What is the purpose of Epsilon?
What is the purpose of Epsilon?A . to monitor cluster healthB . to be used as a load-balancer for a 2-node clusterC . to evaluate the differences in node configurationsD . to be used as a tie-breaker for a cluster quorumView AnswerAnswer: D
Referring to the network command output shown in the exhibit, which command will allow access from svm1 to lab.local DNS?
You have a test SVM named svm1 with a LIF that needs to reach a DNS server on a different Layer 2 network. The default route for each network ends in .1 and both networks route to each other. Referring to the network command output shown in the exhibit, which...
Referring to the exhibit, which UNIX command must be executed to accomplish this task?
Click the Exhibit button. Assuming that the export policy on the storage allows access, you want to enable client access to the finance volume in the departments SVM in the /tmp/fin directory. Referring to the exhibit, which UNIX command must be executed to accomplish this task?A . mount Ct nfs...
Which two steps are required to accomplish this task?
An SVM is configured to authenticate SVM administrators with the access method set to Password. A computer account for the SVM exists on the Active Directory domain controller. You are now required to authenticate administrators trough domain. Which two steps are required to accomplish this task? (Choose two.)A . Re-create...
Which two types of HA policies are applied to which types of aggregates? (Choose two.)
Which two types of HA policies are applied to which types of aggregates? (Choose two.)A . storage failover (SFO) policy to data aggregates onlyB . controller failover (CFO) policy to all the aggregatesC . storage failover (SFO) policy to root aggregates onlyD . controller failover (CFO) policy to root aggregatesView...
Which statement regarding the command shown in the exhibit is true?
Exhibit: cluster1::> volume create -vserver vsl -volume voll -aggregate aggr1 -encrypt true Which statement regarding the command shown in the exhibit is true?A . The volume will be created and protected on an aggregate using NetApp Storage Encryption (NSE) disks.B . The volume will be created and protected using an...
Which two components are required for committing data to a WORM volume? (Choose two.)
Which two components are required for committing data to a WORM volume? (Choose two.)A . You must license SnapLock.B . You must create a SnapLock volume.C . You must create a SnapLock SVE . You must create a SnapLock Aggregate.View AnswerAnswer: AD
Which block protocol does ONTAP Cloud support?
Which block protocol does ONTAP Cloud support?A . iSCSIB . FCoEC . CIFSD . NFSView AnswerAnswer: A
In this scenario, which statement is true?
You execute the volume unmount -vserver vsl -volume vol1 command. In this scenario, which statement is true?A . Data within the vol1 volume is lost.B . All data within the junction point is inaccessible to NAS clients.C . The Snapshot policy in the volume needs to be recreated once the...
On which two types of ports would data LIFs be hosted? (Choose two.)
On which two types of ports would data LIFs be hosted? (Choose two.)A . physical ports or interface groups that host VLANsB . management e0M portC . console RJ45 portD . physical ports that are not part of interface groupsView AnswerAnswer: AD