Escolar Documentos
Profissional Documentos
Cultura Documentos
In reference to the NFS export-policy rules shown in the exhibit, NFS clients
mounted to/data1 from the 192.168.1.0/24, 192.168.2.0/24, and
192.168.3.0/24, subnets are able to mount /data1 and read files but are unable
to edit files or write new files. All other subnets require read-only access
to/data1.
What must you do to allow write access to the three subnets while allowing
read-only access to all other subnets in this scenario?
A. Set the index of ruleindex 4 to ruleindex 1.
B. Set the index of ruleindex 2 to ruleindex 4.
C. Set the index of ruleindex 1 to ruleindex 4.
D. Set the index of ruleindex 3 to ruleindex 4.
9. An administrator wants to restore a file using the Previous Versions tab on a
Windows client.
Which command enables the Previous Versions feature?
A. volume modify –snapdir-access
B. volume modify –policy
C. volume modify –user
D. volume modify –group
10. Click the Exhibit button
Referring to the exhibit the write operations would be compacted into how
many WAFL blocks?
A. 2
B. 3
C. 4
D. 5
11. Which LIF role type is used by a volume move operation between noodes?
A. cluster
B. data
C. intercluster
D. cluster-mgmt
12. You need a Flash Pool aggregate on both nodes of a 2-node cluster. You also
want to maximize usable space in the SSD cache.
Which Flash Pool configuration is appropriate for this situation?
A. Create two storage pools and then create a Flash Pool aggregate on one
node; then create another Flash Pool aggregate on the partner node to use
the second storage pool.
B. Create a Flash Pool aggregate with physical SSDs on each node.
C. Create an SSD storage pool, and then create a Flash Pool aggregate on
each node.
D. Create a Flash Pool aggregate on one node using an SSD storage pool then
create another Flash Pool aggregate using physical SSDs on the partner
node.
13. A customer has a 1,000 GB volume used as a NAS share that has 3x 100GB
files and has no existing Snapshot copies. The customer creates a Snapshot
copy of the volume, adds a 500 GB file to the volume, and then deletes one of
the 100GB files from the volume.
How much free space is in the volume in this scenario?
A. 500GB
B. 200GB
C. 300GB
D. 600GB
14. Click the Exhibit button.
The maximum RAID group size of the RAID-DP aggr1 shown in the exhibit
is 18. You expand the aggregate by 20 disks.
How many of the new disks are used for data?
A. 20
B. 16
C. 14
D. 18
15. Which command prompt is displayed when a cluster named d1 is in Advanced
privilege mode?
A. cl1::>
B. cl1::*>
C. cl1-01>
D. SP cl1-01>
16. Users report that they are unable to connect to home directories stored on a
NetApp cluster. You are using Active Directory-based Keberos authentication.
Which two actions would correct the problem? (Choose two)
A. Verify that domain tunneling is configured in ONTAP
B. Verify that an Active Directory domain admin account is configured in
ONTAP
C. Verify that the CIFS server is running in the SVM
D. Verify that the Network Time Protocol service is in sync.
17. Which CLI command is used to move epsilon to a new node?
A. cluster modify
B. cluster identity modify
C. cluster setup
D. storage failover takeover
18. An administrator is designing an ONTAP 9,1 solution for an environment that
will serve only FCoE-connected hosts. The environment needs a minimum of
10 cluster nodes to meet the workload requirement.
Which NetApp system should the administrator use for this solution?
A. FAS8200
B. FAS2650
C. FAS2520
D. ONTAP Select
19. Which CLI command is used to move epsilon to a new node?
A. cluster modify
B. cluster identity modify
C. cluster setup
D. storage failover takeover
20. A customer has created an SVM in a 8-node cluster with only FC licensed on
all nodes. The customer wants to limit the number of paths visible to each
host.
Which three technologies accomplish this task?(Choose three)
A. virtual SANS (VSANs) for all FC target ports to segment specific
virtual ports in mapping to the application servers
B. multipathing to limit the access to the LUNs from each host
C. SLM to limit the paths from each node to the appropriate application
servers.
D. Port sets to limit the paths from each node to the appropriate application
servers
E. FC switch zoning of a subset of the target ports to each application
server’s HBAs
21. Which NetApp management tool verifies the disk-shelf cabling of an existing
NetApp cluster?
A. OnCommand System Manager
B. OnCommand Unified Manager
C. Config Advisor
D. System Setup
22. You wants to configure Performance Manager to monitor the average latency
of a volume hosting a Microsoft Exchange Server. In addition, an alert needs
to be created before latency reaches 20 miliseconds.
How would you accomplish this task?
A. Set a threshold policy for average latency with a warning of 12 a
critical warning of 15
B. Set a data source for average latency with a warning of a12 and a critical
warning of 15
C. Set an event handler for average latency with warning of 12 and a critical
warning of 15
D. Set an event inventory for average latency with a warning of 12 and a
critical warning of 15
23. You want to use SVM disaster recovery to replicate an SVM to your disaster
recovery site. You have the requirements shown below.
