NS01

Card Set Information

Author:
Anonymous
ID:
267203
Filename:
NS01
Updated:
2014-03-20 03:50:07
Tags:
NS0
Folders:
NS0
Description:
NS0
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. Which command would you use
    to verify that the iSCSI service is running?

    A. iscsi protocol

    B. iscsi service

    C. iscsi show

    D. iscsi status
    Ans. D



  2. Identify the two commands
    that could be entered on the SnapMirror destination storage system.
    (Choose two.)

    A. snapmirror resync

    B. snapmirror release

    C. snapmirror initialize

    D. options
    snapmirror.access on
    Ans. A and C
  3. Which option of the snap
    restore command allows you to specify a different directory, as long as
    the directory already exists?

    A. snap restore -c

    B. snap restore -d

    C. snap restore -r

    D. snap restore s
    Ans. C
  4. A volume is SnapMirrored
    hourly. You revert the volume using a snapshot that was created two
    days ago. Which command continues the relationship?

    A. SnapMirror initialize

    B. SnapMirror quiesce

    C. SnapMirror resume

    D. SnapMirror resync

    E. SnapMirror update
    Ans. D
  5. When you are setting up
    SnapMirror, which three are replication pre-requisites? (Choose three.)

    A. The source volume must
    be offline.

    B. SnapMirror must be
    licensed for each storage system.

    C. If you are replicating a
    volume, you must create a restricted volume to be used as the SnapMirror.

    D. The capacity of the
    SnapMirror destination must be greater than or equal to the capacity of the
    source destination volume.
    Ans. B, C and D
  6. Which three statements are
    true when using SnapRestore? (Choose three.)

    A. The volume must be
    online.

    B. SnapRestore must be
    licensed before you can use it.

    C. The snap restore enable
    on option must be enabled.

    D. The volume to be
    reverted must not be a SnapMirror destination mirror.
    Ans. A, B and D
  7. Which objects can be
    restored by a single SnapRestore command? (Choose three)

    A. file

    B. LUN

    C. qtree

    D. volume

    E. directory
    Ans. A, B and D
  8. Which three are
    pre-requisites for using SnapRestore? (Choose three.)

    A. The volume to be
    reverted must be offline.

    B. The volume to be
    reverted must not be a SnapMirror destination.

    C. You must enter the
    SnapRestore license code before you can use it.

    D. Snapshot copies must
    exist on the storage system so that you can select a snapshot for the reversion.
    Ans. B, C and D
  9. Which command or procedure
    would you use to undo a volume SnapRestore operation?

    A. snap restore -r vol

    B. snap revert -s vol

    C. snap restore undo vol

    D. You cannot undo a
    SnapRestore operation at the volume level.
    Ans. D
  10. What happens after you use
    SnapRestore to revert a volume to a specific snapshot?

    A. You must bring the
    volume back online.

    B. The storage system
    automatically performs a snapshot for that volume.

    C. The Snapshot copies that
    are older than the snapshot you used are deleted.

    D. The Snapshot copies that
    are more recent than the snapshot you used are deleted.
    Ans. D
  11. When Data ONTAP creates a
    weekly, nightly, or hourly snapshot, the value of n (as shown by the
    snap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n
    Snapshot copies. The
    higher the value of n, the _________ the snapshot.

    A. older

    B. newer

    C. more important

    D. least important
    Ans. A
  12. A SnapVault secondary
    volume can contain up to ___ Snapshot copies for data protection.

    A. 125

    B. 251

    C. 255

    D. Depends on capacity and
    number of disk drives
    Ans. B
  13. What are three true
    statements about physical reallocation of data added in ONTAP 7.3? (Choose
    three.)

    A. Use reallocate -p
    pathname to run the physical reallocate.

    B. Use aggr reallocate -p
    pathname to run the physical reallocate.

    C. Reinitialize any
    SnapMirror relationship for the new physical geometry.

    D. Volume Snapshots do not
    need to be deleted for the reallocate to run effectively.

    E. Dont run it on files,
    volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier
    than 7.2.
    Ans. A, D and E
  14. Physical Reallocation of a
    SnapMirror source volume increases the amount of data to transfer for the next
    SnapMirror update.

    A. True

    B. False
    Ans. B
  15. A snapshot is a frozen,
    read-only image of the entire Data ONTAP active file system that reflects
    the state of the ____________ at the time the snapshot was created.

    A. qtrees

    B. volume

    C. directory

    D. storage system
    Ans. B
  16. Data ONTAP uses inodes in
    an active file system to reference ___________.

    A. qtrees

    B. disk blocks

    C. file segments

    D. Snapshot copies
    • Ans. B
  17. Which command disables
    client access to Snapshot copies on a volume called flexvol1?

