Card Set Information

2014-03-20 04:13:34
Show Answers:

  1. After upgrading to DOT
    8.07-mode, you can convert existing 32-bit aggregates into 64-bit aggregates.

    A. True

    B. False
    Ans. B
  2. With 64-bit aggregates, the
    number of FlexVols that can be created on a storage controller is ____.

    A. 500

    B. 1000

    C. 6400

    D. 64000
    Ans. A
  3. The largest volume that can
    be created on a 64-bit aggregate is ___.

    A. 10 TB

    B. 16 TB

    C. 64 TB

    D. Equal to size of the
    Ans. D
  4. XML-files in
    /etc/stats/preset are used together with the sysstat command to customize the

    A. True

    B. False
    Ans. B
  5. When migrating from Data
    ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional
    aggregates are designated as ________.

    A. 16-bit

    B. 32-bit

    C. 64-bit

    D. Foreign

    E. Unknown
    Ans. B
  6. To create a 64-bit
    aggregate, which optional switch/flag/parameter/option to the aggr create
    command must be included?

    A. b 64

    B. B 64

    C. l 64

    D. L 64

    E. No optional
    switch/flag/parameter/option is needed because 64-bit aggregates are the
    Ans. B
  7. Which are three valid data
    protection solutions? (Choose three.)

    A. SnapVault toVolume SnapMirror

    B. SnapVault toVolume
    SnapMirror to SnapVault

    C. SnapVault toVolume
    SnapMirror toVolume SnapMirror

    D. Volume SnapMirror to
    Ans. A, C and D
  8. Protection Manager has
    policies that allow for tape-based protection as well as disk-based

    A. True

    B. False
    Ans. B
  9. When using a Protection
    Manager policy to manage Open Systems SnapVault backups on a UNIX
    server, which three are valid objects to include in the data set? (Choose

    A. A file

    B. A qtree

    C. A directory

    D. Theentire client
    Ans. A, C and D
  10. Protection Manager is an
    optional component of the Operations Manager that can be licensed and
    accessed from the NetApp Management Console (NMC).

    A. True

    B. False
    Ans. B
  11. Operations Manager can
    monitor and manage only NetApp storage hosts that have the NetApp
    Host Agent installed.

    A. True

    B. False
    Ans. A
  12. When using MetroCluster in
    a forced takeover mode, identify two methods for restricting access to
    the disaster site node. (Choose two.)

    A. Use manual fencing.

    B. Use the cf giveback -f

    C. Use the cf forcetakeover
    -d command.

    D. Turn off power to the
    disaster site node.

    E. Isolate the failed node
    from the surviving node.
    Ans. A and D
  13. In a fabric-attached
    MetroCluster, a “site failure” is described as a __________.

    A. failure of the
    Inter-Switch-Links (ISL)

    B. failure of the
    interconnect cable

    C. complete failure of the
    primary controller and disk shelves

    D. malfunction of the Fibre
    Channel adapter on the cluster node
    Ans. C
  14. Which two statements are
    true of the cf forcetakeover -d command? (Choose two.)

    A. Mirrored volumes are implicitly

    B. Partner mailboxes must
    be available.

    C. The failed cluster node
    is powered off automatically.

    D. The surviving cluster
    node takes over the functions of the failed partner.
    Ans. A and D
  15. You have connected all
    cables and disk shelves in a fabric-attached MetroCluster. Which
    command would verify that disks are connected and have dual paths?

    A. disk show

    B. sysconfig -p

    C. vol status -r

    D. storage show disk -p
    Ans. D
  16. After issuing the aggr
    split aggr0/plex0 aggrNew command ____________.

    A. there is a new plex
    called aggrNew

    B. there are two new
    plexes, plex0 and plexNew

    C. there is a new mirrored
    aggregate called aggrNew

    D. there are two unmirrored
    aggregates, aggr0 and aggrNew

    E. flexible volumes are
    evenly split between aggr0 and aggrNew
    Ans. D
  17. Normally, before you split
    a SyncMirror volume, you ensure that both plexes are _______ and

    A. offline, quiesced

    B. online, consistent

    C. online, normal

    D. restricted, offline
    Ans. C.
  18. You can avoid data
    corruption when you issue the cf forcetakeover -d command if the remote node is

    A. in a giveback mode

    B. fenced off manually

    C. powered on and

    D. powered off and
    Ans. D
  19. A mirrored volume has a
    failed disk, but there are no available spares in the pool from which the degraded
    plex was built. Data ONTAP will __________.

