Exam4Training

Network Appliance NS0-163 NetApp Certified Data Administrator, ONTAP Online Training

Question #1

Data ONTAP uses inodes in an active file system to reference__________________.

  • A . disk blocks
  • B . file segments
  • C . qtrees
  • D . snapshots

Reveal Solution Hide Solution

Correct Answer: A
Question #2

In a Fabric Attached MetroCluster, a "disaster" is described as a:

  • A . Failure of the Inter-Switch-Links (ISL)
  • B . Malfunction of the Fiber Channel adapter on the cluster node
  • C . Failure of the interconnect cable
  • D . Prolonged communication disruption

Reveal Solution Hide Solution

Correct Answer: D
Question #3

You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the directory structure no longer exists.

Which one of the following is the most likely explanation?

  • A . You must recreate the directory structure before trying to restore the file.
  • B . Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore. You must now SnapRestore the volume.
  • C . Snapshots have been created since the original directory structure was deleted.
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A
Question #4

When creating an S3 bucket using System Manager, ONTAP uses which default performance service level for an AFF?

  • A . Extreme
  • B . Value
  • C . Custom
  • D . Performance

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Identify the two SnapMirror commands that are entered on the source storage appliance.

  • A . options snapmirror.access on
  • B . snapmirror status
  • C . snapmirror initialize
  • D . snapmirror resync

Reveal Solution Hide Solution

Correct Answer: A B
Question #6

Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two.)

  • A . snapmirror update
  • B . snapmirror status
  • C . snapmirror initialize
  • D . options snapmirror.access all

Reveal Solution Hide Solution

Correct Answer: B D
Question #7

If the local node has its FC HBA connected to switch Bank 1, it owns the disks connected to switch bank

  • A . 1
  • B . 3
  • C . 4
  • D . 2

Reveal Solution Hide Solution

Correct Answer: D
Question #8

Fill in the blank for the following statement: To manage a SnapVault backup through a commercial NDMP application, you must specify a_____authorized through that application.

  • A . volume and qtree
  • B . directory path
  • C . User and password
  • D . SnapVault license

Reveal Solution Hide Solution

Correct Answer: C
Question #9

The snapvault snap sched-x command can be used to:

  • A . Schedule full backups
  • B . Start initial backups
  • C . Schedule incremental backups
  • D . Specify platforms that can be backed up

Reveal Solution Hide Solution

Correct Answer: C
Question #10

You can unlicense the cluster feature only in

  • A . normal, disabled
  • B . normal, enabled
  • C . takeover, disabled
  • D . takeover, enabled

Reveal Solution Hide Solution

Correct Answer: A

Question #11

Which one of the following is not a pre-requisite for using SnapRestore?

  • A . You must enter the SnapRestore license code before you can use it.
  • B . Snapshots must exist on the storage appliance so that you can select a snapshot for the reversion.
  • C . The volume to be reverted must be offline.
  • D . The volume to be reverted must not be a SnapMirror destination.

Reveal Solution Hide Solution

Correct Answer: C
Question #12

Which two conditions would prevent an ONTAP upgrade? (Choose two.)

  • A . Established iSCSI sessions
  • B . Offline volume
  • C . Failed disk
  • D . Offline LIF
  • E . Established NFS sessions

Reveal Solution Hide Solution

Correct Answer: B C
Question #13

To restore a primary SnapVault qtree to the exact qtree location on the primary storage system (from which it was backed up), you must:

  • A . Add the new qtree to the primary storage system
  • B . Restore to a non-existing qtree
  • C . Overwrite the existing qtree on the primary storage system
  • D . Delete the existing qtree from the secondary storage system

Reveal Solution Hide Solution

Correct Answer: B
Question #14

A mirrored volume. volX. is composed of twelve 36-Gigabyre disks: six in volX/plex0. six in volX/plex1. A drive fails in plexl. bur pool 1 contains only 72-Gigabyte spare disks. Data ONTAP will do which of the following?

  • A . Choose a 72-Gigabyte disk and downsize it
  • B . Halt after 24 hours of running in degraded mode
  • C . Alert you that there are no 36-Gigabyte disks and wait for one to be inserted
  • D . Stop any applications that are running

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which one of the following is not a pre-requisite for using SnapRestore?