    A. cifs shares -change
    flexvol1 -nosnap

    B. snap access flexvol1 off

    C. vol options flexvol1
    nosnapdir on

    D. vol options flexvol1
    snapdir off

    E. vol options flexvol1
    snapdir on
    Ans. C
  18. Before running lun setup on
    the storage system, you must first create the igroup to which the
    initiator will be attached.

    A. True

    B. False
    Ans. B
  19. These are three methods of
    creating a LUN:
    * lun create
    * lun map
    * lun setup

    A. True

    B. False
    Ans. B
  20. Which set of commands
    should be used for troubleshooting Ethernet connectivity problems from
    the storage system console?

    A. ifstat, netdiag

    B. perfstat, tracert

    C. sysconfig – cr, sysstat

    D. dish shm_stats, sysstat
    Ans. A
  21. Which command displays the
    statistics for Ethernet network interfaces?

    A. ifconfig

    B. ifstat

    C. sysconfig

    D. sysstat
    Ans. B
  22. Which command is used to
    set the configuration of an Ethernet network interface?

    A. ifconfig

    B. ifstat

    C. netstat – i

    D. sysconfig – v
    Ans. A
  23. Which two are Data ONTAP
    commands for displaying performance information? (Choose two.)

    A. nfsstat

    B. perfstat

    C. sio_ntap_soll

    D. sysstat
    Ans. A and D
  24. Which statement best
    describes the output of this command? sysstat -s 5

    A. Display the default
    output every five seconds and terminate after five counts.

    B. Display extended output
    every five seconds and print a summary after five counts.

    C. Display extended output
    every five seconds and print a summary upon termination.

    D. Display the default
    output every five seconds and print a summary upon termination.
    Ans. D
  25. To collect per client NFS
    statistics on a storage system, the option nfs.per_client_stats.enable
    must be set on.

    A. True

    B. False
    Ans. A
  26. Which two are Data ONTAP
    commands for creating LUNs on a storage system? (Choose two.)

    A. lun create

    B. lun config

    C. lun make

    D. lun setup
    Ans. A and D
  27. In a Fibre Channel
    configuration, the host’s HBA is referred to as the ___________, and the
    storage system’s HBA is referred to as the __________ .

    A. initiator, target

    B. primary, secondary

    C. secondary, primary

    D. target, initiator
    Ans. A
  28. UNIX allows file access
    based on __________.

    A. GID or UID and ACLs.

    B. GID or UID and UNIX
    permissions.

    C. NT ACLs and SID.

    D. NT ACLs and UNIX
    permissions.
    Ans. B
  29. Executing this command will
    have what effect?
    Options wafl.default_security_style ntfs

    A.  It will set the security style of all files
    to be ntfs.

    B. It will change the
    security style of all qtrees to be ntfs.

    C. It will change the
    security style of all existing volumes to be ntfs.

    D. It will set the security
    style of all newly created volumes to ntfs.
    Ans. D
  30. Which two statements apply
    to an entry in the /etc/exports file regarding exporting
    directories/qtrees and volumes? (Choose two.)

    A. Each volume must be
    exported separately.

    B. Exports are accessible
    only to hosts with names.

    C. User names used in an
    export must be resolvable.

    D. Exports can access
    multiple paths on the same volume.
    Ans. A and D
  31. To automatically export
    volumes and directories on storage system reboot, include them in the
    /etc/exports file.

    A. True

    B. False
    Ans. A
  32. Which exportfs command will
    temporarily export the resource while ignoring the options specified
    in the /etc/exports file?

    A. exportfs -a

    B. exportfs -i

    C. exportfs -u

    D. exportfs -v
    Ans. B
  33. Which two commands on the
    storage system allow you to gather detailed statistics about network
    interfaces, including basic information about network connections? (Choose
    two.)

    A. ifstat -a

    B. netdiag -n

    C. netstat -i

    D. sysstat 1
    Ans. A and C
  34. To configure a storage
    system as a member of a Windows active directory domain, the time on the
    storage system must be set to be within plus or minus five minutes of the time
    on the domain
    controller.

    A. True

    B. False
    Ans. A
  35. For automatic user name
    mapping to occur for a CIFS and UNIX user name that are the same,
    you must do what?

    A. Enter the CIFS user in
    the NIS database.

    B. Enter the user names in
    the /etc/hosts.equiv file.

    C. Use both a NIS server
    and a Domain Controller in the network.

    D. Nothing: mapping will
    occur if user name authentication is available.
    Ans. D
  36. If the security style is
    set to UNIX, CIFS client file access is determined by ___________.

