You are implementing a Celerra CIFS solution in a mixed NFS and CIFS user environment. Local passwd and group files are placed on the Data Movers, which are also configured for LDAP.
Which search order is used for user mapping?
A. Secmap, then local passwd and group files
B. LDAP, then local passwd and group files
C. Local passwd and group files, then LDAP
D. Secmap, then Usermapper
A CIFS user has previously accessed a Data Mover with a secondary Usermapper service, and performs a subsequent access to the same Data Mover. Which describes the mapping operation for this user?
A. The secmap cache on the Data Mover being accessed provides the user mapping.
B. The secondary Usermapper service provides the user mapping from its database.
C. The secondary Usermapper queries the primary Usermapper service, which in turn provides the user mapping from its database.
D. The secmap cache on the Data Mover with the primary Usermapper service provides the user mapping.
You want to create a CIFS server within a VDM loaded on server_2. The action fails. What is the reason?
A. An existing CIFS server on the physical DM is already consuming all unused interfaces.
B. There is no file system mounted on the VDM running on the physical Data Mover.
C. The CIFS service is not started.
D. The VDM is in a loaded state.
Under what condition should you start and stop the CIFS service?
A. You modified an interface on the default CIFS server and you modified an interface on the Data Mover.
B. You moved a VDM from one Data Mover to another and have not rebooted the physical Data Mover.
C. You created a VDM on a physical Data Mover.
D. You deleted a VDM on a physical Data Mover.
You configured a new CIFS server on a Celerra and provided the computer name, the DNS domain and an IP address. You want to verify the domain join in the Active Directory.
In which Directory hierarchy will you find the new CIFS server?
A. EMC Celerra container, Computers sub-container
B. Computers container, EMC Celerra sub-container
C. System container, EMC Celerra sub-container
D. ForeignSecurityPrincipals container, EMC Celerra sub-container
A storage administrator is considering implementing an iSCSI solution. What is one reason to justify the decision?
A. A native iSCSI solution will use existing SAN Fibre Channel switches
B. An iSCSI solution will provide higher performance compared to a regular SAN solution
C. iSCSI is more secure than a SAN solution
D. iSCSI offers a solution for consolidating servers using the existing network infrastructure
What is the minimum number of Data Movers needed to configure Data Mover for high availability?
A. 1
B. 2
C. 4
D. 8
Which statement describes the Fibre Channel connections of an NS unified model blade to back-end storage?
A. The blade is directly connected to CLARiiON back-end storage
B. The blade is SAN attached via switched fabric to CLARiiON storage
C. The blade is directly connected to Symmetrix back-end storage
D. The blade is SAN attached via switched fabric to Symmetrix storage
Which failover policy will allow a Primary Data Mover to shut down without causing a Standby to take over?
A. Passive
B. Manual
C. Offline
D. Auto
Which iSCSI objects require secret passwords for two-way CHAP authentication?
A. Agent and protocol server
B. Client and target
C. Target and initiator
D. Target and source
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-361 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.