Card Set Information

2014-03-20 04:01:42
Show Answers:

  1. What are two methods of
    protecting LUN overwrites using Snapshot copies on a volume with
    fractional reserve set to 0%? (Choose two)

    A. Snap Autodelete

    B. iGroup throttle

    C. LUN reset

    D. Volume AutoSize
    Ans. A and D
  2. Which set of protocols
    provide block-level access to NetApp storage?

    A. SNA and RPC

    B. iSCSI and FCP

    C. HTTP and FTP

    D. CIFS and NFS
    Ans. B
  3. An iSCSI or FC SAN
    implementation provides ____________ access to LUNs.

    A. VLD

    B. VIIP

    C. File

    D. Block
    Ans. D
  4. Which two commands can be
    used to enable LUN reservations? (Choose two)

    A. lun set reservation

    B. lun reservation set

    C. lun map

    D. lun create
    Ans. A and D
  5. Which Data ONTAP option
    sets system-wide for all transfers?

    A. Options

    B. Options

    C. Option

    D. Options
    Ans. D
  6. What is the correct format
    for the scheduling component of a SnapVault schedule?

    A. cnt[@day_list][@hour_list]


    C. Crontable format

    D. List of dates in ISO
    Date format
    • Ans. A
  7. When will a Volume
    SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?

    A. When the 64-bit volumes
    has Volume Guarantee disabled

    B. When the 64-bit volume
    has compression enabled

    C. When the 64-bit volume
    has FlexShare enabled

    D. When the 64-bit volume
    has ASIS enabled
    Ans. B
  8. UNIX allows file access
    based on___________.

    A. NT ACLs and UNIX

    B. NT ACLs and SID.

    C. GID or UID and UNIX

    D. GID or UID and ACLs.
    Ans. C
  9. Which statement describes
    the results of the SnapMirror resynce command?

    A. Resynchronization finds
    the newest common snapshot shared by the two volumes or qtree, and removes all
    newer information on the storage system on which the command is run.

    B. Resynchronization will
    cause the loss of all data written to the destination after the original base
    snapshot was made.

    C. Resynchronization will
    update the snapshot on the destination filer.

    D. Resynchronization will
    update the snapshot on the source filer.
    Ans. A
  10. If you were troubleshooting
    and wanted to look at SnapMirror log files, what is the path to these

    A. /vol/vol0/etc/log/snaplog/

    B. /vol/vol0/etc/snapmirror/

    C. /vol/vol0/etc/snaplog/

    D. /vol/vol0/etc/log/
    Ans. D
  11. Host multi-pathing describes
    a ____________ solution that has at least two distinct
    ______________ paths to a LUN.

    A. Token ring, physical

    B. FC SAN, virtual

    C. FC or IP SAN, virtual

    D. FC or IP SAN, Physical
    Ans. D
  12. Which two will allow you to
    read and analyze a packet trace file generated by the storage system?
    (Choose two)

    A. WireShark

    B. Pktt

    C. Netmon

    D. Eternal View
    Ans. A and C
  13. How does the NetApp Remote
    Agent (RSA) connect to NetApp Support?

    A. NetApp Support initiates
    a non-secure connection to the RSA.

    B. NetApp Support initiates
    a secure connection to the RSA.

    C. The RSA initiates a
    secure connection to NetApp Support.

    D. The RSA initiates a
    non-secure connection to NetApp support.
    Ans. C
  14. What is the maximum
    distance between a standard clustered pair at 2Bbps?

    A. 100 meters

    B. 10 meters

    C. 50 meters

    D. 500 meters
    Ans. D
  15. Which exportfs command will
    temporally export the resource while ignoring the options specified in
    the /etc/exports file?

    A. exportfs – v

    B. exportfs –u <path>

    C. exportfs –a <path>

    D. exportfs – i <path>
    Ans. D
  16. Is NetApp storage
    Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?

    A. No, but you can file a
    PVR to request support.

    B. No. it is targeted for a
    future release of Data ONATP.

    C. Yes, only with a special
    license installed.

    D. Yes, it has been
    supported since 8.0.1.
    Ans. D
  17. Which two cp types would
    indicate a busy storage system? (Choose two).

    A. cp_from_log_full

    B. cp_from_busy

    C. cp_from_cp

    D. cp_from_timer
    Ans. A and C
  18. There are three phases of
    Non Disruptive Volume Movement (NDVM). What is the correct
    sequence of these phases?