    A. NT ACLs

    B. the last client to set
    permissions

    C. the mapped UNIX UID/GID
    of the CIFS client and the UNIX file permissions

    D. This is not allowed: A
    CIFS client cannot access files in a path set to a security style of UNIX
    Ans. C
  37. NTFS allows file access
    based on ___________.

    A. NT ACLs and SID.

    B. NT ACLs and UNIX
    permissions.

    C. SID and password.

    D. UNIX permissions.
    Ans. A
  38. In a tape environment after
    a SnapRestore reversion of a volume, incremental backup and restore
    operations on the file or volume cannot rely on the timestamps to determine
    what data needs to be
    backed up or restored. Which course of action ensures correct incremental
    backups?

    A. Perform a base-level
    backup of the volume after you restore it.

    B. Reboot the storage
    system to reset timestamps back to their original times before the reversion.

    C. Take a new snapshot of
    the volume to create new base-level timestamps for the incremental backup.

    D. Take a new snapshot of
    the volume to create new base-level timestamps for the incremental backup, and
    then perform a base-level backup of the volume after you restore it.
    Ans. A
  39. Which changes the NDMP
    password on the Open System SnapVault agent?

    A. password

    B. password
    <new_password>

    C. svpasswd
    <new_password>

    D. svpassword
    <new_password>
    Ans. D
  40. Which three licenses are
    required for fabric-attached MetroCluster? (Choose three.)

    A. Cluster

    B. Cluster_remote

    C. Syncmirror_local

    D. Syncmirror_fabric

    E. Syncmirror_remote
    Ans. A, B and C
  41. Which are three
    characteristics of an iSCSI or FCP SAN implementation? (Choose three.)

    A. A LUN can be converted
    into a VLD.

    B. LUNs can be accessed
    using the FCP protocol.

    C. LUNs can be accessed
    using the iSCSI protocol.

    D. Block services are
    associated with an iSCSI or FCP SAN environment.
    Ans. B, C and D
  42. To determine the version of
    Data ONTAP in which a bug has been fixed, use the NOW site
    _______ utility. (Choose two.)

    A. AutoSupport

    B. Bugs Online

    C. NetApp Diagnostics

    D. Release Comparison

    E. System Configuration
    Guide
    Ans. B and D
  43. Which three
    /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?

    A. FilerA:source_vol
    FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32
    syns

    B. FilerA:source_vol
    FilerB:destination_vol – 0-55/5 * * *

    C. FilerA:source_vol
    FilerB:destination_vol – sync

    D. FilerA:source_vol
    FilerB:destination_vol outstanding=3s sync
    Ans. A, C and D
  44. Which three are valid LUN
    commands? (Choose three)

    A. lun clone

    B. lun copy

    C. lun move

    D. lun rename

    E. lun snap
    Ans. A, C and E
  45. Which three attributes
    would you specify when creating a LUN? (Choose three)

    A. The host operating
    system of the system attached to LUN.

    B. The version of Data
    ONTAP

    C. The size of the LUN.

    D. The path to the LUN.
    Ans. A, C and D
  46. Which three items are NFS
    resources for export? (Choose three.)

    A. aggregate

    B. directory/qtree

    C. file

    D. subnet

    E. volume
    Ans. B, C and E
  47. Data ONTAP 8.0 7-Mode
    supports SMB 2.0 in Windows Vista and Windows Server 2008.

    A. True

    B. False
    Ans. B
  48. Using the output below, a
    co-worker determined that these are types “Solaris” LUNs. What would
    your destination be?
    lun show – m LUN patch mapped to LUN ID ——————————————————-/vol/vol1/lun0
    solaris – igroup0 0 /vol/vol1/lun solaris- igroup1
    0 /vol/vol1/qtree1/lun2 solaris – igroup2 0 /vol/vol1/qtree1/lun3 solaris –
    igroup3 0

    A. These are type “Solaris”
    LUNs.

    B. Not enough information
    is given here. Run the lun status command to get the information requested.

    C. Not enough information
    is given here. Run the lun show –v command to get the information requested.

    D. Not enough information
    is given here. Run the lun map command to get the information requested.
    Ans. C
  49. Which statement is true
    about ASIS deduplication license with Data ONTAP 8.1?

    A. The existing 8.0 license
    key is used.

    B. A new license key is
    generated.

    C. The license is
    capacity-based.

    D. The license no longer
    exists.
    Ans. D
  50. Which MetroCluster
    configuration procedure is recommended for re-establishing a mirrored
    volume that was in a level-0 resynchronization state when it failed?

    A. Determine which volumes
    are at the remote and disaster sites.

    B. Re-create the
    synchronous mirror.

    C. Rejoin the two volumes.

    D. Turn on power to the
    cluster node at the disaster site.
    Ans. B
  51. When running deduplication
    on SnapVault destinations, which three statements are true?