    A. halt all operations to
    volumes in that pool

    B. choose spare disks to
    reconstruct from the opposite pool

    C. warn you that there are
    no available spares from the proper pool

    D. “halt” after 24 hours if
    spare disks are not added to the proper pool
    Ans. C
  20. The required hardware to
    add SyncMirror to an existing system would be ____________.

    A. disk shelves and cluster

    B. disk shelves and
    termination switches

    C. disk shelves, Ethernet
    adapters, and cabling

    D. disk shelves, Fibre
    Channel adapters, and cabling
    Ans.  D
  21. Which two are true when
    creating a SyncMirror volume? (Choose two.)

    A. The disks selected for
    Plex 0 and Plex 1 must come from the same disk shelf.

    B. The disks selected for
    Plex 0 and Plex 1 must come from the same disk pools.

    C. The number of disks
    added must be an even number and equally divided between the two plexes.

    D. The disks are selected
    first on the basis of equivalent bytes per sector (bps) size, then on the basis
    of the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes
    a larger capacity disk and right-sizes it.
    Ans. C and D
  22. What happens when two
    aggregates are rejoined?

    A. It is not possible to
    rejoin aggregates.

    B. Data ONTAP will always
    retain data from the newest aggregate.

    C. Both aggregates revert
    to the last common snapshot before the split.

    D. You will have a large
    new aggregate containing all volumes from both aggregates.

    E. One of the aggregates
    will be overwritten and you will lose any data changed on it after the split.

    Ans. E
    Ans. E
  23. You cannot remove the
    SyncMirror license if one or more mirrored volumes exist.

    A. True

    B. False
    Ans. A
  24. When using SnapRestore to
    restore a single LUN, the LUN must be ___________.

    A. exported and accessible

    B. mapped to a Windows

    C. mounted on a host

    D. taken offline or
    Ans. D
  25. For aggregates or
    traditional volume SyncMirror to work correctly, the configuration of each plex
    should be identical with regard to ____________.

    A. NVRAM

    B. Mirrored Snapshot copies

    C. RAID groups and disk

    D. NDMP and Snapshot copies
    Ans. C
  26. One method of configuring
    an interface for takeover is to enter ifconfig interface partner address at
    the command line. To make this configuration persistent across reboots, you
    must enter this
    information in the _____ file for each system.

    A. /etc/rc

    B. /etc/hosts

    C. /vol/vol0/home

    D. /vol/vol0/mount
    Ans. A
  27. What is the maximum
    distance between a standard clustered pair at 2Gbps?

    A. 10 meters

    B. 50 meters

    C. 100 meters

    D. 500 meters
    Ans. D
  28. In an active/active
    configuration in takeover mode, the surviving controller interfaces will
    reflect the
    identity of the ________.

    A. local interfaces only

    B. failed partner
    interfaces only

    C. local and failed partner

    D. interfaces as defined in
    the /etc/rc file
    Ans. D
  29. You are troubleshooting a
    clustered failover problem at a customer site. The customer explains
    that both storage systems were NFS mounted onto the Solaris host. While in
    takeover mode, you
    attempt to create a file on the NFS mount point for the inaccessible system,
    but you get the
    following error:
    NFS server filer2 not responding still trying.
    When not in takeover mode, both storage systems operate normally and you do not
    get the error.
    You perform a “cf giveback” and you can now create a file over NFS on both
    systems. What
    should you do first to resolve this issue?

    A. Replace the NIC adapter.

    B. Submit a new bug report.

    C. Use the cluster-config-checker.cgi
    to identify the problem and corrective action.

    D. Replace the cluster
    interconnect card and run diagnostics “all” to ensure proper system operation.
    Ans. C
  30. Each storage system in a
    cluster must have network access to the __________.

