Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

E20-555 Exam Dumps - Isilon Solutions and Design Specialist Exam for Technology Architects

Go to page:
Question # 41

An Isilon customer has two 5-node clusters; one for production and one for disaster recovery (DR). The customer's workflows are replicated to the DR cluster through SyncIQ on individual schedules. They shut down their production cluster for a scheduled DR test, failed over to the DR cluster, and continue their DR testing.

Assume both clusters have identical shares, exports, and user authentication. Additionally, assume the client applications have been stopped and the DNS re-pointed. Which SyncIQ Policy method should be used to continue production operations?

A.

Revert

B.

Initiate Manual Failback

C.

Initiate Automated Failback

D.

No change is needed

Full Access
Question # 42

When designing Isilon solutions, what issues should you pay special attention to?

A.

Avoid being too enthusiastic over the technologyBalancing technical and business requirementsProvide OptionsDesign to meet customer expectations

B.

Workflow DocumentSolutions DocumentApplication typesData strategy

C.

Solutions DocumentBalancing technical and business requirementsProviding many optionsPractical vs. theoretical implementations

D.

Solutions DocumentBalancing technical and business requirementsDownstream hand-offDesign to meet customer expectations

Full Access
Question # 43

What is a consideration when designing access zones?

A.

Authentication providers are restricted to one specific zone

B.

UID/GID ranges should not overlap for providers in the same zone

C.

Access zones cannot overlap the same directories

D.

Share names must be unique between different access zones

Full Access
Question # 44

In an Isilon environment, how is InsightIQ installed?

A.

Deployed as a virtual appliance

B.

Installed on a FreeBSD server

C.

Deployed on a Windows 64-bit server

D.

Installed on an Isilon cluster

Full Access
Question # 45

What are attributes of SFTP?

A.

Uses FTP protocol

Uses port 22

Requires client software

B.

Uses FTP protocol

Uses port 990

Requires client software

C.

Does not use FTP protocol

Uses port 990

Does not require client software

D.

Does not use FTP protocol

Uses port 22

Requires client software

Full Access
Question # 46

When working with Isilon file pool policies, which file attribute can be applied as a filter?

A.

Performance

B.

File create date

C.

File type

D.

Permissions

Full Access
Question # 47

-- Exhibit --

A European Sports TV network is considering Isilon for their Media Edit Storage for their editing workloads. They are also considering Isilon for near-line media archiving.

The network receives XDCAM HD footage which is loaded onto their existing Transcoding Storage platform. New footage that needs to be edited will be transferred from their Transcoding Storage platform to the proposed Media Edit Storage platform at the rate of ten simultaneous XDCAM HD files via FTP. Edited files will be transferred back to the Transcoding Storage platform at the rate of ten simultaneous XDCAM HD files via FTP.

The network currently has 15 Final Cut Pro edit stations, 15 Avid edit stations. Proxy software will be used to allow Isilon to act as the storage for the Final Cut Pro and Avid media. Three of those edit stations will be performing content compositing as needed.

The network expects 70 hours of new content per week, and 50 hours of edited content per week. They intend to keep the new and edited content on the proposed Media Edit Storage as a performance tier for 30 days. They would like to retain all new and edited footage proposed Media Edit Storage as a near-line tier for two years.

In addition to the current workloads, the network expects to implement a new Media Asset Management (MAM) solution and has requested the Isilon cluster be capable of supporting 120 MBps read and 120 MBps write to support the MAM requirements.

-- Exhibit –

The customer wants to be able to put completed content into a non-editable folder. However, they want to give access to an administrator to delete content if required. What do you recommend to the customer?

A.

SmartLock using Enterprise mode

B.

SmartLock using Compliance mode

C.

WORM using Compliance mode

D.

SyncIQ with read-only mode

Full Access
Question # 48

An Isilon customer is experiencing less than expected performance and poor space utilization with their cluster. They are using the X400 nodes with an N+2d:1n protection policy to host web server log data. Upon further analysis, the customer discovers that the web servers write log files 64KiB in size. The log files are then accessed by an analytics application for reporting purposes. What should be done to increase the write performance of the cluster?

A.

Change the protection scheme to a mirroring policy

B.

Add S-Series storage nodes to the cluster

C.

Add A-Series Performance Accelerator nodes to the cluster

D.

Change the SSD strategy on the cluster

Full Access
Go to page: