DELL EMC D-PSC-DY-23 Übungsprüfungen
Zuletzt aktualisiert am 10.09.2025- Prüfungscode: D-PSC-DY-23
- Prüfungsname: Dell PowerScale Deploy 2023
- Zertifizierungsanbieter: DELL EMC
- Zuletzt aktualisiert am: 10.09.2025
What is the best practice for configuring shares, exports, and quotas when implementing DR on the source and target clusters?
- A . Change all quotas to soft quotas on the target cluster
- B . Configure the source side only when creating shares, exports, and quotas
- C . Use the exact same names for shares and same aliases for exports
- D . Use SyncIQ to replicate shares, exports, and quota settings
During the install, a new EMC Isilon customer insists that they need SmartLock Compliance mode for their cluster. After a few days, they decide they want to revert back to a standard Isilon Cluster.
How can this be done?
- A . Re-image the complete cluster
- B . Reboot the cluster into standard mode
- C . Deactivate SmartLock and unlicense the feature
- D . Downgrade OneFS and disable SmartLock Compliance mode
A systems administrator is attempting to manage a Dell PowerScale cluster using the web administration interface. However, some configuration tabs are not displayed.
What is the most likely cause of this issue?
- A . Some features have not been licensed
- B . Administrator did not log in as CompAdmin
- C . RBAC has been implemented
- D . Access zones have been created
What are the considerations when a NANON configuration is used?
- A . Increase frontend I/O ports and aggregated cache.
- B . Increases capacity and aggregated cache.
- C . Increases frontend network ports and capacity.
- D . Increases bandwidth inside the cluster and GbE links.
Which Isilon protection setting will require the least percentage of overhead for a 1024 KB file?
- A . N+3d:1n in a 5-node node pool
- B . N+2d:1n in a 4-node node pool
- C . N+1n in a d-node node pool
- D . N+2n in a 10-node node pool
A customer has created multiple file pool policies on their cluster. Many of the file pool policies include the same filtering criteria.
What determines which file pool policy is applied to the file?
- A . The first matching policy in top-down order
- B . The first matching policy in bottom-up order
- C . File name matches are applied first, followed by File location matches
- D . File time matches are applied first, followed by File name matches
Which network technology is used to connect the backend of an EMC Isilon cluster?
- A . InfiniBand
- B . Serial Attached SCSI
- C . Fibre Channel
- D . 10Gb Ethernet
What benefit does GNA provide to the cluster?
- A . Metadata read acceleration across the cluster
- B . Namespace read/write acceleration across the cluster
- C . An additional level of cache on SSDs used for metadata
- D . Metadata read acceleration specifically for the job engine
Which element supports source based routing (SBR)?
- A . IPv4
- B . IPv6
- C . NFSv3
- D . NFSv4
After starting a SyncIQ failover disaster recovery test, the Dell PowerScale administrator is told to cancel the test. Data on the target site has been modified.
What will happen to the modified data on the target site if the administrator reverts the failover operation?
- A . Reverted to the source site
- B . Maintained
- C . Discarded
- D . Snapped and snap reverted