Uploaded by bryonglasow

Dell PowerScale Design 2023 D-PSC-DS-23 PDF Dumps

advertisement
D-PSC-DS-23
Dell PowerScale Design
2023 Exam
https://www.certspots.com/exam/d-psc-ds-23/
Dell PowerScale Design D-PSC-DS-23 Dumps
1. What are characteristics of the streaming data access pattern on a
PowerScale Gen6 cluster?
A. Single stream workflows, very aggressive prefetching
B. Clients accessing the same data, aggressive prefetching
C. Multiple stream workflows, no prefetching
D. Clients accessing the same data, moderate prefetching
Answer: A
Dell PowerScale Design D-PSC-DS-23 Dumps
2. What are two output options from the PowerScale cluster events
log? (Select 2)
A. Hardware Issues
B. OneFS Issues
C. SMTP Email
D. Logs
Answer: CD
Dell PowerScale Design D-PSC-DS-23 Dumps
3. A customer is implementing a new backup strategy for their two
PowerScale clusters. The clusters are in a DR configuration. The customer
uses SyncIQ to replicate data from the primary cluster to the DR cluster.
They use CloudPools to tier archival data to a public cloud provider from
both clusters. The public cloud provider guarantees a backup of all data that
is stored in their cloud.
Which NDMP backup option should be applied to their primary cluster to
avoid backing up data that is tiered to their cloud provider?
A. NDMP Redirector
B. DeepCopy
C. ComboCopy
D. ShallowCopy
Answer: D
Dell PowerScale Design D-PSC-DS-23 Dumps
4. How is data spread across multiple nodes as during a write on a
PowerScale cluster?
A. Protection policy
B. Storage pool
C. FEC stripe unit
D. Protection group
Answer: D
Dell PowerScale Design D-PSC-DS-23 Dumps
5. A PowerScale cluster is configured with SmartConnect zones using
dynamic IP address allocation. Failback is enabled.
If there is a node failure, what happens to the IP address?
A. IP address is no longer used, and a new connection must be made.
B. IP address is moved to a new node, but the connection does not
continue.
C. IP address is moved to a new node, and the connection continues.
D. The client must re-establish the connection to the node.
Answer: C
Dell PowerScale Design D-PSC-DS-23 Dumps
6. Which feature will provide data immutability without the ability
for the administrator to delete the files under any condition?
A. Access Control Entries
B. Role-based Access Controls
C. Enterprise SmartLock
D. Compliance SmartLock
Answer: D
Dell PowerScale Design D-PSC-DS-23 Dumps
7. If snapshots are configured for the InsightIQ datastore on Isilon
and the datastore is reverted to a previous snapshot, what might be
the result?
A. InsightIQ datastore cannot be reverted
B. InsightIQ database will have to be manually copied from the
snapshot
C. InsightIQ datastore could be corrupted
D. InsightIQ will not recognize the older copy of the database
Answer: C
Dell PowerScale Design D-PSC-DS-23 Dumps
8. A customer plans to migrate data to a remote Isilon cluster.
What is a consideration when configuring a cluster with SyncIQ and hard
SmartQuotas?
A. SyncIQ ignores quota limits during replication but if a quota is over limit,
quotas will still allow users to add data to the directory.
B. Quotas should be configured on both SyncIQ source and target
directories prior to a migration.
C. SyncIQ will replicate source quota configurations to the target.
D. Quotas should be set only on source directories and never on target
directories for migrations.
Answer: A
Dell PowerScale Design D-PSC-DS-23 Dumps
9. A PowerScale cluster has two ports that are configured per node.
Each port is on a different VLAN. Although incoming traffic is evenly
distributed, transmitted data from PowerScale uses one port more
than the other port.
What could be the cause of this imbalance?
A. Static routes are configured on the less-used port.
B. A default gateway was not configured on both ports.
C. Source-Based Routing is not enabled on the cluster.
D. Priority of the gateway in the less-used port set too low.
Answer: C
Dell PowerScale Design D-PSC-DS-23 Dumps
10. A customer has a cluster running with a single access zone and
serves multiple internal departments. The clients access the cluster
over both SMB and NFS protocols. A department user has been
assigned the task of auditing SMB activity and enforcing appropriate
quotas for certain users.
How should the cluster administrator grant this access?
A. Create a secondary root account credential
B. Create a custom RBAC role
C. Provide the AuditAdmin RBAC role
D. Provide the SecurityAdmin RBAC role
Answer: A
Download