    A. Internet

    B. cluster partner

    C. same administration

    D. host same collection of
    Ans. D
  31. A volume SnapMirror
    relationship is allowed between two SnapLock Compliance volumes if the
    destination volume has unexpired WORM files.

    A. True

    B. False
    Ans. B
  32. What is the maximum number
    of disk shelves per loop in a fabric-attached MetroCluster?

    A. 1

    B. 2

    C. 4

    D. 6
    Ans. 2
  33. Which command displays the
    disk ownership for both CPU modules in a FAS2020 system?

    A. disk own -s

    B. disk show -v

    C. vol status -r

    D. disk display r
    Ans. B
  34. To remove a cluster setup,
    you must perform these steps:
    1. Type cf disable.
    2. Unlicense cluster.
    3. Remove partner entries for network interfaces from the /etc/rc file.
    4. Halt and make sure the partner-sysid is blank.
    5. Power down and remove the cluster interconnect card.
    6. Perform steps 1-5 above on the partner node.

    A. True

    B. False
    Ans. A
  35. Snapshot copies for
    SnapLock volumes are deleted automatically according to the retention count
    set in the Snapshot schedule.

    A. True

    B. False
    Ans. A
  36. What security mechanism can
    an administrator use on an OSSV client to set permissions allowing
    backups to a SnapVault secondary system?

    A. Via /etc/hosts.equiv

    B. QSM access list
    modifiable via svconfigurator

    C. Contents inside a file
    called access and located in OSSV /snapvault/etc

    D. MD5 based authentication
    between SnapVault primary and secondary, with changeable password
    Ans. B
  37. Which tool is available on
    an OSSV client to assist in starting or stopping the OSSV service,
    modifying NDMP settings, enabling debugging, and capturing trace files?

    A. Operations Manager

    B. Protection Manager

    C. Svconfigurator GUI

    D. svdebug.exe
    Ans. C
  38. Which three statements are
    true about SnapLock volumes? (Choose three.)

    A. SnapMirror supports
    SnapLock volumes.

    B. There are two types of
    SnapLock volumes.

    C. SnapLock volumes support
    per-file retention periods.

    D. In Data ONTAP
    and later, SnapLock Compliance volumes are not supported on the VSeries
    controller with NetApp Storage.
    Ans. A, B and C
  39. To restore a qtree
    protected with SnapVault from the secondary storage system to the primary storage
    system, you can ______________. (Choose two.)

    A. restore to a non
    existing qtree with DOT 7. 2

    B. add the new qtree to the
    primary storage system with DOT 7.2

    C. overwrite the existing
    qtree on the primary storage system with DOT 7.3

    D. delete the existing
    qtree from the secondary storage system with DOT 7.3
    Ans. A and C
  40. The snapvault update command
    is only available on the secondary system.

    A. True

    B. False

    Ans. A
    Ans. A
  41. The OSSV agent on the
    primary system listens to TCP port 10000 for all SnapVault

    A. True

    B. False
    Ans. A
  42. Which Data ONTAP option
    sets system-wide throttling for all transfers?

    A. options transfer.wide.enable

    B. options

    C. options

    D. options
    Ans. D
  43. The qtree specified for
    ____ must not exist on the secondary system before you run the ____

    A. pri_qtree_path, snapvault

    B. sec_qtree_path,
    snapvault start

    C. pri_qtree_path,
    snapvault initialize

    D. sec_qtree_path,
    snapvault initialize
    Ans. B
  44. The snapvault restore
    command is run on the _________.

    A. secondary system to push
    data to the primary system

    B. primary system to pull
    data from the secondary system

    C. secondary system to pull
    data from the primary system

    D. secondary system to push
    data to the primary storage system
    Ans. B
  45. Which three statements
    apply to NearStore Personality license? (Choose three.)

    A. It increases the storage

    B. It converts the
    destination storage system to a NearStore system.

    C. It requires the
    nearstore_option license on the destination storage system.

    D. It provides increased
    concurrent streams when the storage systems are used as destinations for
    SnapMirror and SnapVault transfers.
    Ans. B, C and D
  46. Which statement applies to
    the Open Systems SnapVault Free Space Estimator utility?