    A. The target SnapVault
    controller deduplicates inline.

    B. The source SnapVault
    data is deduplicated inline on the target before it is written to disk.

    C. Deduplication internally
    synchronizes with the SnapVault schedule on the destination.

    D. The source (primary)
    system sends duplicated data even if the source data is deduplicated.

    E. Deduplication with
    SnapVault creates a snapshot, deduplicates, then deletes and recreates the
    snapshot toeffectively deduplicate savings.
    Ans. C, D and E
  52. If you believe you create
    FC SAN performance problem, which NatApp utility would gather both
    your Solaris host and storage system data for analysis?

    A. sio_ntap.exe

    B. prestart

    C. poststat

    D. perfstat
    Ans. D
  53. When using MetroCluster in
    a forced takeover mode, identify two methods for restricting access to
    the disaster site node. (Choose two)

    A. Use manual fencing

    B. Use the cf giveback –f
    command.

    C. Use the cf forcetakeover
    –d command.

    D. Turn off power to the
    disaster site node.

    E. Isolate the failed node
    from the surviving node.
    Ans. A and D
  54. The two copies SyncMirror
    volume are called ____________, which are physical copies of the
    same file system and consist of one or more RAID groups.

    A. Snapshot copies

    B. Aggregates

    C. Plexes

    D. Volumes
    Ans. C
  55. You want to create an
    automated test environment that performs a single file SnapRestore time
    you run the procedure, however, SnapRestore prompts you to confirm your
    decision to revert the
    file. How can you automate this step?

    A. Use the -f option with
    the snap restore command.

    B. Enable the options
    snaprestore_noprompts enable = on option.

    C. These prompts are for
    data protection and auditing and cannot be overridden.

    D. Enter the priv set
    advanced mode on the storage system and prompt will not appear.
    Ans. A
  56. When viewing the output of
    the sysstat –f command, which three fields are part of the output?
    (Choose three)

    A. FCP

    B. FTP

    C. CIFS

    D. NFS

    E. iSCSI
    Ans. A, C and D
  57. Five minutes ago, you
    performed a single file SnapRestore on a large NFS file. 40% of your NFS
    users are now complaining about getting “stale file handles” for the file.
    Which is the most likely
    cause of this problem, and the best procedure to correct it?

    A. This might be due to an
    NFS storage system and client mismatch. Check to see that these
    users have the same version of the NFS client that existed at the time the
    snapshot was taken.

    B. NFS users why try to
    access a reverted file without first reopening it might get a “stale file
    handle” error message. Have the users try to reopen the file and see if the
    problem is resolved.

    C. After a single file
    SnapRestore, NFS users have to reboot their systems. Have them reboot
    their systems.

    D. These users are on a
    different subnet from the others. Start troubleshooting by checking their
    subnet.
    Ans. B
  58. Which command on the
    storage system allows you to display statistics on the performance of
    system resource such as CPU, NVRAM, network interfaces, and disks?

    A. netstat

    B. netdiag

    C. pktt

    D. sysstat
    Ans. Sysstat
  59. Which three protocols can
    coexist on a NetApp storage system? (Choose three)

    A. DAFS

    B. CIFS

    C. DFS

    D. FCP

    E. NFS
    Ans. B, D and E
  60. Which three tools present
    statistics from the Data ONTAP counter manager? (Choose three)

    A. Operations manager

    B. Window perfmon

    C. Sysstat

    D. Stats
    Ans. A, B and D
  61. What security mechanism can
    an administrator use on an OSSV client to use permissions
    allowing backup to a SnapVault secondary system?

    A. MD5 authentication
    between SnapVault primary and secondary, with changeable password

    B. Contents inside file
    called access and located in OSSV /snapvault/etc

    C. QSM access list
    modifiable via svconfigurator

    D. Via /etc/hosts.equiv
    file
    Ans. C
  62. Which command disables
    client access to Snapshot copies on a volume called flexvoll?

    A. cifs shares –change
    flxvoll –nosnap

    B. snap access flexvoll off

    C. vol options flexvoll
    nonsnapdir on

    D. vol options flexvoll
    snapdir off

    E. vol options flexvoll
    snapdir on
    Ans. C
  63. Which NetApp Storage Tier
    component works controller-wide on a FAS controller?

    A. Flash Pool

    B. Flash Disk

    C. Flash Accel

    D. Flash Cache

    E. Flash IO
    Ans. D
  64. Which NetApp Storage Tier
    component works aggregate-wide on a FAS controller?

    A. Flash Pool

    B. Flash Disk

    C. Flash Cache

    D. Flash Accel

    E. Flash IO
    Ans. A

What would you like to do?

Home > Flashcards > Print Preview