In this scenario, which NetApp migration method is supported?
You are implementing a new AFF A800 HA pair and are required to migrate NetApp E-Series E2624 data to the AFF A800 controllers. You do not have a host server that is available for the migration. In this scenario, which NetApp migration method is supported?A . OnCommand Unified Manager (OCUM)B...
Referring to the exhibit, which two actions would accomplish this task?
Click the Exhibit button. You have an existing 2-node AFF A300 cluster with premium bundle licensing applied. You need to have consistently low front end latency, and have determined that NVMe satisfies this requirement. Referring to the exhibit, which two actions would accomplish this task? (Choose two.)A . Add a...
Which action would accomplish this task?
As a system administrator, you perform a routine check of available storage space on your FAS2750. You notice that the vol_1 volume is approaching 100% capacity. The volume is configured with the space guarantee set to volume and the LUN reservation is disabled. You want to free up space in...
Which configuration does the customer need to verify in their solution?
A customer that is using an AFF A220 has a problem with a host for a new FC LUN. Other LUNs on the same SVM are working properly. This LUN is not visible on the host. Which configuration does the customer need to verify in their solution?A . LUN mapping...
Referring to the exhibit, what is the number of the slot that should be used?
Click the Exhibit button. A customer wants to add a 2-port, 32 Gb FC card to support NVMe in an AFF A700 2-node cluster. Currently, there are cards in slots 1, 2, 4, 6, 8, and 9. Referring to the exhibit, what is the number of the slot that should...
In this scenario, what happens to the data after the volume is moved?
You have a 4-node cluster with an AFF A300 HA pair and a FAS8200 HA pair. You plan on using the default storage efficiency settings. With inline data compaction, you estimate that you can save 6% of storage space. AFF A300 volumes that use under 5,000 IOPS are moved to...
A customer is required to encrypt iSCSI traffic across their public network. In this scenario, which method will accomplish this task?
A customer is required to encrypt iSCSI traffic across their public network. In this scenario, which method will accomplish this task?A . dot1qB . IPsecC . NVMeD . CHAPView AnswerAnswer: B Explanation: Reference: https://www.computerweekly.com/feature/iSCSI-security-Networking-and-security-optionsavailable
Referring to the exhibit, what needs to be enabled on the Cisco switch?
Click the Exhibit button. A customer has an AFF A700 connected to a Cisco switch and has verified connectivity but cannot see any LUNs. The customer issued the run -node scaling-01 -command fcp topology showcommand to verify the connection. Referring to the exhibit, what needs to be enabled on the...
Referring to the exhibit, which two pairs of ports are currently configurable as FC SAN LIFs?
Click the Exhibit button. Referring to the exhibit, which two pairs of ports are currently configurable as FC SAN LIFs? (Choose two.)A . 01b, 0hB . 01a, 0gC . 01a, 0hD . 01b, 0gView AnswerAnswer: AD
In this scenario, what is the minimum number of zones that you need to create within each fabric switch?
You have three Windows servers and one Linux server, each with dual-ported HBAs that are connected into a dual fabric. In this scenario, what is the minimum number of zones that you need to create within each fabric switch?A . 8B . 1C . 4D . 2View AnswerAnswer: C