Which two statements are true when you restore a volume from a Snapshot copy? (Choose two.)
Which two statements are true when you restore a volume from a Snapshot copy? (Choose two.)A . All Snapshot copies that were created after the Snapshot copy was created are lost.B . All data that was written to the volume after the Snapshot copy was created is lost.C . The...
Which two features are supported on NetApp ONTAP? (Choose two.)
Which two features are supported on NetApp ONTAP? (Choose two.)A . SnapMirrorB . FlexCacheC . Fibre ChannelD . Storage PoolView AnswerAnswer: AB
Referring to the exhibit, which disk auto assign policy satisfies this requirement?
Exhibit: You have a FAS8200 HA pair with disks that are evenly split between nodes A and B. When a disk fails, the replacement disk must automatically assign back to the originally assigned controller, A or B. Referring to the exhibit, which disk auto assign policy satisfies this requirement?A ....
Referring to the exhibit, what are these two IPspaces?
Exhibit: You execute the cluster1::> network ipspace showcommand, and notice that two IPspaces are not able to be renamed or deleted. Referring to the exhibit, what are these two IPspaces? (Choose two.)A . IPspace2B . DefaultC . IPspace1D . ClusterView AnswerAnswer: BD
How would you protect a NAS SVM root volume?
How would you protect a NAS SVM root volume?A . Create a SnapMirror copy of the root volume to a peer cluster.B . Create load-sharing mirrors.C . Create a backup the SVM configuration.D . Create a backup of the SVM root volume.View AnswerAnswer: B
Referring to the exhibit, what is a valid storage failover scenario?
Click the Exhibit button. Referring to the exhibit, what is a valid storage failover scenario?A . Node 1 fails and Node 2 takes over Node 1's storage.B . Node 4 fails and Node 2 takes over Node 4's storageC . Node 3 fails and Node 1 takes over Node 3's...
What are three types of licenses available for ONTAP? (Choose three.)
What are three types of licenses available for ONTAP? (Choose three.)A . standardB . evaluationC . systemD . siteE . fieldView AnswerAnswer: ABD
If clients with IP addresses 10.64.19.0 and 10.64.18.20 accessed the export, what is the outcome?
Exhibit: An export policy rule for a volume is set by using the command shown in the exhibit. If clients with IP addresses 10.64.19.0 and 10.64.18.20 accessed the export, what is the outcome?A . Neither client is given access.B . Client 10.64.19.0 is given access but 10.64.18.20 is not given...
When you create a FlexVol volume, which security style is applied by default?
When you create a FlexVol volume, which security style is applied by default?A . the security style of the SVM root volumeB . the security style of the root volume of the clusterC . NTFSD . UNIXView AnswerAnswer: B
Which cluster interconnect switch model should be used in this scenario?
An administrator is designing an ONTAP solution that consists of eight FAS8200 nodes in a single cluster. Each node will use four ports for cluster connections. Which cluster interconnect switch model should be used in this scenario?A . Nexus 5596UPB . Nexus 5010C . CN1610D . CN1601View AnswerAnswer: A