Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

During the addition of an SCv360 enclosure to a SCv3020 the PCle SAS card is used for connectivity. The enclosure is NOT recognized by the system, why?

A.

SCv3020 does not allow enclosure expansion

B.

SCv2360 is unsupported for enclosure expansion

C.

SCv3020 does not support 12Gb SAS

D.

PCle SAS is unsupported for enclosure expansion

Full Access
Question # 5

Which zones accurately describe the zoning requirement for replication connectivity to be established when the source array is in Legacy Port Mode and the target array is in Virtual Port Mode?

A.

Zone 1 = All Source Virtual Port WWNs + All Remote Physical Port WWNsZone 2 = All Source Physical Port WWNs + All Remote Virtual Port WWNs

B.

Zone 1 = All Physical WWNs from both arraysZone 2 = All Virtual WWNs from both arrays

C.

Zone 1 = All Source WWNs + All Remote Virtual Port WWNsZone 2 = All Source WWNs + All Remote Physical Port WWNs

D.

Zone 1 = All Source Virtual Port WWNs + All Remote Port WWNsZone 2 = All Source Physical Port WWNs + All Remote Port WWNs

Full Access
Question # 6

Refer to the Exhibit.

A customer has asked you to perform a port failover test to demonstrate system resiliency. What is needed to complete this task?

A.

Add more cables per switch

B.

Switch to Legacy Port Mode

C.

Add more switches per controller

D.

Switch to Virtual Port Mode

Full Access
Question # 7

Which command is used to assign the DNS server IP address 10.10.10.12 on an SC9000 during the initial configuration?

A.

controller ipconfig 10.10.10.12

B.

net dns init 10.10.10.12

C.

controller dnsserver 10.10.10.12

D.

ifconfig inet 10.10.10.12

Full Access
Question # 8

To achieve redundancy, how many connections from the same SC Series controller are required per fault domain?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 9

A file server using an SC7020 storage array was impacted by ransomware in the morning and a majority of the files need to be recovered. The backup from the previous night did not run. Is there anything that can be done on the SC7020 array to help recover these files?

A.

Yes, if there is a snapshot from before the ransomware on the volume(s) were impacted. Volume(s) can be rolled back to this snapshot.

B.

Nothing can be done on the SC7020 to assist with this recovery.

C.

Yes, if there is a snapshot from before the ransomware on the volume(s) were impacted. A Replay can be created from this snapshot and the files recovered.

D.

Yes, if there is a snapshot from before the ransomware on the volume(s) were impacted. A View volume can be created from this snapshot and the files recovered.

Full Access
Question # 10

Refer to the exhibit.

Starting in the upper left corner of the SCv3000 what is the numerical order of the disks across the top row? A. 3, 2, 1, 0

B. 4, 3, 2, 1

C. 1, 2, 3, 4

D. 0, 1, 2, 3

Full Access
Question # 11

Refer to the exhibit.

When scanning Fibre Channel on a QLogic HBA what information can be obtained?

A.

The volume mapped to the QLogic HBA

B.

WWN of the QLogic HBA

C.

WWN of the connected Storage Center

D.

WWN of the SAN switch

Full Access
Question # 12

Which configuration represents how the back-end is cabled on an SC7020 storage array without expansion enclosures?

A.

Configuration A

B.

Configuration B

C.

Configuration C

D.

Configuration D

Full Access
Question # 13

A customer wants to add an SC420 and an SC200 to a SC7020 storage array. What is the recommended approach to adding the new enclosures?

A.

One single SAS chain connected to a 6 Gb SAS card

B.

One single SAS chain connected to a 12 Gb SAS card

C.

Two separate SAS chains connected to a 6 Gb SAS card

D.

Two separate SAS chains connected to a 12 Gb SAS card

Full Access
Question # 14

A customer is using an SC9000 array with two chained SC280 expansion enclosures. They need to expand its capacity by adding a third SC280 drive bay. What is the most cost efficient way to expand the array's capacity using as few chains as possible?

A.

