home directories and shared folders. They are concerned that Isilon cannot
scale to support their combined requirements.
- Exhibit -
Based on the meeting with the customer, which Isilon cluster configuration would you
recommend?
A.
4 x X400 nodes with 2 x SSD and 34 x 4TB drives1 x Additional NL400
B.
6 x X400 nodes with 36 x 4TB drives1 x Backup Accelerator
C.
4 x NL400 nodes with 36 x 4TB drives
D.
9 x S200 nodes with 2 x SSD and 22 x 900GB SAS
4 x X400 nodes with 2 x SSD and 34 x 4TB drives1 x Additional NL400
An Isilon cluster component has the following characteristics:
Spans 3 - 40 nodes
Logical grouping of drives
Automatically assigned
Intelligently distributes disks to manage performance
Which cluster component is described?
A.
Disk pool
B.
Node pool
C.
Smart pool
D.
SSD pool
Disk pool
You are asked to size a cluster for a file sharing environment. nfsstat indicates that 75% of
the requests are namespace operations (e.g., GETADDR, SETADDR). There will be 8,000
active Linux users, connecting over NFS.
Which cluster configuration would you recommend?
A.
Five X400 (66 TB) 48 GB RAM, 1.2 TB SSD, N+2:1
B.
Eight X200 (27 TB) 12 GB RAM, 600 GB SSD, N+2
C.
Eight X200 (27 TB) 48 GB RAM, 600 GB SSD, N+2:1
D.
Eight X200 (36 TB) 48 GB RAM, no SSD, N+2:1
Eight X200 (27 TB) 48 GB RAM, 600 GB SSD, N+2:1
A potential customer is considering replacing a four year old, Linux-based NFS server with
40TB of usable capacity. The existing system supports home directories, an internal
website, and a content repository for the customer's content management system. The
customer is concerned about performance of any new solution because they expect to
double workload in the content management system.
What tools can be used to collect performance data needed to size the new solution?
A.
Iostat and nfsstat
B.
Perfmon and sysstat
C.
Isi statistics and Wireshark
D.
Syslog and vmstat
Iostat and nfsstat
Which service daemon do FTP and FTPS use to transfer files to and from the cluster?
A.
ftpsd
B.
vsftpd
C.
sftpd
D.
ftpd
vsftpd
How much space is consumed by a 4 KB file when the file data is written to the Isilon cluster?
A.
4 KB
B.
8 KB
C.
16 KB
D.
32 KB
8 KB
Your customer is looking for a storage solution that will be able to store seven million 3 MB
files, which are written and seldom accessed. Read and write operations are both
completed by a web-based application, which requires 1.3 Gbps throughput. The
customer's network has not been upgraded in many years, so the network interfaces are
1Gbps.
Which cluster configuration would best meet the customer's requirements?
A.
3 NL400 nodes
B.
3 X400 nodes
C.
4 X200 nodes
D.
5 S200 nodes
5 S200 nodes
Which process is used to protect file system structures against corruption through 32-bit CRC checksums?
A.
Media Scan
B.
Isilon Data Integrity
C.
File System Journal
D.
Dynamic Sector Repair
Isilon Data Integrity
Page 12 out of 34 Pages |
Previous |