  • A . You must enter the SnapRestore license code before you can use it.
  • B . Snapshots must exist on the storage appliance so that you can select a snapshot for the reversion.
  • C . The volume to be reverted must be offline.
  • D . The volume to be reverted must not be a SnapMirror destination.

Reveal Solution Hide Solution

Correct Answer: C
Question #16

Which NetApp SnapMirror method allows for transparent failover between two AFF clusters with applications using iSCSI LUNs?

  • A . SM BC
  • B . SnapVault
  • C . SVM-DR
  • D . SM_S

Reveal Solution Hide Solution

Correct Answer: A
Question #17

When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the UNIX Is command) is adjusted for all the weekly, nightly, or hourly snapshots. The higher the value of n. the_________the snapshot.

  • A . newer
  • B . older
  • C . more important
  • D . least important

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which native ONTAP feature allows an administrator to block a Windows user from writing files with the.crypto extension?

  • A . FPolicy
  • B . Kerberos
  • C . IP-SEC
  • D . FIPS

Reveal Solution Hide Solution

Correct Answer: A
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C

Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #19

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

  • A . Block user access
  • B . Email the administrators
  • C . Create a new snapshot
  • D . Offline the suspicious volume

Reveal Solution Hide Solution

Correct Answer: B C
Question #26

Perform steps 1-5 above on the partner node.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #27

Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Which two default HA features work together to reduce and avoid client outages on an ONTAP FAS cluster? (Choose two.)

  • A . Automatic SAN LIF migration
  • B . Automatic failover
  • C . Automatic giveback
  • D . Automatic takeover

Reveal Solution Hide Solution

Correct Answer: C D
Question #29

Which one of the following actions will cause a currently in sync snapmirror relationship to fall out of sync?

  • A . Modifying the /etc/snapmirror.conf file on the source storage appliance
  • B . Modifying the /etc/snapmirror.conf file on the destination storage appliance
  • C . Running snapmirror update on the source storage appliance
  • D . Running snapmirror release on the source storage appliance

Reveal Solution Hide Solution

Correct Answer: B
Question #30

Which one of the following statements apply to the Free Space Estimator utility?

  • A . This utility determines if there is sufficient space on the secondary volume to perform a transfer
  • B . This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer
  • C . This utility run automatically after each transfer
  • D . This utility must be enabled on the secondary storage system

Reveal Solution Hide Solution

Correct Answer: B

Question #31

Which one of the following statements apply to Advanced Single Instance Storage (ASIS)?

  • A . Eliminates duplicates files in SnapVault for NetBackup secondary volumes
  • B . Eliminates duplicates blocks in SnapVaultfor NetBackup source volumes
  • C . Eliminates duplicates blocks in SnapVault for NetBackup secondary volumes
  • D . Eliminates duplicates files in SnapVaultfor NetBackup source volumes Correct answers

Reveal Solution Hide Solution

Correct Answer: C
Question #32

You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage appliances were NFS mounted onto the Solaris host. You attempt to create a file on the NFS mount point for the inaccessible appliance, but you get the following error: NFS server filer2 not responding still trying.Symptoms:

1) When not in takeover mode, both storage appliances operate normally.

2) In takeover mode, the taken over node is not accessible on the network.

You perform a "cf giveback" and you can now create a file over NFS on both appliances.

What should you do first to resolve this issue?

  • A . Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.
  • B . Replace the NIC adapter.
  • C . Use the cluster-config-checker.cgi to identify the problem and corrective action.
  • D . Submit a new bug report.

Reveal Solution Hide Solution

Correct Answer: C
Question #33

In cluster takeover mode, the shared interface assumes the identity of the

  • A . local interface only
  • B . failed partner interface only
  • C . local and failed partner interfaces
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: C
Question #34

Which one of the following /etc/snapmirror.conf entries will not support synchronous SnapMirror?

  • A . FilerA:source_vol FilerB: destination_vol- sync
  • B . FilerA: source_vol FilerB: destination_vol outstanding=3s sync
  • C . FilerA: source_vol FilerB: destination_vol-0-55/5***
  • D . FilerA: source_vol FilerB: destination_vol visibility_interval=1hr, outstanding=3ms, cksum=crc32 sync

Reveal Solution Hide Solution

Correct Answer: C
Question #35

Due to the sensitive nature of AutoSupport messages, what transport protocol should a storage administrator configure?

