SAN5

Card Set Information

Author:
Anonymous
ID:
277564
Filename:
SAN5
Updated:
2014-06-25 04:46:52
Tags:
NS0
Folders:

Description:
SAN
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. One method of configuring an interface for takeover is to enter ifconfig interface partner address atthe command line. To make this configuration persistent across reboots, you must enter thisinformation in the _____ file for each system.
    A./etc/rc
    B./etc/hosts
    C./vol/vol0/home
    D./vol/vol0/mount
    A
  2. Each storage system in a cluster must have network access to the __________.
    A.Internet
    B.cluster partner
    C.same administration
    D.host same collection of subnets
    D
  3. You are troubleshooting a clustered failover problem at a customer site. The customer explainsthat both storage systems were NFS mounted onto the Solaris host. While in takeover mode, youattempt to create a file on the NFS mount point for the inaccessible system, but you get thefollowing error:NFS server filer2 not responding still trying.When not in takeover mode, both storage systems operate normally and you do not get the error.You perform a “cf giveback” and you can now create a file over NFS on both systems. What
    should you do first to resolve this issue?
    A.Replace the NIC adapter.
    B.Submit a new bug report.
    C.Use the cluster-config-checker.cgi to identify the problem and corrective action.
    D.Replace the cluster interconnect card and run diagnostics “all” to ensure proper system
    C
  4. To remove a cluster setup, you must perform these steps:1. Type cf disable.2. Unlicense cluster.3. Remove partner entries for network interfaces from the /etc/rc file.4. Halt and make sure the partner-sysid is blank.5. Power down and remove the cluster interconnect card.6. Perform steps 1-5 above on the partner node.
    A.True
    B.False
    A
  5. Which command displays the disk ownership for both CPU modules in a FAS2020 system?
    A.disk own -s
    B.disk show -v
    C.vol status -r
    D.disk display r
    B
  6. What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
    A.1
    B.2
    C.4
    D.6
    B
  7. A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if thedestination volume has unexpired WORM files.
    A.True
    B.False
    B
  8. Snapshot copies for SnapLock volumes are deleted automatically according to the retention countset in the Snapshot schedule.
    A.True
    B.False
    A
  9. Which three statements are true about SnapLock volumes? (Choose three.)
    A.SnapMirror supports SnapLock volumes.
    B.There are two types of SnapLock volumes.
    C.SnapLock volumes support per-file retention periods.
    D.In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the VSeries controller with NetApp Storage.
    A, B and C
  10. Which tool is available on an OSSV client to assist in starting or stopping the OSSV service,modifying NDMP settings, enabling debugging, and capturing trace files?
    A.Operations Manager
    B.Protection Manager
    C.Svconfigurator GUI
    D.svdebug.exe
    C
  11. What security mechanism can an administrator use on an OSSV client to set permissions allowingbackups to a SnapVault secondary system?
    A.Via /etc/hosts.equiv file
    B.QSM access list modifiable via svconfigurator
    C.Contents inside a file called access and located in OSSV /snapvault/etc
    D.MD5 based authentication between SnapVault primary and secondary, with changeable password
    B
  12. The OSSV agent on the primary system listens to TCP port 10000 for all SnapVaultcommunications.
    A.True
    B.False
    A
  13. The snapvault update command is only available on the secondary system.
    A.True
    B.False
    A
  14. To restore a qtree protected with SnapVault from the secondary storage system to the primarystorage system, you can ______________. (Choose two.)
    A.restore to a non existing qtree with DOT 7. 2
    B.add the new qtree to the primary storage system with DOT 7.2
    C.overwrite the existing qtree on the primary storage system with DOT 7.3
    D.delete the existing qtree from the secondary storage system with DOT 7.3
    A and C
  15. The snapvault restore command is run on the _________.
    A.secondary system to push data to the primary system
    B.primary system to pull data from the secondary system
    C.secondary system to pull data from the primary system
    D.secondary system to push data to the primary storage system
    B
  16. The qtree specified for ____ must not exist on the secondary system before you run the ____command.
    A.pri_qtree_path, snapvault start
    B.sec_qtree_path, snapvault start
    C.pri_qtree_path, snapvault initialize
    D.sec_qtree_path, snapvault initialize
    B
  17. Which Data ONTAP option sets system-wide throttling for all transfers?
    A.options transfer.wide.enable
    B.options transfer.throttle.enable
    C.options replication.wide.enable
    D.options replication.throttle.enable
    D
  18. Which three statements apply to NearStore Personality license? (Choose three.)
    A.It increases the storage capacity.
    B.It converts the destination storage system to a NearStore system.
    C.It requires the nearstore_option license on the destination storage system.
    D.It provides increased concurrent streams when the storage systems are used as destinations for SnapMirror and SnapVault transfers.
    B, C and D
  19. The SnapVault secondary system allows you to keep a separate schedule of Snapshot copiesfrom your primary system.
    A.True
    B.False
    A
  20. The snapvault snap create volume snapname command can be executed on the ___________.
    A.open systems
    B.primary system only
    C.secondary system only
    D.secondary or primary systems
    D
  21. The snapvault snap sched -x command is used to ____________.
    A.schedule full backups
    B.cancel scheduled backups
    C.schedule baseline transfer
    D.schedule incremental backups
    D
  22. Which statement applies to the Open Systems SnapVault Free Space Estimator utility?
    A.This utility runs automatically after each transfer.
    B.This utility must be enabled on the secondary storage system.
    C.This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer.
    D.This utility determines if there is sufficient disk space available on the secondary to perform an OSSV transfer.
    C
  23. Which system is recommended as a secondary system for SnapVault?
    A.IS1200
    B.DataFort
    C.NearStore VTL
    D.FAS with NearStore license
    D
  24. Which is true of the SnapVault backup of a NetApp storage system?
    A.The file is the basic unit for SnapVault backup destination.
    B.The qtree is the basic unit for SnapVault backup destination.
    C.The volume is the basic unit of SnapVault backup destination.
    D.The directory is the basic unit for SnapVault backup destination.
    B
  25. A NearStore license increases the amount of concurrent replication streams.
    A.True
    B.False
    A
  26. Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choosetwo.)
    A.throttle
    B.visibility interval
    C.outstanding=3s in DOT 7.2
    D.using option semi-sync in DOT 7.3 and higher
    C and D
  27. Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?
    A.Running snapmirror update on the source storage system
    B.Running snapmirror release on the source storage system
    C.Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
    D.Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system
    D
  28. Which option will allow a storage system to SnapMirror from this source system?
    A.snapmirror.access
    B.snapmirror.destination
    C.options snapmirror.allow host =
    D.options snapmirror.access host =
    D
  29. Which keyword alone can be used to convert an asynchronous SnapMirror relationship to asynchronous SnapMirror relationship?
    A.sync
    B.cksum
    C.src_con
    D.outstanding
    A
  30. SnapMirror will automatically try to restart a transfer after ___________.
    A.an initial transfer is interrupted
    B.a manual update is interrupted
    C.a transfer interrupted by reboot
    D.a scheduled incremental update is interrupted
    D
  31. Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)
    A.The default interval value is five minutes.
    B.The smallest interval value supported is 30 seconds.
    C.This variable controls the view of the data on the destination system.
    D.By setting a value, you specify the amount of time before an automatic snapshot is created on the source volume that is synchronously mirrored.
    B, C and D
  32. Which two statements apply to the fs_size_fixed volume option? (Choose two.)
    A.The default setting is on.
    B.This option is automatically set to be on when a volume becomes a SnapMirrored volume.
    C.This option turns to off after the snapmirror break command is issued for the relationship.
    D.This option causes the SnapMirror destination volume to remain the same size and not grow or shrink when a SnapMirrored volume relationship is broken.
    B and D
  33. In a volume SnapMirror relationship, the source and destination volumes must be the same size.
    A.True
    B.False
    B
  34. You have quiesced a SnapMirror relationship. Which command would re-establish the scheduledupdates?
    A.snapmirror restart
    B.snapmirror resume
    C.snapmirror resync
    D.snapmirror update
    B
  35. Identify the two commands that could be entered on the SnapMirror destination storage system.(Choose two.)
    A.snapmirror resync
    B.snapmirror release
    C.snapmirror initialize
    D.options snapmirror.access on
    A and C
  36. Which command would you use to verify that the iSCSI service is running?
    A.iscsi protocol
    B.iscsi service
    C.iscsi show
    D.iscsi status
    D
  37. When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)
    A.The source volume must be offline.
    B.SnapMirror must be licensed for each storage system.
    C.If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.
    D.The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source destination volume.
    B, C and D
  38. A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created twodays ago. Which command continues the relationship?
    A.SnapMirror initialize
    B.SnapMirror quiesce
    C.SnapMirror resume
    D.SnapMirror resync
    E.SnapMirror update
    D
  39. Which option of the snap restore command allows you to specify a different directory, as long asthe directory already exists?
    A.snap restore -c
    B.snap restore -d
    C.snap restore -r
    D.snap restore s
    C
  40. Which objects can be restored by a single SnapRestore command? (Choose three)
    A.file
    B.LUN
    C.qtree
    D.volume
    E.directory
    A, B and D
  41. Which three statements are true when using SnapRestore? (Choose three.)
    A.The volume must be online.
    B.SnapRestore must be licensed before you can use it.
    C.The snap restore enable on option must be enabled.
    D.The volume to be reverted must not be a SnapMirror destination mirror.
    A, B and D
  42. What happens after you use SnapRestore to revert a volume to a specific snapshot?
    A.You must bring the volume back online.
    B.The storage system automatically performs a snapshot for that volume.
    C.The Snapshot copies that are older than the snapshot you used are deleted.
    D.The Snapshot copies that are more recent than the snapshot you used are deleted.
    D
  43. Which command or procedure would you use to undo a volume SnapRestore operation?
    A.snap restore -r vol
    B.snap revert -s vol
    C.snap restore undo vol
    D.You cannot undo a SnapRestore operation at the volume level.
    D
  44. Which three are pre-requisites for using SnapRestore? (Choose three.)
    A.The volume to be reverted must be offline.
    B.The volume to be reverted must not be a SnapMirror destination.
    C.You must enter the SnapRestore license code before you can use it.
    D.Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.
    B,C and D
  45. A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.
    A.125
    B.251
    C.255
    D.Depends on capacity and number of disk drives
    B
  46. When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by thesnap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. Thehigher the value of n, the _________ the snapshot.
    A.older
    B.newer
    C.more important
    D.least important
    A
  47. Which command disables client access to Snapshot copies on a volume called flexvol1?
    A.cifs shares -change flexvol1 -nosnap
    B.snap access flexvol1 off
    C.vol options flexvol1 nosnapdir on
    D.vol options flexvol1 snapdir off
    E.vol options flexvol1 snapdir on
    C
  48. Data ONTAP uses inodes in an active file system to reference ___________.
    A.qtrees
    B.disk blocks
    C.file segments
    D.Snapshot copies
    B
  49. A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflectsthe state of the ____________ at the time the snapshot was created.
    A.qtrees
    B.volume
    C.directory
    D.storage system
    B
  50. Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer forthe next SnapMirror update.
    A.True
    B.False
    B
  51. What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choosethree.)
    A.Use reallocate -p pathname to run the physical reallocate.
    B.Use aggr reallocate -p pathname to run the physical reallocate.
    C.Reinitialize any SnapMirror relationship for the new physical geometry.
    D.Volume Snapshots do not need to be deleted for the reallocate to run effectively.
    E.Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier than 7.2.
    A, D and E
  52. Which command is used to set the configuration of an Ethernet network interface?
    A.ifconfig
    B.ifstat
    C.netstat – i
    D.sysconfig – v
    A
  53. Which command displays the statistics for Ethernet network interfaces?
    A.ifconfig
    B.ifstat
    C.sysconfig
    D.sysstat
    B
  54. Which set of commands should be used for troubleshooting Ethernet connectivity problems fromthe storage system console?
    A.ifstat, netdiag
    B.perfstat, tracert
    C.sysconfig – cr, sysstat
    D.dish shm_stats, sysstat
    A
  55. These are three methods of creating a LUN:* lun create* lun map* lun setup
    A.True
    B.False
    B
  56. Before running lun setup on the storage system, you must first create the igroup to which theinitiator will be attached.
    A.True
    B.False
    B
  57. In a Fibre Channel configuration, the host’s HBA is referred to as the ___________, and thestorage system’s HBA is referred to as the __________ .
    A.initiator, target.
    B.primary, secondary.
    C.secondary, primary.
    D.target, initiator.
    A
  58. Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)
    A.lun create
    B.lun config
    C.lun make
    D.lun setup
    A and D
  59. To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enablemust be set on.
    A.True
    B.False
    A
  60. Which statement best describes the output of this command? sysstat -s 5
    A.Display the default output every five seconds and terminate after five counts.
    B.Display extended output every five seconds and print a summary after five counts.
    C.Display extended output every five seconds and print a summary upon termination.
    D.Display the default output every five seconds and print a summary upon termination.
    D
  61. Which two are Data ONTAP commands for displaying performance information? (Choose two.)
    A.nfsstat
    B.perfstat
    C.sio_ntap_soll
    D.sysstat
    A and D
  62. Which exportfs command will temporarily export the resource while ignoring the options specifiedin the /etc/exports file?
    A.exportfs -a
    B.exportfs -i
    C.exportfs -u
    D.exportfs -v
    B
  63. To automatically export volumes and directories on storage system reboot, include them in the/etc/exports file.
    A.True
    B.False
    A
  64. Which two statements apply to an entry in the /etc/exports file regarding exportingdirectories/qtrees and volumes? (Choose two.)
    A.Each volume must be exported separately.
    B.Exports are accessible only to hosts with names.
    C.User names used in an export must be resolvable.
    D.Exports can access multiple paths on the same volume.
    A and D
  65. Executing this command will have what effect?options wafl.default_security_style ntfs
    A.It will set the security style of all files to be ntfs.
    B.It will change the security style of all qtrees to be ntfs.
    C.It will change the security style of all existing volumes to be ntfs.
    D.It will set the security style of all newly created volumes to ntfs.
    D
  66. UNIX allows file access based on __________.
    A.GID or UID and ACLs.
    B.GID or UID and UNIX permissions.
    C.NT ACLs and SID.
    D.NT ACLs and UNIX permissions.
    B
  67. NTFS allows file access based on ___________.
    A.NT ACLs and SID.
    B.NT ACLs and UNIX permissions.
    C.SID and password.
    D.UNIX permissions.
    A
  68. If the security style is set to UNIX, CIFS client file access is determined by ___________.
    A.NT ACLs
    B.the last client to set permissions
    C.the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
    D.This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX
    C
  69. Which two commands on the storage system allow you to gather detailed statistics about networkinterfaces, including basic information about network connections? (Choose two.)
    A.ifstat -a
    B.netdiag -n
    C.netstat -i
    D.sysstat 1
    A and C
  70. To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site_______ utility. (Choose two.)
    A.AutoSupport
    B.Bugs Online
    C.NetApp Diagnostics
    D.Release Comparison
    E.System Configuration Guide
    B and D
  71. Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)
    A.A LUN can be converted into a VLD.
    B.LUNs can be accessed using the FCP protocol.
    C.LUNs can be accessed using the iSCSI protocol.
    D.Block services are associated with an iSCSI or FCP SAN environment.
    B, C and D
  72. Which three licenses are required for fabric-attached MetroCluster? (Choose three.)
    A.Cluster
    B.Cluster_remote
    C.Syncmirror_local
    D.Syncmirror_fabric
    E.Syncmirror_remote
    A, B and C
  73. Which changes the NDMP password on the Open System SnapVault agent?
    A.password
    B.password
    C.svpasswd
    D.svpassword
    D
  74. In a tape environment after a SnapRestore reversion of a volume, incremental backup and restoreoperations on the file or volume cannot rely on the timestamps to determine what data needs to bebacked up or restored. Which course of action ensures correct incremental backups?