    A. This utility runs
    automatically after each transfer.

    B. This utility must be
    enabled on the secondary storage system.

    C. This utility determines
    if there is sufficient disk space available on the primary to perform an OSSV

    D. This utility determines
    if there is sufficient disk space available on the secondary to perform an OSSV
    Ans. C
  47. The snapvault snap create
    volume snapname command can be executed on the ___________.

    A. open systems

    B. primary system only

    C. secondary system only

    D. secondary or primary
    Ans. D
  48. The SnapVault secondary
    system allows you to keep a separate schedule of Snapshot copies
    from your primary system.

    A. True

    B. False
    Ans. A
  49. The SnapVault secondary
    system allows you to keep a separate schedule of Snapshot copies
    from your primary system.

    A. True

    B. False
    Ans. D
  50. The snapvault snap sched -x
    command is used to ____________.

    A. schedule full backups

    B. cancel scheduled backups

    C. schedule baseline

    D. schedule incremental
    Ans. D
  51. Which action will cause a
    currently in-sync SnapMirror relationship to fall out of sync?

    A. Running snapmirror
    update on the source storage system

    B. Running snapmirror
    release on the source storage system

    C. Modifying the
    /etc/snapmirror.conf file for the relationship on the source storage system

    D. Modifying the
    /etc/snapmirror.conf file for the relationship on the destination storage
    Ans. D
  52. Which two choices are used
    to configure a semi-synchronous SnapMirror relationship? (Choose

    A. throttle

    B. visibility interval

    C. outstanding=3s in DOT

    D. using option semi-sync
    in DOT 7.3 and higher
    Ans. C and D
  53. A NearStore license
    increases the amount of concurrent replication streams.

    A. True

    B. False
    Ans. A
  54. Which is true of the
    SnapVault backup of a NetApp storage system?

    A. The file is the basic
    unit for SnapVault backup destination.

    B. The qtree is the basic
    unit for SnapVault backup destination.

    C. The volume is the basic
    unit of SnapVault backup destination.

    D. The directory is the
    basic unit for SnapVault backup destination.
    Ans. B
  55. Which option will allow a
    storage system to SnapMirror from this source system?

    A. snapmirror.access

    B. snapmirror.destination

    C. options snapmirror.allow
    host =

    D. options
    snapmirror.access host =
    Ans. D
  56. SnapMirror will
    automatically try to restart a transfer after ___________.

    A. an initial transfer is

    B. a manual update is

    C. a transfer interrupted
    by reboot

    D. a scheduled incremental
    update is interrupted
    Ans. D
  57. Which keyword alone can be
    used to convert an asynchronous SnapMirror relationship to a
    synchronous SnapMirror relationship?

    A. sync

    B. cksum

    C. src_con

    D. outstanding
    Ans. A
  58. You have quiesced a
    SnapMirror relationship. Which command would re-establish the scheduled

    A. snapmirror restart

    B. snapmirror resume

    C. snapmirror resync

    D. snapmirror update
    Ans. B
  59. In a volume SnapMirror
    relationship, the source and destination volumes must be the same size.

    A. True

    B. False
    Ans. B
  60. Which two statements apply
    to the fs_size_fixed volume option? (Choose two.)

    A. The default setting is

    B. This option is
    automatically set to be on when a volume becomes a SnapMirrored volume.

    C. This option turns to off
    after the snapmirror break command is issued for the relationship.

    D. This option causes the
    SnapMirror destination volume to remain the same size and not grow or shrink
    when a SnapMirrored volume relationship is broken.
    Ans. B and D
  61. Which three statements
    apply to the SnapMirror visibility_interval argument? (Choose three.)

    A. The default interval
    value is five minutes.

    B. The smallest interval
    value supported is 30 seconds.

    C. This variable controls
    the view of the data on the destination system.

    D. By setting a value, you
    specify the amount of time before an automatic snapshot is created on the
    source volume that is synchronously mirrored.
    Ans. B, C and D