E20-655 - Isilon Specialist Exam for Platform Engineers
Go back to EMC
How many simultaneous operations can an eight disk RAID 5 set perform?
8 reads or 4 writes
A finance department wants to secure its data while this data traverses over the FC SAN. Currently the SAN is also used by other departments in the organization. Which implementation would you recommend to isolate the traffic from finance department?
The queued writes on the source side exceed the size of the dedicated log file. Which remote replication technology requires a full resynchronization between source and target in this situation?
LVM based remote replication
What is a key management task that applies to all data center elements?
Which data access pattern is most influenced by slow seek times?
Random, small writes
What attribute other than individual identity or group membership can be used to restrict access in the context of information security?
Why do array based local replication technologies track changes made to source and target devices after the creation of a replica?
For faster re-synchronization
A customer wants 24x7 availability for a business application that uses a file system. Which operation ensures a consistent replica of the file system?
Quiesce and flush the file system buffers before creation of the replica
What is the sequence of steps in a business continuity planning process? 1. Perform disk analysis 2. Collect data on various business processes 3. Test, train and maintain 4. Develop a disaster recovery plan
A customer wants 24x7 availability for their business application that uses a database. What is performed to ensure a consistent replica of the database?
Hold I/OSto the source devices just before the creation of the replica
Which remote replication solution has the lowest bandwidth requirement?
Log shipping over IP networks
In a Fibre Channel SAN, which protocol implementation is used?
SCSI over FC
Which cache algorithm will optimize storage array's I/O response time if sequential access is detected?
How does asynchronous remote replication improve application performance compared to synchronous remote replication?
Writes are acknowledged immediately by the source array
Which protection strategy can be applied to the security zone containing switches and routers?
Using E_port authentication
What is the name of EMC CLARiiON operating environment?
What aspect of information security must be provided so that authentication can be performed?
Which host component is the high speed interconnects between the Central Processing Unit and memory?
Which topology increases connectivity within the SAN while conserving overall port utilization?
Which data access pattern will have its performance affected most by slow seek times?
Random, small writes
By spoofing the identity of a remote storage site, which two security objectives can be violated?
Confidentiality and integrity
Which three subject areas taken together define storage security?
Information security, networking, and storage
What is host memory?
Temporary location for commands and data
You have a backup and recovery solution in your environment. Several tapes are available. You want to use different tapes for each set of backup clients. Which backup component do you configure?
What is an operating system for EMC Celerra Control Station?
Which statement best defines DAS?
Internally deployed block level access storage
You have a SAN environment and want to introduce NAS functionality. Which NAS solution is most appropriate?
Gateway NAS system solution
What is the maximum payload in a fibre channel frame?
If a disk drive's rotational speed is 100 revolutions per minute, what is its average rotational latency?
What is the correct order of operations for array-based synchronous replication? 1) Write is received by the source array from host/server 2) Remote array sends acknowledgement to the source array 3) Source array signals write complete to host/server 4) Write is transmitted by source array to the remote array
4, 3, 2, 1
What describes a feature of external DAS?
Device management provided by the array
What is a requirement for a client initiated restore?
Backup catalog must be available
For which remote replication technology is host involvement an absolute requirement?
Logical volume manager mirroring
What do you monitor as part of a SAN health check?
Port status change
In a fabric environment, what does a Domain ID identify?
During DR planning in a two data center setup you determine that: The remote site B will hold a copy of data that is 5 minutes behind the production data at site A It will take two hours after an outage at site A to decide to shift production to site B An additional 3 hours will be needed to power up the servers, bring up the network and redirect users so site B can become productive What is the Recover Point Objective (RPO) of this plan?
What is true about parity-based RAID?
Parity is updated each time a write is performed
What does a cache dirty bit flag?
Changed data not yet written to disk
Which iSCSI name requires an organization to own a registered domain name?
A WAN link transports your data between a primary data center and a remote location. To ensure data confidentiality, which EMC solution is most appropriate?
CipherOptics SG appliances
What channel is valid for connecting storage arrays directly to IP networks for remote replication?
A business wants to backup 1 GB of data containing 100 files and another 1 GB of data containing 10,000 files. Which would take more time?
Backing up 10,000 files
Which task is an example of monitoring the utilization of a data center object?
Viewing a list of file systems that are nearly full
Data is being replicated from site A to site B using disk buffering to create extended distance consistent point in time copies every hour. In the event of a site failure at A, what is the maximum amount of data that will be missing at site B?
Which feature assures that the stored content has not been altered in the CAS system?
What process minimizes the exposure to loss of uncommitted cached data when there is a power failure?
A customer complains about frequent traffic disruptions to their SAN. After analysis, it was found that the R&D group was creating this extra traffic while testing new products. What would you suggest that this customer implement?
What is the requirement for native iSCSI implementation?
Host with ToE card and array with iSCSI port
Which component in an EMC Symmetrix Array provides physical connectivity to hosts?
A pointer based replica has been created and is being used for decision support. When is data copied from the source to the save location?
First write to a location on the target