    A. Setup Phase, Mirror
    Phase, Cutover Phase

    B. Initialization phase,
    Copy Phase, Migrate Phase

    C. Begin Phase, Move Phase,
    Complete Phase

    D. Setup Phase, Data Copy
    Phase, Cutover Phase
    Ans. D
  19. An iSCSI ______________ is
    established when the host initiator logs into the iSCSI target. Within
    a ______________ you can have one or more ____________.

    A. session, session,

    B. connection, session,

    C. connection, connection,

    D. session, connection,
    Ans. A
  20. Which NetApp Virtual
    Storage Tier component works at the host level?

    A. Flash Pool

    B. Flash Disk

    C. Flash Accel

    D. Flash Cache

    E. Flash IO
    Ans. C
  21. When using a Protection
    Manager policy to manage Open systems SnapValut backups on a UNIX
    server, which three valid objects to include in the data set? (Choose three)

    A. The entire client

    B. A directory

    C. A file

    D. A qtree
    Ans. A, B and C
  22. What does it signify if the
    disks are “not owned” in a FAS2020 system?

    A. The disks are mailbox

    B. The disks are spare

    C. The disks are data

    D. The disks are not used.
    Ans. D
  23. For each Open Systems
    platform directory to be backed up to the SnapVault secondary storage

    system you must execute

    A. An initial baseline copy

    B. A temporary copy

    C. An incremental copy

    D. A scheduled update copy
    Ans. A
  24. Which storage system
    command would display the WWPNs of hosts that have logged into storage
    system using a Fibre Channel connection?

    A. fcp config

    B. fcp initiator show

    C. fcp show –i

    D. fcp show initiator
    Ans. D
  25. In a Fiber Channel
    configuration, the host’s HBA is referred to as the ___________, and the
    storage system’s HBA to as the _____________.

    A. Target, initiator

    B. Primary, secondary

    C. Initiator, target

    D. Secondary, primary
    Ans. C
  26. Which action will cause a
    currently in-sync SnapMirror relationship to fail out of sync?

    A. Running snapmirroe
    update on the source storage system.

    B. Running snapmirror
    release on the source storage system.

    C. Modifying the
    /etc/snapmirror.conf file for the relationship on the source storage system

    D. Modifying the
    /etc/snapmirror.conf file for the relationship on the destination storage
    Ans. D
  27. Which is the most likely

    Posted by seenagape on
    January 15, 2014 Leave a comment (0) Go to comments

    You are trying to do a
    single file SnapRestore for a file, but you are receiving an error message
    that the directory structure no longer exists. Which is the most likely

    A. Once the directory
    structure has been deleted, you cannot restore the file using single file SnapRestore.
    You must now SnapRestore the volume.

    B. Snapshot copies have
    been created since the original directory structure was deleted.

    C. You must recreate the
    directory structure before trying to restore the file.

    D. You cannot restore a
    file to an alternate location.
    Ans. C
  28. Which mechanism allows you
    to make LUNs available to some initiators and unavailable to others?

    A. LUN masking

    B. LUN grouping

    C. LUN cloning

    D. LUN hiding
    Ans. A
  29. What utility on the storage
    system will allow you to capture network packet information?

    A. Snoop

    B. Netstats

    C. Pktt

    D. Traceroute
    Ans. C
  30. The root admin on the UNIX
    box receives an “Access Denied” message when he attempts to
    access a newly mounted qtree. What’s the most likely cause of this error?

    A. The qtree is missing
    from the /etc/hosts file.

    B. NFS is turned off on the
    storage system.

    C. The qtree is set to ntfs
    security style.

    D. The qtree has not been
    Ans. C
  31. Which two modes support
    using SnapMirror over multiple network paths?

    A. Standalone

    B. Partner

    C. Multi

    D. Failover

    E. Give back
    Ans. C and D
  32. Identify the two commands
    that could be entered on the SnapMirror destination storage system.
    (Choose two)

    A. Options
    snapmirror.access on

    B. Options
    snapmirror.resync on

    C. Snapmirror initialize

    D. Snap mirror resync
    Ans. C and D
  33. Which two operations can be
    performed with the SnapDrive for windows graphical user interface?

