Which two steps are required to accomplish this task?

An SVM is configured to authenticate SVM administrators with the access method set to Password. A computer account for the SVM exists on the Active Directory domain controller. You are now required to authenticate administrators trough domain. Which two steps are required to accomplish this task? (Choose two.)A . Re-create...

August 25, 2020 No Comments READ MORE +

What is the maximum number of nodes a NAS cluster can have?

What is the maximum number of nodes a NAS cluster can have?A . 16B . 1C . 2D . 24E . 4F . 8G . 32View AnswerAnswer: D

August 24, 2020 No Comments READ MORE +

You execute the cluster1::> network ipspace showcommand, and notice that two IPspaces are not able to be renamed or deleted. Referring to the exhibit, what are these two IPspaces?

Exhibit: You execute the cluster1::> network ipspace showcommand, and notice that two IPspaces are not able to be renamed or deleted. Referring to the exhibit, what are these two IPspaces? (Choose two.)A . IPspace2B . IPspace1C . ClusterD . DefaultView AnswerAnswer: CD

August 24, 2020 No Comments READ MORE +

Which two NFS versions are supported on clustered Data ONTAP 9?

Which two NFS versions are supported on clustered Data ONTAP 9? (Choose two.)A . NFSv4B . NFSv2C . NFSv1D . NFSv3View AnswerAnswer: AD

August 23, 2020 No Comments READ MORE +

A storage administrator currently has an 8-node FAS8200 cluster with CIFS, NFS, and iSCSI licenses installed. In this scenario, how many additional nodes are supported?

A storage administrator currently has an 8-node FAS8200 cluster with CIFS, NFS, and iSCSI licenses installed. In this scenario, how many additional nodes are supported?A . 3B . 1C . 4D . 6View AnswerAnswer: C

August 23, 2020 No Comments READ MORE +

When you deduplicate a thick-provisioned volume, in which area will you see space savings when using a df command?

When you deduplicate a thick-provisioned volume, in which area will you see space savings when using a df command?A . aggregateB . volumeC . nodeD . clusterView AnswerAnswer: B

August 22, 2020 No Comments READ MORE +

Which four steps must an administrator take before establishing a CIFS share?

Which four steps must an administrator take before establishing a CIFS share? (Choose four)A . Configure an export policyB . Create a volumeC . Set a default share policyD . Mount a volume within the Vserver namespaceE . Enable Active Directory routingF . Configure a share policy with the desired...

August 22, 2020 No Comments READ MORE +

A storage administrator moves a LUN from one volume to another In this scenario, what is left behind in the volume?

A storage administrator moves a LUN from one volume to another In this scenario, what is left behind in the volume?A . clones of the LUNB . Snapshot copies of the volumeC . LUN geometry settingsD . all of the deduplicated blocks from the base LUNView AnswerAnswer: D

August 22, 2020 No Comments READ MORE +

What are the LIF roles that can be assigned to ports in clustered ONTAP?

What are the LIF roles that can be assigned to ports in clustered ONTAP? (choose all that apply)A . InterclusterB . Cluster managementC . DataD . ClusterE . Node managementView AnswerAnswer: ABCDE

August 22, 2020 No Comments READ MORE +

Which type of upgrade is supported from a single-node FAS2552 to a dual-node cluster with clustered Data ONTAP 9 when all 10 GB ports are used for host access?

Which type of upgrade is supported from a single-node FAS2552 to a dual-node cluster with clustered Data ONTAP 9 when all 10 GB ports are used for host access?A . a disruptive upgrade from a single-node cluster to a dual-node HA clusterB . a non-disruptive upgrade of a single-node cluster...

August 22, 2020 No Comments READ MORE +