A potential customer has about 540TB of NetApp running in ONTAP 7-Mode. They are
willing to let you gather some workload data. They have LDAP and Active Directory
authentication and primarily Windows Clients. They are very interested in Automated
Tiering and Large Scale Archives. They are not certain about the workflows from the
Marketing Department. The Content Team will only say they need to acquire 300 TB within
90 days. They do not know the average file size or the number of aggregates they are
managing.
Which tools would you use to gather information to do your Isilon sizing?
A.
MiTrend WPA, Autosupport, and PerfCollect
B.
isi status, isi_netlogger, and PerfMon
C.
Wireshark, isi statistics, and iostat
D.
Isilon Insight IQ, OnCommand Insight, and nfsstat
MiTrend WPA, Autosupport, and PerfCollect
Refer to the exhibit
You are analyzing a customer's existing Isilon environment using InsightIQ in order to
expand the cluster. When examining the protocol data, you see the output as shown.
What does the data tell you about the workload?
A.
It is mostly sequential reads
B.
It uses large read requests
C.
It is metadata intensive
D.
It contains mostly random writes
It is metadata intensive
A customer wants to perform complete failover and failback testing on their production
SyncIQ policies. What
are the first two recommended steps to ensure a successful test?
A.
Quisce writes to source
Perform final sync
B.
Allow writes to source
Perform final sync
C.
Allow writes to source
Immediately failover and failback
D.
Quiesce writes to source
Immediately failover and failback
Allow writes to source
Perform final sync
What determines the number of job engine workers assigned to a task?
A.
Job task
B.
Job priority
C.
Job impact policy
D.
Job phase
Job phase
How are files smaller than 128 KB protected?
A.
3x mirrored
B.
N+3d:1n
C.
N+2d:1n
D.
2x mirrored
3x mirrored
Match each tool with the task for which the tool is used.
A large manufacturing company is an existing Isilon customer with a cluster consisting of
four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file
system shows that it is 60% utilized. Home directories and file shares comprise 75% of the
existing content and the remainder is inactive deep archive. The company has 1,000
employees using Windows and Mac clients participating in a single Active Directory (AD)
forest.
During a meeting with the CIO and Director of IT you discuss the company’s recent
acquisition – an engineering firm that specializes in Computer Aided Design (CAD). The
engineering firm has 400 UNIX workstations that produce technical drawings which are
currently stored on another vendor’s SAN solution. The all UNIX environment uses NIS for
authentication and name resolution. They do not currently use DNS or LDAP. The
engineering company has an old storage system that has been experiencing problems and
the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to
eliminate all tape and recover the data onto disk.
The CIO is concerned about security of the company’s intellectual property, especially with
the rapid adoption of mobile devices and external cloud content sharing services such as
DropBox, Egnyte, and SugarSync. They would like to implement an alternative that
provides external file sharing and mobile device synchronization while maintaining security
control over the company’s data.
The Director of IT reports that users are storing non-work related content on the Isilon
cluster. They would like to limit the amount of capacity that each user can consume in their
home directory and want to ensure you provide the capability to easily visualize which
users are over their allotment.The company’s Windows users currently leverage Windows
Shadow Copy to recover files that have been accidentally deleted. The IT department
wants to ensure that Mac and incoming UNIX clients have the same functionality.
The Director of IT also mentions that users are reporting slow response times when
browsing their home directories and shared folders. They are concerned that Isilon cannot
scale to support their combined requirements.
Which configuration changes would you recommend for the Engineering users?
A.
Direct all clients to use the Manufacturing DNS server and connect NFS mounts to the
FQDN of the Isilon cluster.
B.
Mount an NFS share to a node on the Isilon cluster, being careful to equally distribute the load across nodes.
C.
Utilize SMB2.1 protocol and mount to the Isilon cluster using the Name Server (NS) record IP.
D.
Create an FQDN for the Isilon cluster in the LMHOSTS file for each engineering system.
Direct all clients to use the Manufacturing DNS server and connect NFS mounts to the
FQDN of the Isilon cluster.
Your customer is looking for a storage solution that will be able to store seven million 3 MB
files which are written and seldom accessed. Read and write operations are both
completed by a web-based application, which requires 1.3 Gbps throughput. The
customer's network has not been upgraded in many years, so the network interfaces are 1
Gbps.
What would be the best solution for this network configuration?
A.
Use LACP to aggregate the network ports on each node.
B.
Use jumbo frames to compensate for the 1GB Core network.
C.
Aggregate Infiniband (IB) ports across all nodes.
D.
Bond EXT-0 across all nodes.
Use LACP to aggregate the network ports on each node.
What is the sector size of an Isilon 8 TB drive?
A.
512 bytes
B.
1024 bytes
C.
2048 bytes
D.
4096 bytes
512 bytes
Which Isilon OneFS job, that runs manually, is responsible for examining the entire file system for inconsistencies?
A.
IntegrityScan
B.
MediaScan
C.
AutoBalance
D.
FlexProtect
IntegrityScan
Page 4 out of 34 Pages |
Previous |