    A. Create volume

    B. Create Snapshot copies

    C. Create File

    D. Create Disk
    Ans. B and D
  34. Node 1 in a clustered pair
    detects that it has lost connectivity to one of its disk shelves. Node 1 is
    still up, but it cannot see one of its disk shelves. However, the partner node,
    Node 2, can see all of
    the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this
    error condition for a
    period of three minutes by default, and then forcibly take over Node 1 if the
    error condition

    A. Auto enable of giveback

    B. Negotiated Fail Over

    C. Takeover on panic

    D. Cf.quickloop.enable
    Ans. B
  35. In Data ONTAP, the root
    user is exempt from those two quotas: ______________. (Choose two)

    A. User quotas

    B. Tree quotas

    C. Root quotas

    D. Group quotas

    E. File quotas
    Ans. A and D
  36. Which two Volume SnapMirror
    (VSM) relationship are supported? (Choose two)

    A. Data ONTAP 8.0.2 64-bit
    –>Data ONTAP 8.1 64-bit

    B. Data ONTAP 8.0.2 32-bit
    –> Data ONTAP 8.0.2 64-bit

    C. Data ONTAP 7.3.2 32-bit
    –> Data ONTAP 8.1 64-bit

    D. Data ONTAP 7.3.2 32-bit
    –> Data ONTAP 8.0.2 64-bit
    Ans. A and C
  37. An aggregate is composed of
    twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare
    disks are available. Data ONTAP will then perform what action.

    A. Chooses a 72-Gigabyte
    disk and use it as is.

    B. Chooses a
    72-Gigabyte disk and right-size it.

    C. Halts after 24 hour of
    running in degraded mode.

    D. Alerts you that there
    are no 36-Gigabyte disks and wait for one to be inserted.
    Ans. B
  38. Which statement is true
    about expanding an aggregate from 32-bit to 64-bit in place?

    A. All aggregates are
    automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1

    B. The expansion is
    triggered by an aggr convert command.

    C. The expansion is
    triggered by adding disks to exceed 16 TB.

    D. The 32-bit aggregates
    are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with
    Data ONTAP 8.1 upgrade.
    Ans. C
  39. How can you “throttle”
    SnapValue updates and baseline transfers so that the primary or secondary
    is not transmitting data as it can?

    A. Use the -k option in the
    snapvault start or snapshot modify commands.

    B. SnapVault does not
    support throttling of network throughout.

    C. Use the snapvault
    throttle command.

    D. Use the -k option in the
    snapvault initialize command.
    Ans. D
  40. What types of migration are
    supported from 32-bit to 64-bit?

    A. migration of qtrees via

    B. migration of volumes via

    C. migration of volumes via

    D. Both A & B

    E. Both B & C

    F. Both A & C
    Ans. D
  41. How do you migrate LUNs
    under volumes from 32-bit to 64-bit?

    A. lrep

    B. ndmpcopy

    C. rsync

    D. snapvault
    Ans. B
  42. Which three FAS
    deduplication features exist in ONTAP 8.0 7-Mode?

    A. The deduplication
    fingerprint and change logs were moved to the root volume /etc/dedup directory.

    B. After breaking the
    deduplication volume destination mirror, the deduplication (a-sis) process continuesuninterrupted.

    C. Qtree SnapMirror is
    supported on the destination for deduplication by enabling on the source, destination,
    orboth systems.

    D. The fingerprint database
    and the change logs that the deduplication process uses are located outside
    thevolume, in the aggregate.

    E. The deduplication
    schedule is not tied to a Qtree SnapMirror update, and can be configured just like
    thededuplication schedule for any volume.
    Ans. C, D, E
  43. To manage SnapVault
    relationships with an NDMP management application, you must specify a:

    A. directory path

    B. volume and qtree

    C. SnapVault license

    D. username and password
    Ans. D
  44. When troubleshooting a
    double disk failure with SyncMirror, you decide to remove and destroy a plex
    from a mirrored aggregate. What steps remove a plex from a mirrored aggregate?

    A. Take the aggregate
    offline and use the aggr destroy command

    B. Take the aggregate
    offline and use the destroy -f command

    C. Ensure the plex is
    online and use the aggr destroy plexname command.

    D. Ensure the plex is
    offline and use the aggr destroy plexname command.
    Ans. D
  45. When replicating data
    between 32-bit and 64-bit aggregates, which two are allowed? (Choose

    A. NDMPcopy

    B. QSM

    C. vol copy

    D. VSM
    Ans. A and B
  46. For OSSV sources, the qtree
    is the basic unit of SnapVault backups.

    A. True

    B. False
    Ans. B
  47. Which OSSV tool would you
    use to perform an OSSV unattended installation?

    A. msipackage

    B. svunattendossv

    C. svconfigpackager

    D. unattendpackager
    Ans. C
  48. Which command creates a new
    SyncMirror aggregate, letting Data ONTAP select the disk drives?