  • A . HTTPS
  • B . HTTP
  • C . SFTP
  • D . SMTP

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Which two commands could be used if the cf giveback command foils? (Choose 2)

  • A . cf giveback -force
  • B . cf giveback -f
  • C . cf forceeiveback -f
  • D . cf forceeiveback

Reveal Solution Hide Solution

Correct Answer: B D
Question #37

When you issue the snapmirror status command, to what does the "Lag" column refer?

  • A . The amount of time it takes for the baseline transfer to complete.
  • B . The difference between the current time and the last basic snapshot creation time on the destination for a transfer which completed successfully.
  • C . The difference between the current time and the last basic snapshot creation time on the source for a transfer which completed successfully.
  • D . The difference between the most recent snapshot and the last basic snapshot creation time on the source for a transfer which completed successfully.

Reveal Solution Hide Solution

Correct Answer: C
Question #38

Which statement describes the results of the snapmirror resync command?

  • A . Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.
  • B . Resynchronization will cause the loss of all data written to the destination after the original base snapshot was made.
  • C . Resynchronization will update the snapshot on the source filer
  • D . Resynchronization will update the snapshot on the destination filer.

Reveal Solution Hide Solution

Correct Answer: A
Question #39

Which one of the following would you use to change the NDMP password on the Open System SnapVault agent?

  • A . svpasswd
  • B . svpassword <new_password>
  • C . password <new_password>
  • D . password

Reveal Solution Hide Solution

Correct Answer: B
Question #40

What command would you enter to restore the /vol/flexvol0/etc/rc file from a snapshot to the /vol/flexvol0/home directory?

  • A . snap restore -r vol /vol/flexvol0/home/rc /vol/flexvol0/etc/rc
  • B . snap restore -t /vol/flexvol0/home/rc /vol/flexvol0/etc/rc
  • C . snap restore -t file -r /vol/flexvol0/home/rc /vol/flexvol0/etc/rc
  • D . snap restore -s /vol/flexvol0/home/rc /vol/flexvol0/etc/rc

Reveal Solution Hide Solution

Correct Answer: C

Question #41

It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #42

Which command allows you to access the other nodes console after a takeover has occurred?

  • A . toggle
  • B . switch
  • C . partner
  • D . takeover

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which one of the following commands is used to specify the destination appliance(s) that are allowed to replicate (pull) data from the source appliance?

  • A . options snapmirror.allow
  • B . snapmirror release
  • C . snapmirror initialize
  • D . options snapmirror.access

Reveal Solution Hide Solution

Correct Answer: D
Question #44

Which statement describes the results of the snapmirror resync command?

  • A . Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.
  • B . Resynchronization made. cause the loss of all data written to the destination after the original base snapshot was
  • C . Resynchronization. update the snapshot on the source filer.
  • D . Resynchronization. update the snapshot on the destination filer.

Reveal Solution Hide Solution

Correct Answer: A
Question #45

A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plex was built. Data ONTAP will:

  • A . Choose spare disks to reconstruct from the opposite pool
  • B . Warn you that there are no available spares from the proper pool
  • C . "Halt" after 24 hours if spare disks are not added to the proper pool
  • D . Stop all applications that are running

Reveal Solution Hide Solution

Correct Answer: B
Question #46

Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)

  • A . SVM previous versions enabled
  • B . Volume snapshot copy
  • C . Enable FlexClone operations
  • D . Share previous versions enabled

Reveal Solution Hide Solution

Correct Answer: B D
Question #47

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

  • A . 1
  • B . 2
  • C . 4
  • D . 6

Reveal Solution Hide Solution

Correct Answer: B
Question #48

After you use SnapRestore to revert a volume to a specific snapshot,….

  • A . snapshots that are older than the snapshot you used to revert are deleted.
  • B . the storage appliance automatically performs a snapshot for that volume.
  • C . snapshots that are more recent than the snapshot you used to revert are deleted.
  • D . you must bring the volume back online.

Reveal Solution Hide Solution

Correct Answer: C
Question #49

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of Node 1s disk shelves.

Which one of the following features will cause Node 2 to monitor this error condition for a period of three minutes (by default), and then forcibly take over Node 1 if the error condition persists?

