How many dVols will be consumed during the creation of the first 10 GB file system when using AVM with traditi
After configuring block storage for File usage, a Storage Administrator has a large number of
dVols available for use.
How many dVols will be consumed during the creation of the first 10 GB file system when using
AVM with traditional RAID Groups?
How many dVols will be consumed during the creation of the first 10 GB file system when using AVM with Pool LU
After configuring a block storage pool for File usage, a Storage Administrator has a large number
of dVols available for use.
How many dVols will be consumed during the creation of the first 10 GB file system when using
AVM with Pool LUNs?
How can the Storage Administrator hide this directory from the host users?
A Storage Administrator receives a call from a customer who says they can see the lost+found
directory.
How can the Storage Administrator hide this directory from the host users?
Which step would likely resolve the issue?
From Unisphere, a Storage Administrator created an NFS export and alerted a user that the
exported file system was ready to be mounted. The user was able to access the export but was
not able to write to the export.
Which step would likely resolve the issue?
Which mechanism should be used to provide authentication to NFS exports presented from the VNX?
A small university department uses Unix-based workstations with local password files for security
and access. They now want to expand and use the VNX for additional storage.
Which mechanism should be used to provide authentication to NFS exports presented from the
VNX?
How should you provide storage?
Your customer has a requirement for multiple ESXi 5.1 hosts to simultaneously access volumes
and run multiple VMs in their VNX for File environment.
How should you provide storage?
Which statement is correct about Interface Stealing with CIFS servers?
A VNX customer has configured multiple CIFS servers and IP interfaces for general office use.
CIFS servers are configured both on the physical Data Mover and also on multiple Virtual Data
Movers.
They now need to re-purpose one CIFS server to make it accessible on a separate, isolated
subnet. They have researched the concept of “Interface Stealing”.
Which statement is correct about Interface Stealing with CIFS servers?
Which change must you recommend?
A customer decided to add CIFS share access to an existing VNX for File implementation. You are
making recommendations to ensure maximum server portability for local load balancing.
Which change must you recommend?
What is an important consideration when designing a VDM solution?
What is an important consideration when designing a VDM solution?
What are important considerations when designing a VDM solution?
What are important considerations when designing a VDM solution?