-- The source and destination cluster are in different network subnets
-- The source SVM is running only NAS protocols.
-- The CIFS server configuration should be replicated
Which two configurations are correct in this scenario? (Choose two)
A. The SnapMirror –identity-preserve parameter should be set to false
B. The SpanMirror –identity-preserve parameter should be set to true
C. The SnapMirror –discard-configs network policy parameter
should be used
D. The SnapMirror –discard-configs network policy parameter should not be
used.
24. Click the Exhibit button.
After logging into an SVM using the vsadmin user admin user account, you
are able to see existing volumes, but are unable to create new volumes.
Referring to the configuration shown in the exhibit, what is the problem?
A. The vsadmin role does not have the create volumes privilege.
B. Aggregate SAS_01 is out space
C. No aggregates have been assigned to the SVM or
D. The vsadmin user is not assigned the correct application access
25. An administrator has an SVM named SVM-NAS that is_used for NFS clients.
You change the volume junction path of a volume named vol1 from /vol1
/IT/vol1. After you make this change, the existing NFS clients are unable to
connect to the new path.
Which cluster object should you update to solve this problem?
A. The export policy on the SVM_NAS SVM
B. The data LIF on the SVM_NAS SVM
C. The cluster admin LIF
D. The load-sharing mirror the SVM root volume
26. To configure high availability within a FAS8080 EX HA pair, which two
statements are correct? (Choose two)
A. Connect both the local node and partner node to disk shelves using
multipath HA
B. Connect multiple FC paths from the controllers to the hosts
C. Cable the cluster interconnects to the interconnect switch
D. Connect the NVRAM HA interconnects between the nodes in the HA
pair
27. Click the Exhibit button
32. Exhibit:
Question:
You have a 2-node cluster named cl1 that has separate LIFs on each node for both
SAN and NAS traffic. A storage failover takeover process is initiated as
shown in the exhibit.
In this scenario, which two statements about the takeover process are true ?
(choose two)
a. The NAS LIFs on cl1-01 automatically migrate to cl1-02
b. The NAS LIFs on cl1-01 go offline
c. The SAN LIFs on cl1-01 go offline
d. The SAN LIFs on cl1-01 automatically migrate to cl1-02
33. Exhibit:
Question:
The size of the aggr1 RAID group shown in the exhibit is 16.
What is the RAID Type?
a. RAID4
b. RAID0
c. RAID-DP
d. RAID-TEC
34. You are training storage operator to view the aggregates available on the
nodes from multiple shells. Which two shell and command combinations
would you use to accomplish this task ? (choose two)
a. Nodeshell aggregate status
b. Systemshell aggregate show
c. Clustershell aggregate show
d. Systemshell aggregate status
36. You need to restrict SNMP access to a node management LIF to a specific
subnet.
In this scenario, which two commands must you verify to ensure limited access?
(choose two)
a. Network interface show
b. Network port vlan
c. Network subnet
d. Firewall policy
37. SVM root volume protection should be configured when which two protocols
are in use ? (Choose two)
a. CIFS
b. NFS
c. FCP
d. iSCI
38. you have volume configured for NTFS security that serves data to Windows
hosts over SMB 2.1. you have a Linux client that need to access the same data
over NFSv3.
Which three settings are needed to allow NFS access to the same volume? (choose
three)
a. Quota Policy
b. Default Unix User
c. NFS license
d. Default Windows User
e. Export Policy
39. Exhibit:
Netapp01: : > net int create -vserver acmefs01 -lif acmefs01 -role data -data-
protocol cifs – home-node netapp01-01 -home-port a0a-103 -address
10.1.100.64 -netmask 255.255.255.0
(network interface create)
Question:
You manage a multi-tenant Netapp Storage system. You start configuring an
SVM for a new customer and receive the error shown in the exhibit when you
attempt to create a LIF. You verify that the IP address is correct and that the
customer LIF does not already exist. However, you see that another customer
is using the same IP address in their SVM.
How would you correct this problem?
a. Create an IPspace for the new customer
b. Create a broadcast domain for the new customer
c. Create the LIF with a different IP address
d. Create a new VLAN for the new customer
40. Exhibit:
Question:
You have a 2-node Netapp cluster. You perform a storage failover and notice that
IP address 10.1.100.21 is unreachable while omegana-01 is rebooting. After
omegana1-01 is back online, the IP address becomes reachable again.
However, IP address 10.1.100.20 was still reachable during the reboot. The
commands shown in the exhibit were executed before the storage failover.