  • A . Takeover on panic
  • B . Negotiated Fail Over
  • C . Auto enable of giveback
  • D . cf.quickloop.enable

Reveal Solution Hide Solution

Correct Answer: B
Question #50

What console message is a good indication that the storage appliance is ready to reinstate the cluster from a previous takeover?

  • A . waiting for takeover
  • B . waiting for giveback
  • C . resume takeover
  • D . enter cf giveback

Reveal Solution Hide Solution

Correct Answer: B

Question #51

Which two supported methods would you use to restore data from a SnapVaultfor NetBackup Volume?

  • A . Use the NetBackup Administration Console
  • B . Use drag-and-drop technologies
  • C . Use the snapvault restore Data ONTAP command
  • D . Use the SnapRestore Data ONTAP service

Reveal Solution Hide Solution

Correct Answer: A B
Question #52

For a configuration change to be effective when using the OSSV configurator, the OSSV service must be restarted.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #53

Which one of the following is not recommended as a secondary system for SnapVault?

  • A . NearStore R200
  • B . FAS900 series
  • C . F700 series
  • D . FS80

Reveal Solution Hide Solution

Correct Answer: C
Question #54

You have determined that the failure to a MetroChister is a disaster.

Which step should you take?

  • A . Ensure the surviving node is isolated from its partner.
  • B . Force the surviving node to take over the functions of its partner.
  • C . Remount the failed partners volume.
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #55

When you are setting up SnapMirror, which one of the following is not a replication pre-requisite?

  • A . SnapMirror must be licensed for each storage appliance.
  • B . The source volume must be offline.
  • C . If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror destination volume.
  • D . The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source.

Reveal Solution Hide Solution

Correct Answer: B
Question #56

The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #57

What does it signify if the disks are "not owned" in a FAS270C appliance?

  • A . The disks are data disks.
  • B . The disks are spare disks.
  • C . The disks are mailbox disks.
  • D . The disks are not used.

Reveal Solution Hide Solution

Correct Answer: D
Question #58

Which two supported methods would you use to restore data from a SnapVault for NetBackup Volume?

  • A . Use the NetBackup Administration Console
  • B . Use drag-and-drop technologies
  • C . Use the snapvault restore Data ONTAP command
  • D . Use the SnapRestore Data ONTAP service

Reveal Solution Hide Solution

Correct Answer: A B
Question #59

In a fabric-attached MetroCluster, hardware disk ownership by a node is determined by which two factors (Choose two.)

  • A . the system ID of the controller
  • B . what types of ports are on the HBA
  • C . the location of the HBA or onboard port
  • D . what types of disks are used in the cluster
  • E . how the disks are configured by the administrator
  • F . which switch ports the controller and disks are connected to

Reveal Solution Hide Solution

Correct Answer: C F
Question #60

The required hardware to add SyncMirror to an existing system would be ___________.

  • A . disk shelves and cluster interconnect
  • B . disk shelves and termination switches
  • C . disk shelves, Ethernet adapters, and cabling
  • D . disk shelves, Fibre Channel adapters, and cabling

Reveal Solution Hide Solution

Correct Answer: D

Question #61

Which three of the following configurations would increase data transfer rates for traditional volume SnapMirror?

  • A . The destination and source contain disks of the same size.
  • B . The destination and source contain RAID groups of the same size.
  • C . The destination and source storage appliances are no further than 30 meters apart.
  • D . The destination and source contain the same number of RAID groups.

Reveal Solution Hide Solution

Correct Answer: A B D
Question #62

Which OSSV package would you use to perform an OSSV unattended installation?

  • A . svunattendossv
  • B . unattendpackager
  • C . svconfigpackager
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: C
Question #63

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drives?

  • A . aggr mirror aggrY
  • B . aggr mirror aggrY-m
  • C . aggr mirror aggrY-d 12@ 144
  • D . aggr mirror aggrY-m 12@ 144

Reveal Solution Hide Solution

Correct Answer: A
Question #64

If you were troubleshooting and wanted to look at SnapMirror log files, what is the path and directory to these files?

  • A . root volume, /etc/snaplog/
  • B . ootvolume, /etc/log/snaplog/
  • C . root volume, /etc/log/
  • D . destination volume, /etc/log/

Reveal Solution Hide Solution

Correct Answer: C
Question #65

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #66

The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #67

A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago.

Which command continues the relationship?

