-- Exhibit -A large manufacturing company is an existing Isilon customer with a cluster consisting of four NL400 nodes with 4TB drives. The cluster is using N+2:1 protection level and the file system shows that it is 60% utilized. Home directories and file shares comprise 75% of the existing content and the remainder is inactive deep archive. The company has 1,000 employees using Windows and Mac clients participating in a single Active Directory (AD) forest.
During a meeting with the CIO and Director of IT you discuss the company's recent acquisition ?an engineering firm that specializes in Computer Aided Design (CAD). The engineering firm has 400 UNIX workstations that produce technical drawings which are currently stored on another vendor's SAN solution. The all UNIX environment uses NIS for authentication and name resolution. They do not currently use DNS or LDAP. The engineering company has an old storage system that has been experiencing problems and the CIO would like you to migrate the data onto the Isilon cluster. The CIO would like to eliminate all tape and recover the data onto disk.
The CIO is concerned about security of the company's intellectual property, especially with the rapid adoption of mobile devices and external cloud content sharing services such as DropBox, Egnyte, and SugarSync. They would like to implement an alternative that provides external file sharing and mobile device synchronization while maintaining security control over the company's data.
The Director of IT reports that users are storing non-work related content on the Isilon cluster. They would like to limit the amount of capacity that each user can consume in their home directory and want to ensure you provide the capability to easily visualize which users are over their allotment.The company's Windows users currently leverage Windows Shadow Copy to recover files that have been accidentally deleted. The IT department wants to ensure that Mac and incoming
UNIX clients have the same functionality.
The Director of IT also mentions that users are reporting slow response times when browsing their home directories and shared folders. They are concerned that Isilon cannot scale to support their combined requirements.
-- Exhibit -
Based on the meeting with the customer, which Isilon cluster configuration would you recommend?
A. 4 x X400 nodes with 2 x SSD and 34 x 4TB drives 1 x Additional NL400
B. 6 x X400 nodes with 36 x 4TB drives 1 x Backup Accelerator
C. 4 x NL400 nodes with 36 x 4TB drives
D. 9 x S200 nodes with 2 x SSD and 22 x 900GB SAS
A healthcare services provider is implementing an X-Series cluster. Currently they have approximately 200 customers and they are growing at 30% per year. They have 200 TB of storage utilized. Health Insurance Portability and Accountability Act (HIPAA) regulations require they keep all patient data for seven (7) years. They would like to keep all genomic sequencing data stored with N+3 protection, not to exceed 75% utilization.
What is the minimum initial configuration you would recommend?
A. 13 X400 nodes; 1 TB drives
B. 6 X400 nodes; 4 TB drives
C. 13 X200 nodes; 3 TB drives
D. 7 X400 nodes; 1 TB drives
A company currently has numerous file servers providing home directories for its employees. Some departments have their own file servers. All corporate users authenticate using Active Directory. The engineering department has their own untrusted AD domain for their file servers.
The company is looking for a consolidated solution that requires minimal changes to the environment, and that creates a single namespace for the home directories.
What is the recommended solution that will meet this company's requirements?
A. Implement an Isilon cluster and utilize Access Zones.
B. Configure two separate clusters, one for each AD domain.
C. Utilize SmartPools to create two pools to separate the domains.
D. Consolidate onto a single cluster and merge the domains.
An Isilon customer is reporting less than expected performance from the cluster and poor space utilization. The customer is using three X400 nodes with N+2:1 protection policy to host webserver log data. Upon further analysis, it is discovered that the webservers write log files 64 KiB in size. The log files are then accessed by an analytics application for reporting.
What should be done to increase write performance of the cluster?
A. Change the protection scheme to a mirroring policy.
B. Add A-Series performance accelerator nodes to the cluster.
C. Add S-Series storage nodes to the cluster.
D. Add SSDs to the X-Series nodes in the cluster.
Your customer has several departments that want separate access to the cluster so they can use their individual authentication methods. Two of the departments will use NFS and two will use SMB to access the cluster.
What would you recommend?
A. Create two separate access zones for the SMB clients, and use the System zone for the NFS clients.
B. Create separate access zones for both the SMB and NFS clients.
C. Create two separate access zones for the NFS clients, and use the System zone for the SMB clients.
D. Have all clients access the System zone, and use RBAC to control authentication.
A company currently has multiple fileservers to provide home directories for its employees. Each department has a separate fileserver. Most corporate users are on Windows clients and utilize Active Directory, except for the Engineering department, which uses Linux and NIS for authentication. The company is looking for a solution with minimal administrative overhead and a single namespace for the home directories.
What is the recommended solution that will meet this company's requirements?
A. Configure a single Isilon cluster and utilize Access Zones for authentication to Active Directory and NIS.
B. Configure two separate clusters, one for Windows clients and the other for Linux.
C. Utilize SmartPools to create two different FilePools, and separate Windows users from Linux users.
D. Configure a single cluster, and migrate Linux users to Windows.
Your customer has an Isilon cluster with five X400 nodes and four 72NL nodes. A SmartPools policy moves data to the NL nodes after 60 days of inactivity. The customer wants to expand the archive tier by at least 150 TB and would like to manage a single archive pool.
Which nodes should be added to the cluster?
A. Three NL400 nodes with 2TB drives
B. Three X400 nodes with 1TB drives
C. Two NL400 nodes with 4TB drives
D. Two X400 nodes with 3TB drives
You will be meeting with the Corporate Security Team as part of the implementation planning for a new Isilon cluster deployment. The Lead Security Analyst has asked you to discuss the Authentication Sources on your Isilon Cluster.
What customer questions regarding Isilon-supported Authentication Sources do you need to be prepared to answer?
A. What mechanism are you using for NFS authentication? Do you have multiple AD domain support? What versions of LDAP are supported?
B. Are you using File Services for UNIX in your AD environment? Do you support NIS+ for NFS authentication? Do you support multiple Access Zones connecting to the AD Domain?
C. What mechanism are you using for NFS authentication? Do you support Novell Directory Services? What flavor of LDAP is supported?
D. Is the cluster x.400 compliant? What firewall rules are in place to prevent data leakage? Is there a audit trail for access zone configuration changes?
In your second meeting with the customer you ask the following questions about their current unified SAN and NAS platform.
"Are you using an application to map users from NFS Exports to SMB shares? Is each site a separate LDAP or AD Domain?"
What functionality are your trying to understand in their environment and what is the comparable feature in Isilon OneFS?
A. Identity Mapping and Authentication Sources
B. User Management and AD Authentication
C. Kerberos Infrastructure and Identity Management
D. NFS Export Management and OneFS Cluster Management
You have 1000 users for an application that reads and writes files averaging between one and four MB in size. Each user requires 24 MB of RAM. You want to add another 1000 users for this application, and in preparation for them, you run the isi statistics command. You discover that the average CPU utilization is 20%; aggregate throughput averages 700 MB/s and the disk QueueD average is 1.5. Your cluster currently has five X200 (12 GB RAM, 1 TB drive) nodes, uses N +2:1 protection and 1 GigE networking.
What should you do to accommodate the next 1000 users?
A. Add five additional X200 (12 GB, 1 TB drive) nodes
B. Upgrade each X200 node to a total of 24 GB of RAM.
C. Upgrade two of the 1 GigE NICs to 10 GigE on each node.
D. Add five A100 (24 GB RAM) accelerator nodes.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-555 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.