    A. aggr create aggrX -d 12

    B. aggr create aggrX -m 12

    C. aggr mirror aggrX -m 12

    D. aggr mirror aggrX -n 12
    Ans. B
  49. Which SyncMirror command
    mirrors an existing unmirrored aggregate where Data ONTAP selects
    the disk drive?

    A. aggr mirror aggrY

    B. aggr mirror aggrY -m

    C. aggr mirror aggrT -d

    D. aggr mirror aggrY -m
    Ans. A
  50. Identify the two commands
    that could be entered on a system with a SnapMirror source. (Choose

    A. snapmirror update

    B. snapmirror status

    C. snapmirror initialize

    D. options
    snapmirror.access all
    Ans. B and C
  51. Which iSCSI security method
    encrypts data between the initiator and the target?

    A. IPSec

    B. CHAP

    C. LUN masking

    D. Header and Data Digests
    Ans. A
  52. You receive an error
    message from an iSCSI host stating that there is an authentication error.
    Which command would troubleshoot the failure?

    A. iscsi security show

    B. iscsi security generate

    C. iscsi show

    D. iscsi security
    Ans. A
  53. Which three steps should be
    taken when troubleshooting a “stale nfs file handle” response to a
    NFS mount request on a Solaris system? (Choose three)

    A. check the client’s fstab

    B. check the /etc/sd.conf
    file on the client

    C. check show mount -e to
    the storage system from the client

    D. check for connectivity
    to the storage system from the client

    E. check the output of the
    exportfs command on the storage system
    Ans. A, D and E
  54. Which three configurations
    would increase data transfer rates in a volume SnapMirror environment
    for traditional volumes?

    A. The destination volumes
    are flexible volumes.

    B. The destination and
    source contain disks of the same size.

    C. The destination and the
    source contain RAID groups of the same size.

    D. The destination and
    source contain the same number of raid groups.

    E. The destination and
    source storage systems are no father than 30 meters apart.
    Ans. B, C and D
  55. In Data ONTAP, both the
    Microsoft Windows Administrator and root are exempt from user and
    group quotas, but not from tree quotas.

    A. True

    B. False
    Ans. A
  56. What command would create a
    LUN clone named lun0.clone from the LUN lun0 on the volume vol2?

    A. lun clone start create
    /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent

    B. lun clone create
    /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent

    C. lun clone create
    /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent

    D. lun clone create
    /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent
    Ans. B
  57. Which command shares out
    the directory /vol/vol2/home using the share name “netapp”?

    A. cifs shares -add
    /vol/vol2 netapp

    B. cifs shares -add

    C. cifs shares -add netapp

    D. cifs shares -add netapp
    Ans. D
  58. In Data ONTAP, the root
    user is exempt from these two quotas: _______. (Choose two.)

    A. file quotas

    B. group quotas

    C. root quotas

    D. tree quotas

    E. user quotas
    Ans. B and E
  59. NetApp recommends that
    Fibre Channel switches that have both disk and tape connected to them
    should have separate zones created for each.

    A. True

    B. False
    Ans. A
  60. The quota resize command
    only affects existing /etc/quotas file target entries, not new quota

    A. True

    B. False
    Ans. A
  61. Which command will show the
    FCP target(s) on a storage system?

    A. fcp show adapter

    B. fcp show all

    C. fcp show -t

    D. fcp status
    Ans. A
  62. You are having problems
    accessing three recently-created LUNs. Given the output below, the
    reason is because all of the LUNs are using the same LUN ID of 0.
    lun show -m
    LUN pathMapped to LUNID
    —————————————————/vol/vol1/lun0 solaris-igroup0 0
    /vol/vol1/lun1 windows-igroup 0
    /vol/vol1/qtree1/lun2 aix-igroup 0
    /vol/vol1/qtree1/lun3 linux-igroup 0

    A. True

    B. False
    Ans. B
  63. Using the output below, a
    co-worker determined that these are type “Solaris” LUNs. What would your
    determination be?

    A. These are type “Solaris”

    B. Not enough information
    is given here. Run the lun map command to get the information requested.

    C. Not enough information
    is given here. Run the lun show -v command to get the information requested.

    D. Not enough information
    is given here. Run the lun status command to get the information requested.
    Ans. C
  64. Which two commands would
    help you troubleshoot a LUN that cannot be accessed by a host?
    (Choose two.)

    A. fcp show wwpn

    B. fcp wwpn

    C. igroup show

    D. lun show -err

    E. lun show -v
    Ans. C and E