A customer with a Hitachi NAS Platform wants to use a Hitachi VSP storage system. You need to gather information about the VSP and which storage is available. Which tool should you use to review this information?
A. Hitachi Device Manager
B. Hitachi Storage Navigator Modular 2
C. Hitachi Cluster Manager
D. Hitachi VSP manager
Your customer wants to issue administrative commands to a Hitachi NAS Platform 4000 over their data
network using scripting.
What must you do?
A. Change the firewall setting in SMU to allow access to the admin EVS.
B. Assign an IP address to the admin EVS on the data network aggregate.
C. Run the scripted commands against any existing file services EVS.
D. Add an additional IP address to the file services EVS used by the clients.
A customer wants to implement a Hitachi NAS Platform 4000 in a 10 GbE network environment with some
1 GbE clients and they are asking about potential performance limiting factors in their network.
Which two factors must be taken into consideration? (Choose two.)
A. the use of a Network File System
B. the use of flow control
C. the number of modules (blades) in a switch
D. the number of network hops
A customer with a Hitachi NAS Platform 3200 (source) would like to relocate all the data to a new Hitachi NAS Platform 4000 (destination) using Incremental File Replication with Transfer Primary Access (TPA). Which two are required before the data migration can take place? (Choose two.)
A. The source and destination firmware levels of the HNAS systems must be compatible for replication.
B. The external SMU must manage the source and destination nodes.
C. The source and destination nodes must be connected to different storage systems.
D. The clients of the source and destination nodes must have write access to the snapshots before and after the replication.
A customer has configured two LAGs on their Hitachi NAS Platform 3090 cluster. EVS A uses ag1 and
EVS B uses ag2.
What will cause EVS A to failover?
A. The SMU quorum service is stopped,
B. All the EVSB file systems go offline.
C. All the GbE ports go offline from ag1.
D. The cluster interconnect goes offline.
A customer wants to configure Data Migrator jobs to allow them to migrate unused data to a slower tier of
disk.
Which three Data Migrator parameters must be configured? (Choose three.)
A. path
B. replication
C. rule
D. schedule
E. task
A customer wants to know if their proprietary file extensions can be scanned by anti-virus software in their
Hitachi NAS Platform environment. In addition, they require optimal throughput with scanning.
Which two actions will they need to take? (Choose two.)
A. Add the proprietary extensions to be scanned.
B. Include the extension on the exclude list.
C. Use multiple scan engines.
D. Use one scan engine.
Which two statements are correct about Tiered File Systems (TFS)? (Choose two.)
A. Snapshot data is preserved in both tiers 0 and 1.
B. Only SSD and SAS storage can be used for tier 0.
C. TFS should only be used with WFS-2.
D. A maximum of three tiers are supported using WFS-2
You are planning a data migration from a distributed Windows file server environment to a Hitachi NAS
Platform 4000. You have discovered that some of the applications use hard-coded IP addresses. You
have also identified that login scripts are used to map network drives for the end users.
Which two methods should you use to minimize impact to users? (Choose two.)
A. Modify the login scripts to point to the new location.
B. Use CNAME records to preserve the IP addresses for hard-coded applications.
C. Use the same IP addresses on the EVS as the original server for applications.
D. Use CHS to present a unified namespace and transparently migrate the applications.
A customer has purchased a Hitachi NAS Platform solution and wants to consolidate databases from 25
SQL servers and 15 Oracle servers onto the Hitachi NAS Platform. I/O size is expected to be relatively
large.
Which two should be used to achieve optimal performance? (Choose two.)
A. 4 KB block size file system
B. 32 KB block size file system
C. WORM file system
D. jumbo frames
A customer is running Web messaging related applications using a Hitachi NAS Platform 4000. They are
worried about data inconsistencies and would like to know how a WFS-2 file system can benefit their
current environment.
Which two functions will provide an additional layer of data protection? (Choose two.)
A. Use multiple checkpoints.
B. Perform a quick rollback to a previous successful snapshot.
C. Perform data recovery from the deleted file system.
D. Execute the "consistency-check" command.
A customer uses a Hitachi NAS Platform 4000 integrated into a Windows Active Directory infrastructure
and wants to know how security modes can be used in their environment.
Which two statements are correct? (Choose two.)
A. File system security modes can be applied to file systems or individual virtual volumes.
B. The most appropriate security mode is the Mixed mode.
C. The most appropriate security mode is the UNIX (supports Windows) mode.
D. The most appropriate security mode is the NTFS mode.
Which three statements describe the Hitachi NAS Platform file system auditing capabilities? (Choose three.)
A. CIFS clients can be audited.
B. Auditing is enabled on a per file system basis.
C. NFSv3 clients can be audited.
D. Auditing events can be sent via email.
E. NFS clients can be denied access to a file system when auditing is enabled
What are two characteristics of file system expansion within a Storage Pool? (Choose two.)
A. File systems can be expanded as long as they contain meta data.
B. Chunks define the increment by which file systems grow when they expand.
C. To add more than one file system to a Storage Pool, a license key is required
D. The chunk size limits the file system size.
As part of a Hitachi NAS Platform design process a customer informs you of two business requirements. First, they need to have network redundancy by using two separate switches. Second, they require the ability to access multiple subnets on the same interface. Which two protocols will they need to implement on the NAS? (Choose two.)
A. VLAN Tagging (802.1Q)
B. Router Information Protocol (RIP)
C. Hot Standby Router Protocol (HSRP)
D. Link Aggregation Control Protocol (LACP 802.3ad)