A customer has just implemented anti-virus scanning on their Hitachi NAS Platform and they are experiencing degraded performance since the implementation. Which three actions should the customer take to improve performance? (Choose three.)
A. Increase the number of anti-virus scanning servers.
B. Enable SMB signing to reduce protocol overhead.
C. Upgrade the anti-virus scanning server hardware.
D. Optimize the network connectivity between the anti-virus scanning servers and the Hitachi NAS Platform.
E. Enable ICMP on the anti-virus scanning servers.
Which three statements describe the Hitachi NAS Platform file system auditing capabilities? (Choose three.)
A. CIFS clients can be audited.
B. Auditing is enabled on a per file system basis.
C. NFSv3 clients can be audited.
D. Auditing events can be sent via email.
E. NFS clients can be denied access to a file system when auditing is enabled
You are designing a Hitachi NAS 4000 platform solution to replace an existing NetApp solution. The
NetApp system has a number of mount points that are shared between Unix and Windows systems (CIFS
and NFS).
Which three data points should be gathered that are relevant to the solution design? (Choose three.)
A. File System mode
B. Directory Services configuration
C. Snapshot Policies
D. User/Group Mapping configuration
E. SMB version
You are planning a server consolidation for a customer as part of a Hitachi NAS Platform 4000 proposal. The customer desires to retain their existing CIFS server names during the migration as they have applications directly referencing these systems. Which method should be used to accommodate this requirement?
A. Use Cluster Name Service {CHS) to virtualize the namespace.
B. Add a static route to each server.
C. Implement Distributed File System (DFS) to virtualize the namespace.
D. Implement a separate EVS for each legacy file server.
A customer plans to implement a four-node Hitachi NAS Platform 4000 cluster to replace their Linux
clusters. To improve read response times, they want to have multiple copies of their files on different
nodes in the cluster.
Which Hitachi NAS Platform feature will satisfy this requirement?
A. Cluster Read Cache
B. Cluster Write Cache
C. Data Migrator
D. Dynamic Read Balancing (DRB)
A customer uses a Hitachi NAS Platform 4000 integrated into a Windows Active Directory infrastructure
and wants to know how security modes can be used in their environment.
Which two statements are correct? (Choose two.)
A. File system security modes can be applied to file systems or individual virtual volumes.
B. The most appropriate security mode is the Mixed mode.
C. The most appropriate security mode is the UNIX (supports Windows) mode.
D. The most appropriate security mode is the NTFS mode.
Which two statements describe file system checkpoints? (Choose two.)
A. The default number of checkpoints for a WFS-1 file system is 128.
B. To restore a file system to a previous checkpoint, use the "fs-checkpoint-select" command.
C. The maximum number of checkpoints for a WFS-2 file system is 2048.
D. When restoring a file system using a checkpoint, snapshots taken after that checkpoint are lost
A customer is planning to implement active-active SyncDR with a Hitachi NAS Platform across two sites. What is the maximum supported distance?
A. 10 km
B. 25 km
C. 62 km
D. 100 km
A customer is running Web messaging related applications using a Hitachi NAS Platform 4000. They are
worried about data inconsistencies and would like to know how a WFS-2 file system can benefit their
current environment.
Which two functions will provide an additional layer of data protection? (Choose two.)
A. Use multiple checkpoints.
B. Perform a quick rollback to a previous successful snapshot.
C. Perform data recovery from the deleted file system.
D. Execute the "consistency-check" command.
An enterprise customer has a diverse Active Directory environment consisting of multiple untrusted
departmental Windows domains.
Which EVS security configuration will achieve this business requirement?
A. Use the global EVS security context for all EVS.
B. Use an independent EVS security context for each EVS.
C. Use IPSec for all EVS to create secure client connections.
D. Use SSL certificates to encrypt client communications.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Hitachi exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HCE-3210 exam preparations and Hitachi certification application, do not hesitate to visit our Vcedump.com to find your solutions here.