    A.Perform a base-level backup of the volume after you restore it.
    B.Reboot the storage system to reset timestamps back to their original times before the reversion.
    C.Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.
    D.Take a new snapshot of the volume to create new base-level timestamps for the incremental backup, and then perform a base-level backup of the volume after you restore it.
    A
  75. Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.
    A.True
    B.False
    B
  76. Which three items are NFS resources for export? (Choose three.)
    A.aggregate
    B.directory/qtree
    C.file
    D.subnet
    E.volume
    B, C and E
  77. Which three attributes would you specify when creating a LUN? (Choose three)
    A.The host operating system of the system attached to LUN.
    B.The version of Data ONTAP
    C.The size of the LUN.
    D.The path to the LUN.
    A, C and D
  78. Which three are valid LUN commands? (Choose three)
    A.lun clone
    B.lun copy
    C.lun move
    D.lun rename
    E.lun snap
    A, C and E
  79. Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronousSnapMirror?
    A.FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 syns
    B.FilerA:source_vol FilerB:destination_vol – 0-55/5 * * *
    C.FilerA:source_vol FilerB:destination_vol – sync
    D.FilerA:source_vol FilerB:destination_vol outstanding=3s sync
    A, C and D
  80. If you believe you create FC SAN performance problem, which NatApp utility would gather bothyour Solaris host and storage system data for analysis?
    A.sio_ntap.exe
    B.prestart
    C.poststat
    D.perfstat
    D
  81. When running deduplication on SnapVault destinations, which three statements are true?
    A.The target SnapVault controller deduplicates inline.
    B.The source SnapVault data is deduplicated inline on the target before it is written to disk.
    C.Deduplication internally synchronize with the SnapVault schedule on the destination.
    D.The source (primary) system sends duplicated data even if the source data is deduplicated.
    E.Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the snapshot to effectively deduplicate savings.
    C, D and E
  82. Which MetroCluster configuration procedure is recommended for re-establishing a mirroredvolume that was in a level-0 resynchronization state when it failed?
    A.Determine which volumes are at the remote and disaster sites.
    B.Re-create the synchronous mirror.
    C.Rejoin the two volumes.
    D.Turn on power to the cluster node at the disaster site.
    B
  83. Which statement is true about ASIS deduplication license with Data ONTAP 8.1?
    A.The existing 8.0 license key is used.
    B.A new license key is generated.
    C.The license is capacity-based.
    D.The license no longer exists.
    D
  84. Using the output below, a co-worker determined that these are types “Solaris” LUNs. What wouldyour destination be?lun show – m LUN patch mapped to LUN ID ——————————————————-/vol/vol1/lun0 solaris – igroup0 0 /vol/vol1/lun solaris- igroup10 /vol/vol1/qtree1/lun2 solaris – igroup2 0 /vol/vol1/qtree1/lun3 solaris – igroup3 0
    A.These are type “Solaris” LUNs.
    B.Not enough information is given here. Run the lun status command to get the information requested.
    C.Not enough information is given here. Run the lun show –v command to get the information requested.
    D.Not enough information is given here. Run the lun map command to get the information requested.
    C
  85. Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFSusers are now complaining about getting “stale file handles” for the file. Which is the most likelycause of this problem, and the best procedure to correct it?
    A.This might be due to an NFS storage system and client mismatch. Check to see that these users have the same version of the NFS client that existed at the time the snapshot was taken.
    B.NFS users why try to access a reverted file without first reopening it might get a “stale file handle” error message. Have the users try to reopen the file and see if the problem is resolved.
    C.After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their systems.
    D.These users are on a different subnet from the others. Start troubleshooting by checking their subnet.
