In an ECS installed with full network separation, which IP address will the user/applications use to read/ write on the ECS?
A. Replication
B. Data
C. Management
D. Public
Which Hadoop configuration file needs to be edited to be aware of ECS ViPRFS?
A. fs.permissions.unmask-mode
B. fs.AbstractFileSystem.viprfs.impl
C. core-site.xml
D. fs.viprfs.impl
Which process allows ECS to reconstruct objects within a storage pool, if that pool loses a disk?
A. Full mirrored replication
B. Chunk management
C. Erasure coding
D. XOR operation
Which ECS Advanced Retention Management (ARM) feature enables applications to specify a retention period that will trigger when the CAS application receives a specified condition?
A. Min/Max Governor
B. Event Based Retention
C. Litigation Hold
D. Extended Retention Period
Which user role has access to all areas of the ECS portal?
A. System Administrator
B. Namespace Administrator
C. Tenant Administrator
D. Power use
Which configuration task is optional in ECS when enabling DD Cloud Tier integration?
A. Create a special bucket to store DD Cloud Tier objects
B. Create a dedicated namespace for DD Cloud Tier objects
C. Create an object user account for DD Cloud Tier objects
D. Create a dedicated storage pool for DD Cloud Tier objects
How is an ECS federation created?
A. From the first ECS running the primary VDC, create an additional VDC entry for each remote ECS instance.
B. Add the remote VDC into the replication group configuration for the primary VDC
C. Create a new federation configuration from any VDC, then add all other VDCs to the configuration
D. Create the remote VDC then merge both the first VDC and the remote VDC into the federation configuration.
What is the difference between S3 authentication signature version 2 and S3 authentication signature version 4?
A. Version 2 uses a shared secret and access key ID Version 4 uses the date/region algorithm
B. Version 2 uses HMAC algorithm Version 4 uses the credentials scope algorithm
C. Version 2 uses a namespace based signature Version 4 uses HMAC algorithm
D. Version 2 uses the secret key to sign the request Version 4 uses a signing key
What technology is used in ECS to protect loss of a site in a two-site configuration?
A. Full Mirror Copy
B. Erasure Coding
C. XOR
D. Dual Parity
When a disk state is suspect, what are the allowable disk operations?
A. Read
B. Write
C. Read and write
D. No operations allowed