Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)
Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)A . SVM previous versions enabledB . Volume snapshot copyC . Enable FlexClone operationsD . Share previous versions enabledView AnswerAnswer: B D
What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)
What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)A . Block user accessB . Email the administratorsC . Create a new snapshotD . Offline the suspicious volumeView AnswerAnswer: B C
In cluster takeover mode, the shared interface assumes the identity of the
In cluster takeover mode, the shared interface assumes the identity of theA . local interface onlyB . failed partner interface onlyC . local and failed partner interfacesD . None of the aboveView AnswerAnswer: C
Which command parameter will result in a thin-provisioned LUN?
Which command parameter will result in a thin-provisioned LUN?A . -space-reservation disabledB . -space-guarancea noneC . -space-allocation enabledD . -space-guarantee volumeView AnswerAnswer: A
What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)
What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)A . Block user accessB . Email the administratorsC . Create a new snapshotD . Offline the suspicious volumeView AnswerAnswer: B C
It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?
It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?A . TrueB . FalseView AnswerAnswer: A
A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.
A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.A . 125B . 251C . 255D . Depends on capacity and number of disk drivesView AnswerAnswer: B
Which command displays the disk ownership for both CPU modules in a FAS270C appliance?
Which command displays the disk ownership for both CPU modules in a FAS270C appliance?A . disk show-vB . disk display-rC . disk own -sD . vol status CrView AnswerAnswer: A
Identify the two SnapMirror commands that are entered on the destination storage appliance.
Identify the two SnapMirror commands that are entered on the destination storage appliance.A . options snapmirror.access onB . snapmirror releaseC . snapmirror initializeD . snapmirror resyncView AnswerAnswer: C D
The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.
The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.A . TrueB . FalseView AnswerAnswer: B