An administrator has mapped a Volume Group named VGI to a VM, Due to changes in the application running inside the VM, two additional volumes are required. At the time of creation, the VM was assigned to a Protection Domain named PDI.
Which two steps should the administrator take to add the additional volumes to the VM while maintaining data protection? (Choose two.)
Answer : A, B
An administrator is building a new application server and has decided to use post-process compression for the file server and inline compression for the database components.
The current environment has these characteristics:
Two Volume Groups named VGI and VG2.
A Storage Container named SCI with inline-compression.
A Storage Container named SC2 with post-process compression.
Which action should the administrator take to most efficiently satisfy this requirement?
Answer : D
An administrator needs to configure a service to collect data from a forensic software package that audits client access to a specific location. Data need to be immutable,
Which option meets these requirements?
Answer : A
A service provider must provide mufti-tenancy capabilities, allowing for each of their customers' data to be isolated on their hosting infrastructure.
How should the Objects administrator configure the environment to meet this requirement?
Answer : A
Where should an administrator look to see which user is the most active within a Files implementation?
Answer : C
Which action will improve the performance of a database server storage using Volumes that is experiencing persistent slow queries?
Answer : A
An administrator has received multiple trouble tickets from users who are unable to access a particular Distributed share.
While troubleshooting, the administrator observes that data located on FSVM 3 can be accessed, but the data located on FSVMs 1 and 2 is inaccessible. The administrator receives this message when attempting to access data on FSVMs 1 and 2:
Network object not found
Both FSVM 1 and 2 nodes successfully reply to pings, and the administrator is able to access data via the node IP.
What must the administrator check as a next step?
Answer : A