VNX Solutions Specialist Exam for Storage Administrators v8.3 (E20-547)

Page:    1 / 14   
Total 208 questions

What happens when a reverse synchronization completes without Protected Restore Mode enabled?

  • A. Only the reverse-synchronized clone remains unfractured.
  • B. Host writes to the source LUN are not mirrored to clone.
  • C. All clones will be fractured.
  • D. The gold copy clone used for restore will remain as is.


Answer : A

A user is preparing to install a disk drive. Where can they verify that the disk drive is compatible with the VNX system?

  • A. VNX Series Disk and OE Matrix
  • B. Unisphere Server Utility
  • C. Unisphere
  • D. USM


Answer : A

What is a valid characteristic of striped metaLUNs?
Striped metaLUNs:

  • A. must be built from the same RAID types and sizes
  • B. can mix thick and thin LUNs
  • C. cannot be expanded once created
  • D. components have a varying performance profile


Answer : A

Which drive type is supported in the 2U, 25-drive DAE5S?

  • A. SAS
  • B. NL-SAS
  • C. Flash
  • D. Fibre Channel


Answer : A

Which criterion must be met before executing the storagepool destroy command with
Navisphere Secure CLI?

  • A. Complete removal of all LUNs from the pool
  • B. Complete removal of unused LUNs from the pool
  • C. Complete removal of large LUNs from the pool
  • D. Complete removal of empty LUNs from the pool


Answer : A

What are features of VNX Snapshots?

  • A. Uses redirect on first write. Lower write performance impact.
  • B. Uses copy on first write. Supported with pool-based LUNs.
  • C. Uses redirect on first write. Supported with all LUN types.
  • D. Uses copy on first write. Does not require reserve LUN pool.


Answer : A

A storage administrator creates a clone of a source LUN. Which command should be used to make the clone available to the secondary server?

  • A. fracture
  • B. synchronize
  • C. activate
  • D. start session


Answer : A

When creating a SnapView session, where can a consistent start occur?

  • A. On multiple source LUNs
  • B. On multiple target LUNs
  • C. On multiple reserved LUNs
  • D. On multiple private LUNs


Answer : A

A storage administrator has provisioned storage to a server, but only some of the LUNs are visible to the host.
What would explain why some LUNs appear to be missing?

  • A. The 'missing' LUNs were not added to the storage group.
  • B. The host initiators are not logged into the array.
  • C. The disk alignment has not been set to the 1 MB boundary.
  • D. The host agent is not connected to the storage system.


Answer : A

What are the available Usermapper roles?

  • A. Primary, Secondary, and Client
  • B. Primary, Local, and Remote
  • C. Local, Remote, and Client
  • D. Active, Passive, and Standby


Answer : A

Which VDM state results in the VDM being mounted during a Data Mover boot?

  • A. Loaded
  • B. Mounted
  • C. Unloaded
  • D. Ready


Answer : A

What default option does a newly created file system have when it is NFS exported?

  • A. R/W
  • B. R/W/X
  • C. R/O
  • D. R/X


Answer : A

A storage administrator wants to enable data compression on inactive backup volumes that are configured on storage pool LUNs.
How does VNX data compress storage pool LUNs?

  • A. Storage pool LUNs are compressed in place.
  • B. Storage pool LUNs are migrated to a new storage pool LUN with the compression attribute enabled.
  • C. VNX does not support compression of storage pool LUNs.
  • D. Storage pool LUNs are migrated to a new RAID-group LUN with the compression attribute enabled.


Answer : A

What occurs after data compression of a RAID-group LUN?

  • A. Source LUN is unbound from the RAID-group.
  • B. The LUN is defragmented.
  • C. Freed space is returned to the storage pool.
  • D. Host I/O is restarted


Answer : A

The user authentication and system management operations to the VNX with the
Unisphere GUI or CLI are performed over the network using which industry standard protocols?

  • A. Secure Socket Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH).
  • B. Password Authentication Protocol (PAP), Transport Layer Security (TLS) and Secure Shell (SSH).
  • C. Secure Socket Layer (SSL), Transport Layer Security (TLS) and NT LAN Manager (NTLM).
  • D. Secure Socket Layer (SSL), Generic Security Services (GSS) and Secure Shell (SSH).


Answer : A

Page:    1 / 14   
Total 208 questions