Which two steps are required to accomplish this task?
An SVM is configured to authenticate SVM administrators with the access method set to Password. A computer account for the SVM exists on the Active Directory domain controller. You are now required to authenticate administrators trough domain. Which two steps are required to accomplish this task? (Choose two.)A . Re-create...
What is the maximum number of nodes a NAS cluster can have?
What is the maximum number of nodes a NAS cluster can have?A . 16B . 1C . 2D . 24E . 4F . 8G . 32View AnswerAnswer: D
You execute the cluster1::> network ipspace showcommand, and notice that two IPspaces are not able to be renamed or deleted. Referring to the exhibit, what are these two IPspaces?
Exhibit: You execute the cluster1::> network ipspace showcommand, and notice that two IPspaces are not able to be renamed or deleted. Referring to the exhibit, what are these two IPspaces? (Choose two.)A . IPspace2B . IPspace1C . ClusterD . DefaultView AnswerAnswer: CD
Which two NFS versions are supported on clustered Data ONTAP 9?
Which two NFS versions are supported on clustered Data ONTAP 9? (Choose two.)A . NFSv4B . NFSv2C . NFSv1D . NFSv3View AnswerAnswer: AD
A storage administrator currently has an 8-node FAS8200 cluster with CIFS, NFS, and iSCSI licenses installed. In this scenario, how many additional nodes are supported?
A storage administrator currently has an 8-node FAS8200 cluster with CIFS, NFS, and iSCSI licenses installed. In this scenario, how many additional nodes are supported?A . 3B . 1C . 4D . 6View AnswerAnswer: C
When you deduplicate a thick-provisioned volume, in which area will you see space savings when using a df command?
When you deduplicate a thick-provisioned volume, in which area will you see space savings when using a df command?A . aggregateB . volumeC . nodeD . clusterView AnswerAnswer: B
Which four steps must an administrator take before establishing a CIFS share?
Which four steps must an administrator take before establishing a CIFS share? (Choose four)A . Configure an export policyB . Create a volumeC . Set a default share policyD . Mount a volume within the Vserver namespaceE . Enable Active Directory routingF . Configure a share policy with the desired...
A storage administrator moves a LUN from one volume to another In this scenario, what is left behind in the volume?
A storage administrator moves a LUN from one volume to another In this scenario, what is left behind in the volume?A . clones of the LUNB . Snapshot copies of the volumeC . LUN geometry settingsD . all of the deduplicated blocks from the base LUNView AnswerAnswer: D
What are the LIF roles that can be assigned to ports in clustered ONTAP?
What are the LIF roles that can be assigned to ports in clustered ONTAP? (choose all that apply)A . InterclusterB . Cluster managementC . DataD . ClusterE . Node managementView AnswerAnswer: ABCDE
Which type of upgrade is supported from a single-node FAS2552 to a dual-node cluster with clustered Data ONTAP 9 when all 10 GB ports are used for host access?
Which type of upgrade is supported from a single-node FAS2552 to a dual-node cluster with clustered Data ONTAP 9 when all 10 GB ports are used for host access?A . a disruptive upgrade from a single-node cluster to a dual-node HA clusterB . a non-disruptive upgrade of a single-node cluster...