  • A . SnapMirror initialize
  • B . SnapMirror quiesce
  • C . SnapMirror resume
  • D . SnapMirror resync
  • E . SnapMirror update.

Reveal Solution Hide Solution

Correct Answer: D
Question #68

Which tool is available on a non-NetApp primary system to assist in starting or stopping SnapVault, modifying NDMP settings, enabling debugging, and capturing trace files?

  • A . Data Fabric Manager
  • B . Svconfigurator GUI
  • C . svdebug.exe
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: B
Question #69

Which ONTAP feature will allow WORM and non-WORM volumes in the same aggregate?

  • A . NetApp Aggregate Encryption
  • B . Unified Aggregate
  • C . SnapLock Enterprise
  • D . SnapLock Compliance

Reveal Solution Hide Solution

Correct Answer: B
Question #70

An administrator has an ESXi cluster with VMware VMFS LUNs on an AFF system. Alter troubleshooting performance issues, the administrator determines that timeout best practices are not set on the hosts.

Which NetApp tool would apply the best practice settings?

  • A . SnapCenter Plug-in for VMware vSphere
  • B . SAN Host Utilities
  • C . SnapManager
  • D . ONTAP Tools for vSphere

Reveal Solution Hide Solution

Correct Answer: D

Question #71

Which command parameter will result in a thin-provisioned LUN?

  • A . -space-reservation disabled
  • B . -space-guarancea none
  • C . -space-allocation enabled
  • D . -space-guarantee volume

Reveal Solution Hide Solution

Correct Answer: A
Question #72

Which ONTAP feature discards identical blocks and replaces them with references to a single shared block?

  • A . Compression
  • B . Deduplication
  • C . Thin provisioning
  • D . Compaction

Reveal Solution Hide Solution

Correct Answer: B
Question #73

Identify the two SnapMirror commands that are entered on the destination storage appliance.

  • A . options snapmirror.access on
  • B . snapmirror release
  • C . snapmirror initialize
  • D . snapmirror resync

Reveal Solution Hide Solution

Correct Answer: C D
Question #74

An administrator has presented a thinly provisioned (SCSI LUN to your ESXi host. The administrator deleted data from the datastore in ESXi. No blocks have been freed on the LUN.

What are two of the steps the administrator should use to solve this problem? (Choose two.)

  • A . Rescan the storage from the host
  • B . Use the vmfs muoap command
  • C . Set the space-allocation to enabled
  • D . Set the volume to thin-provisioned

Reveal Solution Hide Solution

Correct Answer: A C
Question #75

Which two Interfaces can an administrator use to disable unused Ethernet ports on an ONTAP cluster? (Choose two.)

  • A . System Manager
  • B . Active IQ Unified Manager
  • C . Command line Interface
  • D . Active IQ Conflg Advisor

Reveal Solution Hide Solution

Correct Answer: A C
Question #76

Which three tools present statistics from the Data ONTAP counter manager? (Choose three.)

  • A . stats
  • B . sysstat
  • C . windows perfmon
  • D . operations manager

Reveal Solution Hide Solution

Correct Answer: A C D
Question #77

Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?

  • A . snap restore-r
  • B . snap restore-d
  • C . snap restore -s
  • D . snap restore-c

Reveal Solution Hide Solution

Correct Answer: A
Question #78

Which two products can be used to administer Cloud Volumes ONTAP? (Choose two.)

  • A . Cloud Data Sense
  • B . System Manager
  • C . NetApp BlueXP
  • D . CloudCheckr

Reveal Solution Hide Solution

Correct Answer: B C
Question #79

Which one of the following statements is not true when using SnapRestore?

  • A . SnapRestore must be licensed before you can use it.
  • B . The options snaprestore <vol_path_name> enable on option must be enabled.
  • C . The volume to be reverted must not be a SnapMirror destination mirror.
  • D . The volume must be online.

Reveal Solution Hide Solution

Correct Answer: B
Question #80

What is the maximum distance between a standard clustered pair?

  • A . 10 meters
  • B . 50 meters
  • C . 100 meters
  • D . 500 meters

Reveal Solution Hide Solution

Correct Answer: D

Question #81

Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS users are now complaining about getting "stale file handles" for the file.

Which one of the following is the most likely cause of this problem, and the best procedure to correct it?