In this scenario, why was IP address 10.1.100.21 unreachable?
a. The LIF for 10.1.100.21 has an incorrect failover setting
b. The failover group for 10.1.100.21 is misconfigured
c. The node management LIFs cannot fail over to other nodes
d. The address Resolution Protocol (ARP) cache needs to be cleared on the
upstream switch
41. You need to replicate a FlexVol volume ONTAP 9.1 to ONTAP 8.3
In this scenario, which Snap Mirror relationship type would you use?
a. XDP
b. LS
c. DP
d. TDP
42. Exhibit:
Cluster1: : > volume create -vserver acmefs01 -volume media_vol -aggr-list
sas_01, sas_02 – junction-path /media -size 200TB -space-guarantee none
Question:
You create a volume as shown in the exhibit.
Which statement about the new volume is true?
a. A FlexVol volume is created on the aggregate (sas_01 or sas_02) with the
most free space
b. A FlexVol volume is created on aggregate sas_01 and can only be moved to
aggregate sas_02
c. A FlexVol volume is created with eight constituents
d. A FlexVol volume is created with two constituents
43. Which two feature provide physical path resiliency from a Windows 2016
server to an iSCSI LUN on a 12-node ONTAP cluster? (Choose two)
a. Broadcast domains
b. ALUA
c. MPIO
d. Failover groups
44. Exhibit:
Question:
Referring to the exhibit, which statement is true?
a. The node’s CPU has been underutilized on average for the past one hour
b. The node’s CPU has been overutilized on average for the past one hour
c. The node’s aggregates have been underutilized on average for the past one
hour
d. The node’s aggregates have been overutilized on average for the past one hour
46. A storage controller named cl1-01 has disk ownership of disks in shelves 10
and 11. Its HA partner, cl1-02, has disk ownership of disks in shelves 20 and
21. Controller cl1-01 has successfully failed over to cl1-02
In this scenario, what are the owner and home attributes for disks in shelf 11 ?
a. A home attribute of none and an owner attribute of cl1-02
b. A home attribute of cl1-01 and an owner attribute of cl1-02
c. A home attribute of cl1-02 and an owner attribute of cl1-01
d. A home attribute of cl1-02 and an owner attribute of cl1-02
47. You have a read-only volume that needs protection within the cluster, but you
do not have a SnapMirror license.
Which mirror type would you use to protect the volume?
a. XDP
b. LS
c. DP
d. TDP
49. You have a volume in an SVM that needs to be moved to a different SVM.
You do not have room to copy the volume to the other SVM.
Which ONTAP command will accomplish this task?
a. Volume rehost
b. Volume mount
c. Volume modify
d. Volume move
50. You have a FlexVol with LUNs and need to manually free space to prevent
ENOSPC error on the host.
In this scenario, which two commands will keep the LUN available to the host?
(Choose Two)
a. Snapshot autodelete
b. Snapshot delete
c. Volume autosize
d. Volume size
51. An SVM CIFS server has the ability to be configured as a member of which
two security models? (Choose Two)
a. Active Directory domain
b. Dynamic DNS (DDNS)
c. Workgroup
d. Broadcast domain
52. Exhibit
Volume Move Detail
Move State (Phase) : Healty (Cutover)
Node (Aggregate) : cl1-02(dco_n_msn_cl1_02_sas_01)
Percentage Complete : 79%
Time to Complete : Completes on Oct/18/2016 13:43:02
Details : Cutover Started: (1 of 3 attemps)
(39.00MB Sent) : Volume move job
Commit
Referring to the exhibit, which statement about the volume move process is true?
a. The cutover process failed and is in a holding pattern before being attempted
again
b. Client access to the volume is blocked during this phase of operation
c. Client access is being redirected to the destination location during this
phase of the operation
d. The initial replication phase sent 39 MB from the source to the destination
location
54. A storage administrator wants to recover a file a snapshot. The rest of the data
in this volume should be preserved.
In this scenario, which command would you use?
a. Volume snapshot restore-file
b. Volume snapshot compute-reclainable
c. Volume snapshot rename
d. Volume snapshot restore
55. You have a FAS8080 EX system using NetApp Storage Encryption (NSE)
drives encrypted with an external key management (KMIP) server. You want
to enable NetApp Volume Encryption (NVE).
To accomplish this task, which three statements are corrects ?
(Choose three)
a. Delete all FlexClone
b. Unencrypt the NSE drives and delete the external key manager
configuration
c. License NVE
d. Configure time synchronization
e. Configure the Onboard Key Manager (OKM)
56. An administrator has a FAS8200 system and is adding a DS224C disk shelf
for Flash Pool use, consisting of 800GB SSDs.
When a flash pool is created out of these disks, what is the default RAID group
type?
a. RAID-TEC
b. RAID-4
c. RAID1
d. RAID-DP
60. You have a 2-node NetApp cluster. You would like to use an onboard UTA2
port for host connectivity. The port was previously connected to a tape library
using native FC.
What must you do to configure this port for host connectivity?
a. A change the FC type to initiator
b. Change the FC type to target
c. Change the port mode to CNA
d. Change the port mode to FC