Which two steps are required to accomplish this task?
An SVM is configured to authenticate SVM administrators with the access method set to Password. A computer account for the SVM exists on the Active Directory domain controller. You are now required to authenticate administrators trough domain. Which two steps are required to accomplish this task? (Choose two.)A . Re-create...
Which two types of HA policies are applied to which types of aggregates? (Choose two.)
Which two types of HA policies are applied to which types of aggregates? (Choose two.)A . storage failover (SFO) policy to data aggregates onlyB . controller failover (CFO) policy to all the aggregatesC . storage failover (SFO) policy to root aggregates onlyD . controller failover (CFO) policy to root aggregatesView...
Referring to the exhibit, which UNIX command must be executed to accomplish this task?
Click the Exhibit button. Assuming that the export policy on the storage allows access, you want to enable client access to the finance volume in the departments SVM in the /tmp/fin directory. Referring to the exhibit, which UNIX command must be executed to accomplish this task?A . mount Ct nfs...
How do you accomplish this task?
You want to use UTA2 ports for native FC LUN access. How do you accomplish this task?A . Configure the UTA2 ports as target ports with 16 Gb SFP+ transceivers.B . Configure the UTA2 ports as target ports with 10 Gb SFP+ transceiversC . Configure the UTA2 ports as initiator...
What are two advantages of creating small RAID groups inside an aggregate? (Choose two.)
What are two advantages of creating small RAID groups inside an aggregate? (Choose two.)A . maximized storage spaceB . decreased risk of multiple disk failureC . shorter reconstruction timeD . additional available spare drivesView AnswerAnswer: BD
How many of the new disks are used for data?
Exhibit: The maximum RAID group size of the RAID-DP aggr1 shown in the exhibit is 18. You expand the aggregate by 20 disks. How many of the new disks are used for data?A . 20B . 16C . 14D . 18View AnswerAnswer: D
Which block protocol does ONTAP Cloud support?
Which block protocol does ONTAP Cloud support?A . iSCSIB . FCoEC . CIFSD . NFSView AnswerAnswer: A
When you create a FlexVol volume, which security style is applied by default?
When you create a FlexVol volume, which security style is applied by default?A . the security style of the SVM root volumeB . the security style of the root volume of the clusterC . NTFSD . UNIXView AnswerAnswer: B
In this situation, which command would accomplish this task?
You need to move a FlexVol volume from one SVM to another. In this situation, which command would accomplish this task?A . volume createB . volume rehostC . volume modifyD . volume moveView AnswerAnswer: B
Which mediator type is required for an ONTAP Select 2-node HA solution?
Which mediator type is required for an ONTAP Select 2-node HA solution?A . mediator codeB . mediator storage virtual machineC . mediator clusterD . mediator virtual machineView AnswerAnswer: D