    B
  86. When viewing the output of the sysstat –f command, which three fields are part of the output?(Choose three)
    A.FCP
    B.FTP
    C.CIFS
    D.NFS
    E.iSCSI
    A, C and D
  87. You want to create an automated test environment that performs a single file SnapRestore timeyou run the procedure, however, SnapRestore prompts you to confirm your decision to revert thefile. How can you automate this step?
    A.Use the –f option with the snmap restore command
    B.Enable the options snaprestore_noprimpts enable = on option.
    C.These prompts are for data protection and auditing and cannot be overridden.
    D.Enter the priv set advanced mode on the storage system and prompt will not appear.
    A
  88. The two copies SyncMirror volume are called ____________, which are physical copies of thesame file system and consist of one or more RAID groups.
    A.Snapshot copies
    B.Aggregates
    C.Plexes
    D.Volumes
    C
  89. When using MetroCluster in a forced takeover mode, identify two methods for restricting access tothe disaster site node. (Choose two)
    A.Use manual fencing
    B.Use the cf giveback –f command.
    C.Use the cf forcetakeover –d command.
    D.Turn off power to the disaster site node.
    E.Isolate the failed node from the surviving node.
    A and D
  90. Which command disables client access to Snapshot copies on a volume called flexvoll?
    A.cifs shares –change flxvoll –nosnap
    B.snap access flexvoll off
    C.vol options flexvoll nonsnapdir on
    D.vol options flexvoll snapdir off
    E.vol options flexvoll snapdir on
    C
  91. What security mechanism can an administrator use on an OSSV client to use permissionsallowing backup to a SnapVault secondary system?
    A.MD5 authentication between SnapVault primary and secondary, with changeable password
    B.Contents inside file called access and located in OSSV /snapvault/etc
    C.QSM access list modifiable via svconfigurator
    D.Via /etc/hosts.equiv file
    C
  92. Which three tools present statistics from the Data ONTAP counter manager? (Choose three)
    A.Operations manager
    B.Window perfmon
    C.Sysstat
    D.Stats
    A, B and D
  93. Which three protocols can coexist on a NetApp storage system? (Choose three)
    A.DAFS
    B.CIFS
    C.DFS
    D.FCP
    E.NFS
    B, D and E
  94. Which command on the storage system allows you to display statistics on the performance ofsystem resource such as CPU, NVRAM, network interfaces, and disks?
    A.netstat
    B.netdiag
    C.pktt
    D.sysstat
    D
  95. An iSCSI or FC SAN implementation provides ____________ access to LUNs.
    A.VLD
    B.VIIP
    C.File
    D.Block
    D
  96. Which set of protocols provide block-level access to NetApp storage?
    A.SNA and RPC
    B.iSCSI and FCP
    C.HTTP and FTP
    D.CIFS and NFS
    B
  97. What are two methods of protecting LUN overwrites using Snapshot copies on a volume withfractional reserve set to 0%? (Choose two)
    A.Snap Autodelete
    B.iGroup throttle
    C.LUN reset
    D.Volume AutoSize
    A and D
  98. Which NetApp Storage Tier component works aggregate-wide on a FAS controller?
    A.Flash Pool
    B.Flash Disk
    C.Flash Cache
    D.Flash Accel
    E.Flash IO
    A
  99. Which NetApp Storage Tier component works controller-wide on a FAS controller?
    A.Flash Pool
    B.Flash Disk
    C.Flash Accel
    D.Flash Cache
    E.Flash IO
    D
  100. UNIX allows file access based on___________.
    A.NT ACLs and UNIX permissions.
    B.NT ACLs and SID.
    C.GID or UID and UNIX permissions.
    D.GID or UID and ACLs.
    C
  101. When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?
    A.When the 64-bit volumes has Volume Guarantee disabled
    B.When the 64-bit volume has compression enabled
    C.When the 64-bit volume has FlexShare enabled
    D.When the 64-bit volume has ASIS enabled
    B
  102. What is the correct format for the scheduling component of a SnapVault schedule?
    A.cnt[@day_list][@hour_list]
    B.YYYY-MM-DD
    C.Crontable format
    D.List of dates in ISO Date format
    A
  103. Which Data ONTAP option sets system-wide for all transfers?
    A.Options transfers.wide.enable
    B.Options transfer.throttle.enable.
