What does the command "md5
A. Verifies the file integrity based on the md5 hash from the download site.
B. Verifies that the correct version is being installed.
C. Used to verify if the image package is installed on the cluster and ready for upgrade.
D. Used to compare installed version with the version to be installed.
When are non-path based file pool policies applied to files which have been written to the cluster?
A. Whenever the SmartPools job runs
B. Only at 22:00 Hrs
C. Upon Ingress or at 22:00 Hrs
D. Whenever the policies get updated via an edit.
You are creating a file pool policy and have chosen to add file matching criteria to your policy. What can be used as file criteria?
A. Modify time
B. Protection level
C. File permissions
D. File owner
The customer has configured a file pool policy on their OneFS 7.0 cluster to place files over 30 days old in the archive tier with a file protection of N+3. The customer attempts to verify the file location and protection setting on a file matching the file pool policy criteria using the isi get -DD command. The file is located on the performance tier and has a requested protection setting of N+2:1.
What is the most likely cause of the issue?
A. The order of the file pool policies
B. The default policy overrides the file pool policy
C. The AutoBalance job is paused
D. The FlexProtect job failed to complete
Your customer is using a directory for a VMware environment. To which access pattern should you set the directory?
A. Random
B. Concurrency
C. Streaming
D. Aggregate
The SmartPools settings of your cluster are set to Protection management: Including File with manually-managed protection settings is not checked.
How can the protection settings be modified?
A. Using File System Explorer in the web administration interface or the isi set command
B. Only by using File System Explorer in the web administration interface
C. Only by using the isi set command
D. Manually starting the SmartPools job
In a 4-node cluster using N+3:1 protection, how much is the overhead?
A. 25%
B. 50%
C. 300%
D. 100%
You are supporting a customer's cluster with 3 node pools consisting of 10 S200 nodes, 18 X400 nodes, and 30 NL400 nodes. The customer is going to write a large number of 4MB files to the X400 node pool.
The customer is very concerned about minimizing the amount of overhead. Which setting would be best for minimizing the amount of overhead?
A. N+2:1 or N+2 have the same amount of overhead.
B. N+2:1 will have less overhead.
C. I/O optimization should be set to Random.
D. I/O optimization should be set to Streaming
In a 4-node cluster using N+2 protection, how much is the overhead?
A. 50%
B. 25%
C. 200%
D. 100%
You run the command "isi get -DD /ifs/data/foo.txt" on a 4 node cluster. The displayed results indicate a protection level of 6+2/2. What statement best describes 6+2/2?
A. Protection level of N+2:1; Contains 6 data stripes units and 2 FEC stripe units; Written to 2 drives per node
B. Protection level of N+2:1; Contains 8 data stripe units and 2 FEC stripe units; Written to 2 drives per node
C. Protection level of N+2: Contains 8 data stripe units and 2 FEC stripe units; Written to 1 drive per node
D. Protection level of N+1: Contains 6 data stripe units and 1 FEC stripe unit; Written to 1 drive per node
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EMC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your E20-655 exam preparations and EMC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.