Add the SC280 to the same chain as the existing SC280 enclosures

B.

Install two new SAS I/O cards and distribute the SC280 enclosures between them

C.

Add the new SC280 to a new chain on the same SAS I/O card

D.

Install a new SAS I/O card to connect the SC280 enclosure

Full Access
Question # 15

A customer is running the Dell Storage Manager (DSM) Suite as a software stack on Microsoft Windows. To reduce the Microsoft licensing costs, the customer wants to switch to the DSM Virtual Appliance.

Which recommended deployment should the customer use?

A.

Configure as a Primary Data Collector

B.

Configure as a Remote Data Collector

C.

Migrate the DSM database manually

D.

Migrate from the existing Data Collector

Full Access
Question # 16

Refer to the Exhibit.

A customer needs your assistance in recovering files that were deleted from an SC Series array volume. The files were deleted around 1:00 AM on January 7th. Based on the exhibit of the Dell Storage Manager (DSM), which recommendation allows the customer to recover the most recent deleted files?

A.

Take a manual snapshot and then select “Create Volume from Snapshot”

B.

Select “Create Volume from Snapshot” taken on January 7 and map to a server

C.

Recover from backup, deleted files are unrecoverable from the storage array

D.

Select “Create Volume from Snapshot” taken on January 6 and map to a server

Full Access
Question # 17

When installing an SC Series array, the customer indicated that they want the controller configured to provide the maximum amount of storage space. You discover that the storage controller was shipped with twelve 900 GB drives and twelve 1.8 TB drives of the same type.

Which redundancy level can be selected to provide the maximum amount of storage?

A.

Put equal size drives in their own pagepool.Change the default redundancy level for the 1.8 TB drives.

B.

Put all drives in the same tier.Keep the default redundancy level for both the 900 GB and 1.8 TB drives.

C.

Put equal size drives in their own tier.Change the default redundancy level for the 900 GB drives.

D.

Put equal size drives in their own pagepool.Keep the default redundancy level for both the 900 GB and 1.8 TB drives.

Full Access
Question # 18

Refer to the exhibit.

The servers are zoned to best practices. The output of the switch is shown below:

Which is the Physical Zone of Fault Domain B?

A.

Zone_A

B.

Zone_C

C.

Zone_D

D.

Zone_B

Full Access
Question # 19

Based on the exhibit, a customer is using a Virtual Port Mode configuration. If the cable for Domain 1 on Controller 1 is disconnected during failover testing, will the SC Series array port failover work?

A.

No, the configuration contains only a single port per domain and will not provide port failover.

B.

Yes, the configuration will provide port failover as the system is configured for Virtual Port Mode.

C.

No, port failover only works in Legacy Port Mode.

D.

Yes, the configuration will provide port failover regardless of domains or mode.

Full Access
Question # 20

When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected?

A.

Baud Rate = 9600, Parity = NoneData Bits = 8, Stop Bits =1, Flow Control = XON/XOFF

B.

Baud Rate = 115200, Parity = NoneData Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF

C.

Baud Rate = 115200, Parity =NoneData Bits = 8, Stop Bits = 1, Flow Control = None

D.

Baud Rate = 115200, Parity = EvenData Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF

Full Access
Question # 21

Refer to the Exhibit.

You are testing failover from a host perspective. The host has been configured in a “Failover Only MPIO” configuration. When running IOmeter if the Data Path 2 cable from the host is disconnected, will the host survive the failover?

A.

No; Failover MPIO is configured for only Data Path 1

B.

No; IOmeter is sending I/O only on one path

C.

Yes; the server has Data Path 1 connected to both controllers

D.

Yes; Failover MPIO should failover

Full Access
Question # 22

A customer wants to have the SED feature enabled through Dell Storage Manager (DSM) 2016 R2. How is encryption enabled on the SED?

A.

SED feature must be licensed.

B.

External KMS is required and must be activated during installation of the array.

C.

SED feature uses a dedicated ASIC in each controller and can be enabled at any time.

D.

SED encrypts data by default.

Full Access