Você está na página 1de 22

1. You want to move a LUN created in ONTAP 9.

1 from one HA pair to another


HA pair in the same cluster which three commands would you use to perform
this move? (Choose three)
A. lun move start
B. lun map
C. lun mapping remove-reporting-nodes
D. lun mapping add-reporting-nodes
E. lun igroup modify
2. An administrator has an existing host that is using FCP for access to LUNs on
a NetApp SVM. The administrator replaces the host HBA and updates the
zoning configuration on the FC switches. After the replacement, the host loses
access to all of its LUNs. The administrator verifies that the host WWPNs
successfully show up in the FLOGI database on the switches.
What should the administrator do to restore LUN connectivity?
A. The host needs to be rebooted so that it will refresh its view of the fabric
B. Take the LUNs offline and then bring them back online again so the host
can see new paths to the LUNs
C. Migrate the data newly provisioned LUNs that are mapped with the new
WWPNs
D. Update the initiator group mapped to the LUN with the new WWPNs
3. Click the Exhibit button
While reviewing the port health shown in the exhibit, you noticed that pot e0c
on node1 degraded.
What would cause this problem?
A. The port is in the wrong broadcast domain.
B. The port does not have an IP address
C. The port has been flapping
D. The port is not plugged into a switch
4. You want to enable jumbo frames on a NetApp storage system.
Which network object would you modify to accomplish this task?
A. VLAN
B. Port
C. LIF
D. Broadcast domain
5. You are configuring an ONTAP solution for FC host connectivity.
In this scenario, how should the cluster be configured? (Choose two)
A. FC ports must be configured as initiators
B. FCP must be licensed on the cluster
C. The SVM must configured for Ethernet LIFs
D. FC ports must be configured as targets
6. You want to use UTA2 ports for native FC LUN access.
How do you accomplish this task?
A. Configure the UTA2 ports as initiators ports with 10Gb SFP +
transceivers.
B. Configure the UTA2 ports as target ports with 10G Gb SFP + transceivers.
C. Configure the UTA2 ports as initiator ports with 16 Gb SFP +
transceivers.
D. Configure the UTA2 ports as target ports with 16 Gb SFP +
transceivers.
7. Which type of write once, read many (WORM) workload is designed for
compliance purpose through SnapLock?
A. WORM files on FlexArray aggregates
B. WORM file using SnapMirror replication
C. WORM files on SyncMirror aggregates
D. WORM files on MetroCluster volumes
8. Click the Exhibit button

In reference to the NFS export-policy rules shown in the exhibit, NFS clients
mounted to/data1 from the 192.168.1.0/24, 192.168.2.0/24, and
192.168.3.0/24, subnets are able to mount /data1 and read files but are unable
to edit files or write new files. All other subnets require read-only access
to/data1.
What must you do to allow write access to the three subnets while allowing
read-only access to all other subnets in this scenario?
A. Set the index of ruleindex 4 to ruleindex 1.
B. Set the index of ruleindex 2 to ruleindex 4.
C. Set the index of ruleindex 1 to ruleindex 4.
D. Set the index of ruleindex 3 to ruleindex 4.
9. An administrator wants to restore a file using the Previous Versions tab on a
Windows client.
Which command enables the Previous Versions feature?
A. volume modify –snapdir-access
B. volume modify –policy
C. volume modify –user
D. volume modify –group
10. Click the Exhibit button

Referring to the exhibit the write operations would be compacted into how
many WAFL blocks?
A. 2
B. 3
C. 4
D. 5
11. Which LIF role type is used by a volume move operation between noodes?
A. cluster
B. data
C. intercluster
D. cluster-mgmt
12. You need a Flash Pool aggregate on both nodes of a 2-node cluster. You also
want to maximize usable space in the SSD cache.
Which Flash Pool configuration is appropriate for this situation?
A. Create two storage pools and then create a Flash Pool aggregate on one
node; then create another Flash Pool aggregate on the partner node to use
the second storage pool.
B. Create a Flash Pool aggregate with physical SSDs on each node.
C. Create an SSD storage pool, and then create a Flash Pool aggregate on
each node.
D. Create a Flash Pool aggregate on one node using an SSD storage pool then
create another Flash Pool aggregate using physical SSDs on the partner
node.
13. A customer has a 1,000 GB volume used as a NAS share that has 3x 100GB
files and has no existing Snapshot copies. The customer creates a Snapshot
copy of the volume, adds a 500 GB file to the volume, and then deletes one of
the 100GB files from the volume.
How much free space is in the volume in this scenario?
A. 500GB
B. 200GB
C. 300GB
D. 600GB
14. Click the Exhibit button.