    C.Option replication.wide.enable
    D.Options replication.throttle.enable
    D
  104. Which two commands can be used to enable LUN reservations? (Choose two)
    A.lun set reservation
    B.lun reservation set
    C.lun map
    D.lun create
    A and D
  105. How does the NetApp Remote Agent (RSA) connect to NetApp Support?
    A.NetApp Support initiates a non-secure connection to the RSA.
    B.NetApp Support initiates a secure connection to the RSA.
    C.The RSA initiates a secure connection to NetApp Support.
    D.The RSA initiates a non-secure connection to NetApp support.
    C
  106. Which two will allow you to read and analyze a packet trace file generated by the storage system?(Choose two)
    A.WireShark
    B.Pktt
    C.Netmon
    D.Eternal View
    A and C
  107. Host multi-pathing describes a ____________ solution that has at least two distinct______________ paths to a LUN.
    A.Token ring, physical
    B.FC SAN, virtual
    C.FC or IP SAN, virtual
    D.FC or IP SAN, Physical
    D
  108. If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to thesefiles?
    A./vol/vol0/etc/log/snaplog/
    B./vol/vol0/etc/snapmirror/
    C./vol/vol0/etc/snaplog/
    D./vol/vol0/etc/log/
    D
  109. Which statement describes the results of the SnapMirror resynce command?
    A.Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and removes all newer information on the storage system on which the command is run.
    B.Resynchronization will cause the loss of all data written to the destination after the original base snapshot was made.
    C.Resynchronization will update the snapshot on the destination filer.
    D.Resynchronization will update the snapshot on the source filer.
    A
  110. There are three phases of Non Disruptive Volume Movement (NDVM). What is the correctsequence of these phases?
    A.Setup Phase, Mirror Phase, Cutover Phase
    B.Initialization phase, Copy Phase, Migrate Phase
    C.Begin Phase, Move Phase, Complete Phase
    D.Setup Phase, Data Copy Phase, Cutover Phase
    D
  111. Which two cp types would indicate a busy storage system? (Choose two).
    A.cp_from_log_full
    B.cp_from_busy
    C.cp_from_cp
    D.cp_from_timer
    A and C
  112. Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?
    A.No, but you can file a PVR to request support.
    B.No. it is targeted for a future release of Data ONATP.
    C.Yes, only with a special license installed.
    D.Yes, it has been supported since 8.0.1.
    D
  113. Which exportfs command will temporally export the resource while ignoring the options specified inthe /etc/exports file?
    A.exportfs – v <path>
    B.exportfs –u <path>
    C.exportfs –a <path>
    D.exportfs – i <path>
    D
  114. What is the maximum distance between a standard clustered pair at 2Bbps?
    A.100 meters
    B.10 meters
    C.50 meters
    D.500 meters
    D
  115. For each Open Systems platform directory to be backed up to the SnapVault secondary storagesystem you must execute _____________.
    A.An initial baseline copy
    B.A temporary copy
    C.An incremental copy
    D.A scheduled update copy
    A
  116. What does it signify if the disks are “not owned” in a FAS2020 system?
    A.The disks are mailbox disks.
    B.The disks are spare disks.
    C.The disks are data disks.
    D.The disks are not used.
    D
  117. When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIXserver, which three valid objects to include in the data set? (Choose three)
    A.The entire client
    B.A directory
    C.A file
    D.A qtree
    A, B and C
  118. Which NetApp Virtual Storage Tier component works at the host level?
    A.Flash Pool
    B.Flash Disk
    C.Flash Accel
    D.Flash Cache
    E.Flash IO
    C
  119. An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Withina ______________ you can have one or more ____________.
