Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)

Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)A . SVM previous versions enabledB . Volume snapshot copyC . Enable FlexClone operationsD . Share previous versions enabledView AnswerAnswer: B D

September 15, 2024 No Comments READ MORE +

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)A . Block user accessB . Email the administratorsC . Create a new snapshotD . Offline the suspicious volumeView AnswerAnswer: B C

September 15, 2024 No Comments READ MORE +

In cluster takeover mode, the shared interface assumes the identity of the

In cluster takeover mode, the shared interface assumes the identity of theA . local interface onlyB . failed partner interface onlyC . local and failed partner interfacesD . None of the aboveView AnswerAnswer: C

September 14, 2024 No Comments READ MORE +

Which command parameter will result in a thin-provisioned LUN?

Which command parameter will result in a thin-provisioned LUN?A . -space-reservation disabledB . -space-guarancea noneC . -space-allocation enabledD . -space-guarantee volumeView AnswerAnswer: A

September 14, 2024 No Comments READ MORE +

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)A . Block user accessB . Email the administratorsC . Create a new snapshotD . Offline the suspicious volumeView AnswerAnswer: B C

September 14, 2024 No Comments READ MORE +

It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?

It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?A . TrueB . FalseView AnswerAnswer: A

September 14, 2024 No Comments READ MORE +

A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.

A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.A . 125B . 251C . 255D . Depends on capacity and number of disk drivesView AnswerAnswer: B

September 13, 2024 No Comments READ MORE +

Which command displays the disk ownership for both CPU modules in a FAS270C appliance?

Which command displays the disk ownership for both CPU modules in a FAS270C appliance?A . disk show-vB . disk display-rC . disk own -sD . vol status CrView AnswerAnswer: A

September 12, 2024 No Comments READ MORE +

Identify the two SnapMirror commands that are entered on the destination storage appliance.

Identify the two SnapMirror commands that are entered on the destination storage appliance.A . options snapmirror.access onB . snapmirror releaseC . snapmirror initializeD . snapmirror resyncView AnswerAnswer: C D

September 11, 2024 No Comments READ MORE +

The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.

The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.A . TrueB . FalseView AnswerAnswer: B

September 11, 2024 No Comments READ MORE +