In this scenario, which two steps should you validate before you perform the upgrade?
You currently have an 8-node cluster and want to perform a rolling upgrade to a newer version of ONTAP to solve security issues reported in the Active IQ Web site. In this scenario, which two steps should you validate before you perform the upgrade? (Choose two.)A . Run Active IQ...
How would you protect a NAS SVM root volume?
How would you protect a NAS SVM root volume?A . Create a SnapMirror copy of the root volume to a peer cluster.B . Create load-sharing mirrors.C . Create a backup the SVM configuration.D . Create a backup of the SVM root volume.View AnswerAnswer: B
Which mediator type is required for an ONTAP Select 2-node HA solution?
Which mediator type is required for an ONTAP Select 2-node HA solution?A . mediator codeB . mediator storage virtual machineC . mediator clusterD . mediator virtual machineView AnswerAnswer: D
Which FlexGroup feature in ONTAP 9.7 will accomplish this task?
You want to prevent a single file from filling up a single constituent in a FlexGroup. Which FlexGroup feature in ONTAP 9.7 will accomplish this task? (Choose the best answer.)A . Flash PoolB . fractional reserveC . Snapshot autodeleteD . elastic sizingView AnswerAnswer: D
When performing a manual MetroCluster switchover, which two statements are true? (Choose two.)
When performing a manual MetroCluster switchover, which two statements are true? (Choose two.)A . Only the user specified DR groups are switched over.B . All SVMs in the disaster site are switched over.C . All DR groups in the disaster site are switched over.D . Only the user specified SVMs...
After initiating the storage failover giveback command, how are the aggregates given back?
Node A has taken over Node B. You solved the issue that caused the takeover and are now ready to resume normal operation. After initiating the storage failover giveback command, how are the aggregates given back? (Choose the best answer.)A . CFO aggregates are automatically given back, SFO aggregates must...
Which two steps are required to accomplish this task?
An SVM is configured to authenticate SVM administrators with the access method set to Password. A computer account for the SVM exists on the Active Directory domain controller. You are now required to authenticate administrators trough domain. Which two steps are required to accomplish this task? (Choose two.)A . Re-create...
On which two types of ports would data LIFs be hosted? (Choose two.)
On which two types of ports would data LIFs be hosted? (Choose two.)A . physical ports or interface groups that host VLANsB . management e0M portC . console RJ45 portD . physical ports that are not part of interface groupsView AnswerAnswer: AD
When you create a FlexVol volume, which security style is applied by default?
When you create a FlexVol volume, which security style is applied by default?A . the security style of the SVM root volumeB . the security style of the root volume of the clusterC . NTFSD . UNIXView AnswerAnswer: B
Referring to the exhibit, which disk auto assign policy satisfies this requirement?
Exhibit: You have a FAS8200 HA pair with disks that are evenly split between nodes A and B. When a disk fails, the replacement disk must automatically assign back to the originally assigned controller, A or B. Referring to the exhibit, which disk auto assign policy satisfies this requirement?A ....