    A.session, session, connections
    B.connection, session, connections
    C.connection, connection, sessions
    D.session, connection, sessions
    A
  120. Which mechanism allows you to make LUNs available to some initiators and unavailable toothers?
    A.LUN masking
    B.LUN grouping
    C.LUN cloning
    D.LUN hiding
    A
  121. You are trying to do a single file SnapRestore for a file, but you are receiving an error messagethat the directory structure no longer exists. Which is the most likely explanation?
    A.Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore. You must now SnapRestore the volume.
    B.Snapshot copies have been created since the original directory structure was deleted.
    C.You must recreate the directory structure before trying to restore the file.
    D.You cannot restore a file to an alternate location.
    C
  122. Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?
    A.Running snapmirroe update on the source storage system.
    B.Running snapmirror release on the source storage system.
    C.Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
    D.Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.
    D
  123. In a Fiber Channel configuration, the host’s HBA is referred to as the ___________, and thestorage system’s HBA to as the _____________.
    A.Target, initiator
    B.Primary, secondary
    C.Initiator, target
    D.Secondary, primary
    C
  124. Which storage system command would display the WWPNs of hosts that have logged into storagesystem using a Fibre Channel connection?
    A.fcp config
    B.fcp initiator show
    C.fcp show –i
    D.fcp show initiator
    D
  125. Which two operations can be performed with the SnapDrive for windows graphical user interface?
    A.Create volume
    B.Create Snapshot copies
    C.Create File
    D.Create Disk
    B and D
  126. Identify the two commands that could be entered on the SnapMirror destination storage system.(Choose two)
    A.Options snapmirror.access on
    B.Options snapmirror.resync on
    C.Snapmirror initialize
    D.Snap mirror resync
    C and D
  127. Which two modes support using SnapMirror over multiple paths?
    A.Standalone
    B.Partner
    C.Multi
    D.Failover
    E.Give back
    C and D
  128. The root admin on the UNIX box receives an “Access Denied” message when he attempts toaccess a newly mounted qtree. What’s the most likely cause of this error?
    A.The qtree is missing from the /etc/hosts file.
    B.NFS is turned off on the storage system.
    C.The qtree is set to ntfs security style.
    D.The qtree has not been exported.
    C
  129. What utility on the storage system will allow you to capture network packet information?
    A.Snoop
    B.Netstats
    C.Pktt
    D.Traceroute
    C
  130. Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?
    A.All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.
    B.The expansion is triggered by an aggr convert command.
    C.The expansion is triggered by adding disks to exceed 16 TB.
    D.The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with Data ONTAP 8.1 upgrade.
    C
  131. An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte sparedisks are available. Data ONTAP will then perform what action.
    A.Chooses a 72-Gigabyte disk and use it as is.
    B.Chooses a 72-Gigabyte disk and right-size it.
    C.Halts after 24 hour of running in degraded mode.
    D.Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.
    B
  132. Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)
    A.Data ONTAP 8.0.2 64-bit –>Data ONTAP 8.1 64-bit
    B.Data ONTAP 8.0.2 32-bit –> Data ONTAP 8.0.2 64-bit
    C.Data ONTAP 7.3.2 32-bit –> Data ONTAP 8.1 64-bit
    D.Data ONTAP 7.3.2 32-bit –> Data ONTAP 8.0.2 64-bit
    A and C
  133. In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)
    A.User quotas
    B.Tree quotas
    C.Root quotas
    D.Group quotas
    E.File quotas
    A and D
  134. Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 isstill up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all ofthe Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for aperiod of three minutes by default, and then forcibly take over Node 1 if the error conditionpersists?
    A.Auto enable of giveback
    B.Negotiated Fail Over
    C.Takeover on panic
    D.Cf.quickloop.enable
    B
  135. How can you “throttle” SnapValue updates and baseline transfers so that the primary or secondaryis not transmitting data as it can?
    A.Use the –k option in the snapvault start or snapshot modify commands.
    B.SnapVault does not support throttling of network throughout.
    C.Use the snapvault throttle command.
    D.Use the –k option in the snapvault initialize command.
    D     A

What would you like to do?

Home > Flashcards > Print Preview