The maximum RAID group size of the RAID-DP aggr1 shown in the exhibit
is 18. You expand the aggregate by 20 disks.
How many of the new disks are used for data?
A. 20
B. 16
C. 14
D. 18
15. Which command prompt is displayed when a cluster named d1 is in Advanced
privilege mode?
A. cl1::>
B. cl1::*>
C. cl1-01>
D. SP cl1-01>
16. Users report that they are unable to connect to home directories stored on a
NetApp cluster. You are using Active Directory-based Keberos authentication.
Which two actions would correct the problem? (Choose two)
A. Verify that domain tunneling is configured in ONTAP
B. Verify that an Active Directory domain admin account is configured in
ONTAP
C. Verify that the CIFS server is running in the SVM
D. Verify that the Network Time Protocol service is in sync.
17. Which CLI command is used to move epsilon to a new node?
A. cluster modify
B. cluster identity modify
C. cluster setup
D. storage failover takeover
18. An administrator is designing an ONTAP 9,1 solution for an environment that
will serve only FCoE-connected hosts. The environment needs a minimum of
10 cluster nodes to meet the workload requirement.
Which NetApp system should the administrator use for this solution?
A. FAS8200
B. FAS2650
C. FAS2520
D. ONTAP Select
19. Which CLI command is used to move epsilon to a new node?
A. cluster modify
B. cluster identity modify
C. cluster setup
D. storage failover takeover
20. A customer has created an SVM in a 8-node cluster with only FC licensed on
all nodes. The customer wants to limit the number of paths visible to each
host.
Which three technologies accomplish this task?(Choose three)
A. virtual SANS (VSANs) for all FC target ports to segment specific
virtual ports in mapping to the application servers
B. multipathing to limit the access to the LUNs from each host
C. SLM to limit the paths from each node to the appropriate application
servers.
D. Port sets to limit the paths from each node to the appropriate application
servers
E. FC switch zoning of a subset of the target ports to each application
server’s HBAs
21. Which NetApp management tool verifies the disk-shelf cabling of an existing
NetApp cluster?
A. OnCommand System Manager
B. OnCommand Unified Manager
C. Config Advisor
D. System Setup
22. You wants to configure Performance Manager to monitor the average latency
of a volume hosting a Microsoft Exchange Server. In addition, an alert needs
to be created before latency reaches 20 miliseconds.
How would you accomplish this task?
A. Set a threshold policy for average latency with a warning of 12 a
critical warning of 15
B. Set a data source for average latency with a warning of a12 and a critical
warning of 15
C. Set an event handler for average latency with warning of 12 and a critical
warning of 15
D. Set an event inventory for average latency with a warning of 12 and a
critical warning of 15
23. You want to use SVM disaster recovery to replicate an SVM to your disaster
recovery site. You have the requirements shown below.
-- The source and destination cluster are in different network subnets
-- The source SVM is running only NAS protocols.
-- The CIFS server configuration should be replicated
Which two configurations are correct in this scenario? (Choose two)
A. The SnapMirror –identity-preserve parameter should be set to false
B. The SpanMirror –identity-preserve parameter should be set to true
C. The SnapMirror –discard-configs network policy parameter
should be used
D. The SnapMirror –discard-configs network policy parameter should not be
used.
24. Click the Exhibit button.
After logging into an SVM using the vsadmin user admin user account, you
are able to see existing volumes, but are unable to create new volumes.
Referring to the configuration shown in the exhibit, what is the problem?
A. The vsadmin role does not have the create volumes privilege.
B. Aggregate SAS_01 is out space
C. No aggregates have been assigned to the SVM or
D. The vsadmin user is not assigned the correct application access
25. An administrator has an SVM named SVM-NAS that is_used for NFS clients.
You change the volume junction path of a volume named vol1 from /vol1
/IT/vol1. After you make this change, the existing NFS clients are unable to
connect to the new path.
Which cluster object should you update to solve this problem?
A. The export policy on the SVM_NAS SVM
B. The data LIF on the SVM_NAS SVM
C. The cluster admin LIF
D. The load-sharing mirror the SVM root volume
26. To configure high availability within a FAS8080 EX HA pair, which two
statements are correct? (Choose two)
A. Connect both the local node and partner node to disk shelves using
multipath HA
B. Connect multiple FC paths from the controllers to the hosts
C. Cable the cluster interconnects to the interconnect switch
D. Connect the NVRAM HA interconnects between the nodes in the HA
pair
27. Click the Exhibit button

