A DG group is part of a snapshot schedule which runs each day at 9 am then linked to a set of targets for a full copy after termination. Additional volumes were added which increased the link to full copy time.
What course of action will prevent the issue?
vWitness and Array Witness options are deployed in the same operating environment simultaneously.
Which option does SRDF/Metro favor in this situation?
A storage administrator migrated an AIX host using NDM.
When they commit the migration, how is host access to the source array removed?
An administrator implemented SYMACLs on a PowerMax using host-based Access IDs. The administrator is no longer able to run SYMCLI commands against the volumes belonging to a host.
What is a possible reason for this issue?
An SRDF/Metro device pair was in an ActiveActive state. A link failure between arrays occurs. The application continues running on the R1 side, and the link failure is addressed.
What is the current state of the Metro device pair?
A drive failure has occurred at a customer environment, and a service request has been opened with customer support. A drive failure has occurred at a customer environment, and a service request has been opened with customer support.
Order the steps in sequence as part of key management.
Alerts are required to track high I/O response times for a specific storage group. I/O Response times greater than 10 ms require next day analysis. I/O response times greater than 15 ms require immediate intervention.
Which alert settings are required?
Refer to the exhibit.
Which correctly describes a possible configuration created by SYMACL?
A user can create, manage, and delete PowerMax SRDF device pairs. They can also view the array information, masking objects, device information, and the defined RBAC rules. However, they are unable to create and delete SRDF groups.
Which RBAC profile has been assigned to the user’s profile?
Which metrics are recommended to start analyzing the overall efficiency of the array due to cache?
A customer’s security administrator needs to configure Access Control.
What must they do prior to performing this operation?