Which two tools would you use to help with this recommendation?

A customer's NetApp infrastructure is reaching end-of-life (EOL), and they want to inventory their NetApp cluster. The customer wants to make sure that the proposed technical refresh satisfies their growing data demands. Which two tools would you use to help with this recommendation? (Choose two.)A . Upgrade Advisor B.OneCollect C.Config...

May 21, 2023No CommentsREAD MORE +

When configuring the Nexus switches for FCoE connectivity, which two actions are required?

An administrator wants to implement FCoE for connectivity of an AFF A200 using VLAN 3011 for fabric traffic across VSAN 11. When configuring the Nexus switches for FCoE connectivity, which two actions are required?(Choose two.)A . Create a new virtual FC interface and bind the physical interface to it. B.Add...

May 20, 2023No CommentsREAD MORE +

When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ____.

When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ____.A . 16-bit B.32-bit C.64-bit D.Foreign E.UnknownView AnswerAnswer: D

May 20, 2023No CommentsREAD MORE +

Which two locations will give you access?

You are troubleshooting a node that had a core dump. The HA partner took over and you successfully performed a giveback. You need to get access to the core files. Which two locations will give you access? (Choose two.)A . /mroot/etc/crash B.https://<cluster-mgmt-LIF>/spi/ C.https://<cluster-mgmt-LIF> D./mroot/etc/logView AnswerAnswer: AB

May 20, 2023No CommentsREAD MORE +

Referring to the exhibit, what is needed to allow hosts to log into the iSCSI target?

Exhibit: You are asked to serve iSCSI LUNs in an existing SVM on your AFF A220 using ONTAP 9.5. You verified that the iSCSI license is configured on your cluster and that the iSCSI protocol is enabled. Referring to the exhibit, what is needed to allow hosts to log into...

May 20, 2023No CommentsREAD MORE +

Which objects reside inside an igroup?

Which objects reside inside an igroup?A . host initiators B.LUNs C.qtrees D.volumesView AnswerAnswer: A

May 20, 2023No CommentsREAD MORE +

Which two ONTAP features would be used to restrict or limit the available paths seen from the host?

You ate deploying an 8-node FAS8200 ONTAP cluster and attaching to an existing FC fabric. Which two ONTAP features would be used to restrict or limit the available paths seen from the host? (Choose two.)A . port sets B.igroup C.VLAN D.Selective LUN MapView AnswerAnswer: AD

May 20, 2023No CommentsREAD MORE +

In this scenario, what would be the reason for the disconnects?

A company has 20 ESX hosts. Ten of the hosts are connected using FC, and the rest are connected over iSCSI. The FC host HBA queue depth is set to 32, and the iSCSI LUN queue depth is set to 64. The FC hosts are now experiencing random connectivity issues....

May 20, 2023No CommentsREAD MORE +

UNIX allows file access based on ____.

UNIX allows file access based on ____.A . NT ACLs and UNIX permissions. B.NT ACLs and SID. C.GID or UID and UNIX permissions. D.GID or UID and ACLs.View AnswerAnswer: C

May 20, 2023No CommentsREAD MORE +

To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)

To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)A . restore to a non existing qtree with DOT 7.2 B.add the new qtree to the primary storage system with DOT 7.2 C.overwrite the existing qtree on the...

May 20, 2023No CommentsREAD MORE +