  • A . These users are on a different subnet from the others. Start troubleshooting by checking their subnet.
  • B . After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their systems.
  • C . This might be due to an NFS storage appliance and client version mis-match. Check to see that these users have the same version of the NFS client that existed at the time the snapshot was taken.
  • D . NFS users who try to access a reverted file without first reopening it might get a "stale file handle" error message. Have the users try to reopen the file and see if the problem is resolved.

Reveal Solution Hide Solution

Correct Answer: D
Question #82

An administrator has an existing FlexVol accessed by Linux hosts over NFSv3. A CIFS share to the same FlexVol was created for SMB access. Windows users are unable to view the share. CIFS share permissions allow for read and write access for the Windows users.

What does the administrator need to modify to allow SMB access?

  • A . Security style
  • B . Junction paths
  • C . Export policies
  • D . User mapping

Reveal Solution Hide Solution

Correct Answer: A B
Question #83

When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server, which three are valid objects to include in the data set? (Choose three.)

  • A . a file
  • B . A qtree
  • C . A directory
  • D . The entire client

Reveal Solution Hide Solution

Correct Answer: A C D
Question #84

In a Fabric Attached Metro Cluster, disk ownership by a node is determined by_____________.

  • A . where the FC HBAs for disks connect into the switch, and by where the disks connect to the switch banks.
  • B . the types of disks used in the cluster.
  • C . the ports on the FC HBA.
  • D . the slots in which the FC HBA is installed.

Reveal Solution Hide Solution

Correct Answer: A
Question #85

You can avoid data corruption when you issue the cf forcetakeover-d command if the remote node is

  • A . powered on and accessible.
  • B . fenced off manually.
  • C . Powered off and inaccessible.
  • D . in a giveback mode.

Reveal Solution Hide Solution

Correct Answer: C
Question #86

The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #87

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of Node 1s disk shelves.

Which one of the following features will cause Node 2 to monitor this error condition for a period of three minutes (by default), and then forcibly take over Node 1 if the error condition persists?

  • A . Takeover on panic
  • B . Negotiated Fail Over
  • C . Auto enable of giveback
  • D . cf.quickloop.enable

Reveal Solution Hide Solution

Correct Answer: B
Question #88

Which NetApp solution enables block-level backup and restore from ONTAP to StorageGRID?

  • A . LockVault
  • B . SnapRestore
  • C . FabricPool
  • D . Cloud Backup

Reveal Solution Hide Solution

Correct Answer: D
Question #89

The snapvault update command is only available on the secondary system.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #90

For a configuration change to be effective when using the OSSV configurator, the OSSV service must be restarted.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #91

For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex must be identical with regard to____________.

  • A . Mirrored snapshots.
  • B . RAID groups and disk sizes.
  • C . NDMP and snapshots.
  • D . NVRAM.

Reveal Solution Hide Solution

Correct Answer: B
Question #92

An administrator enables the NFS protocol on an SVM and creates a volume to be used as a datastore in a VMware environment. After a rescan, the volume is not visible on the ESXi hosts.

What must the administrator validate to resolve this problem?

  • A . Export policy
  • B . Name service
  • C . Security style
  • D . Access control

Reveal Solution Hide Solution

Correct Answer: A
Question #93

Which two tools can be used to actively monitor ONTAP cluster performance? (Choose two.)

  • A . Cloud Sync
  • B . Active IQ Unified Manager
  • C . Cloud Insights
  • D . Active IQ OneCollect

Reveal Solution Hide Solution

Correct Answer: B C
Question #94

Which one of the following commands would you use to disable client access to snapshots on a volume called /vol/flexvoM?

  • A . vol options/vol/flexvoM nosnapdiroff
  • B . vol options/vol/flexvoM nosnapdiron
  • C . vol options/vol/flexvoM snapdiroff
  • D . vol options/vol/flexvoM snapdiron

Reveal Solution Hide Solution

Correct Answer: B
Question #95

A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.

  • A . 125
  • B . 251
  • C . 255
  • D . Depends on capacity and number of disk drives

Reveal Solution Hide Solution

Correct Answer: B
Question #96

Which command displays the disk ownership for both CPU modules in a FAS270C appliance?

  • A . disk show-v
  • B . disk display-r
  • C . disk own -s
  • D . vol status Cr

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version