What will happen if the volume vs_iscsi_exch01 reaches 85% used?
75 GB Used Size: 144 KB Used Percentage: 5% Volume Nearly Full Treshold Percent: 95% Volume Full Treshold Percent: 98% Maximum Autosize (for flexvolvs only): 6GB (DEPRECATED) CAutosize Increment (for flexvolvs only): 256MB Minimum Autosize: 5GB Autosize Grow Threshold Percentage: 85% Autosize Shrink Threshold Percentage: 50% Autosize Mode: off Autosize...
Which two steps are required for this migration and cutover?
You plan to use Foreign LUN Import (FLI) to migrate data from an older storage array to an ONTAP cluster. You have properly cabled the storage array and the NetApp nodes to your dual-fabric SAN. Which two steps are required for this migration and cutover? (Choose two.)A . Add NetApp...
What caused the problem?
Exhibit: cl01::>igroup show Cvserver svm1 VserverIgroup Protocol OS Type Initiators --------- ------------- ------ -- --------- ----------------- -------------------- svm1 esx_cluster mixed vmware 20:00:00:25:b5:11:a0:01, 20:00:00:25:b5:11:b0:01, iqn.1998-01.com.vmware:esx02 cl01::> A customer is provisioning storage for two ESXi hosts using FCoE with CNA adapters. The customer mapped the LUN to the igroup shown in the...
Which configuration must be made to achieve this requirement?
An administrator has expanded a 2-node ONTAP cluster to a 4-node ONTAP cluster. The cluster is using FC LUNs with all of the default settings. You must rebalance the LUNs to the new nodes. Which configuration must be made to achieve this requirement?A . The new nodes must be added...
Which two ONTAP features would be used to restrict or limit the available paths seen from the host?
You ate deploying an 8-node FAS8200 ONTAP cluster and attaching to an existing FC fabric. Which two ONTAP features would be used to restrict or limit the available paths seen from the host? (Choose two.)A . port sets B. igroup C. VLAN D. Selective LUN MapView AnswerAnswer: AD
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)A . restore to a non existing qtree with DOT 7.2 B. add the new qtree to the primary storage system with DOT 7.2 C. overwrite the existing qtree...
UNIX allows file access based on ____.
UNIX allows file access based on ____.A . NT ACLs and UNIX permissions. B. NT ACLs and SID. C. GID or UID and UNIX permissions. D. GID or UID and ACLs.View AnswerAnswer: C
When designing a new SAN solution, which three components should be verified with the IMT? (Choose three.)
When designing a new SAN solution, which three components should be verified with the IMT? (Choose three.)A . the connection protocol B. the patch panel make and model C. host OS type and version D. the type of Ethernet switch E. the clustered Data ONTAP versionView AnswerAnswer: ACE
Referring to the exhibit, which FC LIF would cause a path failure on a host connecting to a LUN?
Exhibit: Referring to the exhibit, which FC LIF would cause a path failure on a host connecting to a LUN?A . fcp_sanluns01prod02p0g B. fcp_sanluns01prod02p0e C. fcp_sanluns01prod02p0g D. fcp_sanluns0lptodOlp0eView AnswerAnswer: B
Which tool collects configuration data from hosts and switches to assist in evaluating a qualified configuration?
Which tool collects configuration data from hosts and switches to assist in evaluating a qualified configuration?A . System Manager B. sysstat. command C. SnapCenter D. OneCollectView AnswerAnswer: D