[Free] 2018(Jan) EnsurePass Testinsides Oracle 1z0-581 Dumps with VCE and PDF 21-30

By | January 25, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan Oracle Official New Released 1z0-581
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/1z0-581.html

Pillar Axiom 600 Storage System Certified Implementation Specialist

Question No: 21

Which identification mode is used to flash the LEDs on the component being replaced?

  1. Identify

  2. Reverse Identify

  3. Replace Component

  4. View Details

Answer: A

Explanation: To identify physically the Brick you intend to rename, select Actions gt; Identify and, use the Identify dialog to flash the LEDs on the front and back of the selected Brick.

Reference: Pillar Axiom 600 Hardware installation Guide, Rename the Bricks

Question No: 22

Identify the tasks of the Administrator 2 role.

  1. shutting down the Axiom

  2. modifying global settings

  3. creating volumes

  4. updating software

Answer: C

Explanation: Administrator 1 A login account that has the authority to perform all administration, configuration, and recovery tasks.

Administrator 2 A login account that has the authority to perform all administrative and configuration tasks, except:

  • Create, modify, or delete administrator accounts and File Servers.

  • Modify systemwide settings such as Simple Network Management Protocol (SNMP) (not B)

    *Modify software or hardware configurations (not D)

  • Shut down the system (not A)

    Reference: Pillar Axiom Administrator#39;s Guide, Create Administrator Account Dialog

    Question No: 23

    The storage administrator would like to view the current software version that is installed on the system. Identify the navigation tab that the storage administrator will need to click.

    1. Support

    2. Monitor

    3. Manage

    4. Protect

    Answer: A

    Explanation: You can display the versions of all software modules in your Pillar Axiom system.

    1. From the Support tab, click Software Modules.

    2. Review the displayed information to ensure that the versions are what you expect.

    The version information includes:

  • Drive and Enclosure Services (ES) firmware in the Brick storage enclosures.

  • Application software and operating system in the Pilot management controller.

  • Software (SAN) and programmable ROM (PROM) in Slammer storage controllers.

Reference: Pillar Axiom Administrator#39;s Guide, Display Software Versions

Question No: 24

The storage administrator is modifying a user account. The current user is not able to perform system updates. Which role should the user be assigned to be able to perform this task?

  1. Administrator 1

  2. Primary Administrator

  3. Administrator

  4. Monitor

Answer: A

Explanation: Administrator 1: A login account that has the authority to perform all administration, configuration, and recovery tasks.

Incorrect answers,

B. primary administrator is an account, not a role

Question No: 25

The storage administrator has installed MaxRep in the SAN environment. Identify how MaxRep communicates to the Pillar Axiom storage system for volume discovery.

  1. AxiomONE CLI commands through FCP

  2. AxiomONE CLI commands through TCP/IP

  3. SCSI commands through FCP

  4. SCSI commands through FCoE

Answer: C Explanation:

Note: Initiate a Pillar Axiom iSCSI Session

Use the iSCSI Login option when investigating iSCSI login problems to the Pillar Axiom system from the Pillar Axiom MaxRep Replication for SAN.

  1. To perform the iSCSI Login operation, navigate to Settings gt; Axioms gt; Toolkit for MaxRep.

  2. In the Select MaxRep Option page, select iSCSI Login and click Next.

  3. In the Select an Axiom page, select a Pillar Axiom system from those listed. 4 Click Submit to initiate the login operation.

5 At the confirmation prompt, click OK.

Question No: 26

Identify the function of a Storage Profile.

  1. It determines the number of RAID groups that the; volume will be striped across and the stripe size.

  2. It specifies a set of QoS attributes that are used to optimize a logical volume for a specific application or task.

  3. It determines the amount of storage allocated to the volume based on the application that is using the volume.

  4. It specifies thresholds which, when exceeded, may automatically initiate the copy of an underperforming volume to a higher performance storage.

Answer: A

Explanation: When configuring a logical volume, you can select a collection of predefined properties to apply to that volume. This collection of properties is called a

Storage Profile.

The following are some of the properties that define a Storage Profile:

  • Number of RAID groups

    Specifies the number of RAID groups across which the data is written (striped).

  • Strip size

Specifies the number of contiguous bytes to be stored on a single drive. Note:

The default setting depends on the media type: 64 KB for Fibre Channel (FC) media

128 KB for serial ATA (SATA) media

128 KB for solid state drive, single-level cell (SSD SLC) media

Reference: Pillar Axiom Administrator#39;s Guide, About Storage Profiles

Question No: 27

The storage administrator is setting up an Axiom. Identify the number of IP addresses required for the Pilot.

  1. 1

  2. 2

  3. 3

  4. 4

Answer: C

Question No: 28

Which hardware components are needed to increase bandwidth, assuming that there are IOP constraints?

  1. Brick

  2. Slammer

  3. Pilot

  4. Private Inter connect Module

  5. Private Management Interface

Answer: B Explanation:

Note: IOP: Input Output oPerations

Question No: 29

Where does the AxiomONE Data Protection Manager records its events?

  1. the system event log

  2. the log file on the host

  3. the Event Viewer

  4. the/var/log/syslog file on the Pilot

Answer: A

Explanation: Display the Event Log

Review the event log to monitor events that have occurred in the Pillar Axiom system. If too many events display on the screen, you can apply filters to the list. 1 From the Monitor tab, click Event Log.

2 Review the event log details to ensure that the information is what you expect.

Note: Event logs display the system events of a Pillar Axiom system. Events include management actions such as the creation or deletion of LUNs and any problems

encountered by the Pillar Axiom system, such as hardware issues or other problems detected in the Slammer or the Pillar Axiom management software.

Reference: Pillar Axiom Administrator#39;s Guide, Display the Event Log

Question No: 30

What are the two functions of a Storage Profile?

  1. It provides a standardized set of quickly repeatable attributes for an application.

  2. It specifies a set of Quality of Service attributes that are used to optimize amp; logical volume for a specific application or task.

  3. It determines the amount of storage allocated to the volume based on the application that is using the volume.

  4. It specifies thresholds which, when exceeded, may automatically initiate the copy of an underperforming volume to a higher performance storage.

  5. It specifics the Storage Domain to be used when creating the logical volume for a specific application or task.

Answer: A,B

Explanation: When configuring a logical volume, you can select a collection of predefined properties to apply to that volume. This collection of properties is called a

Storage Profile.

A: To help the storage administrator configure a volume, Pillar Data

Systems provides a collection of Storage Profiles, each of which is optimized for one of several common applications.

B: A Storage Profile defines the Quality of Service (QoS) settings for an individual logical volume.

Reference: Pillar Axiom Administrator#39;s Guide, System Storage Profile Properties

100% Ensurepass Free Download!
Download Free Demo:1z0-581 Demo PDF
100% Ensurepass Free Guaranteed!
1z0-581 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.