Which two tools would you use to help with this recommendation?
A customer's NetApp infrastructure is reaching end-of-life (EOL), and they want to inventory their NetApp cluster. The customer wants to make sure that the proposed technical refresh satisfies their growing data demands. Which two tools would you use to help with this recommendation? (Choose two.)A . Upgrade Advisor B.OneCollect C.Config...
When configuring the Nexus switches for FCoE connectivity, which two actions are required?
An administrator wants to implement FCoE for connectivity of an AFF A200 using VLAN 3011 for fabric traffic across VSAN 11. When configuring the Nexus switches for FCoE connectivity, which two actions are required?(Choose two.)A . Create a new virtual FC interface and bind the physical interface to it. B.Add...
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ____.
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ____.A . 16-bit B.32-bit C.64-bit D.Foreign E.UnknownView AnswerAnswer: D
Which two locations will give you access?
You are troubleshooting a node that had a core dump. The HA partner took over and you successfully performed a giveback. You need to get access to the core files. Which two locations will give you access? (Choose two.)A . /mroot/etc/crash B.https://<cluster-mgmt-LIF>/spi/ C.https://<cluster-mgmt-LIF> D./mroot/etc/logView AnswerAnswer: AB
Referring to the exhibit, what is needed to allow hosts to log into the iSCSI target?
Exhibit: You are asked to serve iSCSI LUNs in an existing SVM on your AFF A220 using ONTAP 9.5. You verified that the iSCSI license is configured on your cluster and that the iSCSI protocol is enabled. Referring to the exhibit, what is needed to allow hosts to log into...
Which objects reside inside an igroup?
Which objects reside inside an igroup?A . host initiators B.LUNs C.qtrees D.volumesView AnswerAnswer: A
Which two ONTAP features would be used to restrict or limit the available paths seen from the host?
You ate deploying an 8-node FAS8200 ONTAP cluster and attaching to an existing FC fabric. Which two ONTAP features would be used to restrict or limit the available paths seen from the host? (Choose two.)A . port sets B.igroup C.VLAN D.Selective LUN MapView AnswerAnswer: AD
In this scenario, what would be the reason for the disconnects?
A company has 20 ESX hosts. Ten of the hosts are connected using FC, and the rest are connected over iSCSI. The FC host HBA queue depth is set to 32, and the iSCSI LUN queue depth is set to 64. The FC hosts are now experiencing random connectivity issues....
UNIX allows file access based on ____.
UNIX allows file access based on ____.A . NT ACLs and UNIX permissions. B.NT ACLs and SID. C.GID or UID and UNIX permissions. D.GID or UID and ACLs.View AnswerAnswer: C
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)A . restore to a non existing qtree with DOT 7.2 B.add the new qtree to the primary storage system with DOT 7.2 C.overwrite the existing qtree on the...