You create a new SnapMirror relationship, but it falls to initialize. The


SnapMirror relationship is configured as shown in the exhibit.
How would you solve this problem?
A. Change the language on the destination volume to C.UTF-8
B. Change the language on the source volume to en_US
C. Re-create the destination volume as en_US
D. Re-create the destination volume as C.UTD-8
28. Which configuration is supported by MetroCluster?
A. a single AFF at Site A attached directly to a single AFF at Site B
B. an HA pair at Site A attached directly to an HA pair at Site B
C. an AFF HA pair at Site A attached through fabrics to a FAS HA pair at
Site B
D. a single AFF at Site A attached through fabrics to an AFF HA pair at Site
B
29. Which is the compression group size for adaptive compression?
A. The group size is always 8k, regardless of the workload
B. The group size is always 4k, regardless of the workload
C. The group size is always 32k, regardless of the workload
D. The group size is determined based upon the workload.
30. You just upgrading a cluster to ONTAP 9.1 and would like to enable NetApp
Volume Encryotion (NVE) on an existing volume. You do not have NetApp
Storage Encryption (NSE) drives installed.
Which three steps would you take to accomplish this task? (Choose three)
A. Execute the key manager setup wizard
B. Install the NVE license
C. Modify the volume options with the –encrypt true parameter
D. Replace drives with NSE drives
E. Perform a volume move operation using the –encrypt-destination true
parameter
31. Which two actions create more space in a nearly full FlexVol volume?
(Choose two)
A. Enable compression
B. Enable deduplication
C. Add disks to the aggregate hosting the volume
D. Change the fractional reserve from 0 to 100

32. Exhibit:

Question:
You have a 2-node cluster named cl1 that has separate LIFs on each node for both
SAN and NAS traffic. A storage failover takeover process is initiated as
shown in the exhibit.
In this scenario, which two statements about the takeover process are true ?
(choose two)
a. The NAS LIFs on cl1-01 automatically migrate to cl1-02
b. The NAS LIFs on cl1-01 go offline
c. The SAN LIFs on cl1-01 go offline
d. The SAN LIFs on cl1-01 automatically migrate to cl1-02

33. Exhibit:

Question:
The size of the aggr1 RAID group shown in the exhibit is 16.
What is the RAID Type?
a. RAID4
b. RAID0
c. RAID-DP
d. RAID-TEC
34. You are training storage operator to view the aggregates available on the
nodes from multiple shells. Which two shell and command combinations
would you use to accomplish this task ? (choose two)
a. Nodeshell aggregate status
b. Systemshell aggregate show
c. Clustershell aggregate show
d. Systemshell aggregate status

35. An administrator wants to segment applications based on performance. The


applications are all using LUNs to access their data.
In this scenario, what are two methods of using quality service (QoS) to improve
performance? (Choose two)
a. Set the policy group for the SVM that is hosting the LUNs
b. Set the policy group for the volumes that are hosting the LUNs
c. Set the policy group for the initiator groups (igroups) mapped to the LUNs
d. Set the policy group for the FC target ports that are being used for the LUNs

36. You need to restrict SNMP access to a node management LIF to a specific
subnet.
In this scenario, which two commands must you verify to ensure limited access?
(choose two)
a. Network interface show
b. Network port vlan
c. Network subnet
d. Firewall policy

37. SVM root volume protection should be configured when which two protocols
are in use ? (Choose two)
a. CIFS
b. NFS
c. FCP
d. iSCI

38. you have volume configured for NTFS security that serves data to Windows
hosts over SMB 2.1. you have a Linux client that need to access the same data
over NFSv3.
Which three settings are needed to allow NFS access to the same volume? (choose
three)
a. Quota Policy
b. Default Unix User
c. NFS license
d. Default Windows User
e. Export Policy

39. Exhibit:
Netapp01: : > net int create -vserver acmefs01 -lif acmefs01 -role data -data-
protocol cifs – home-node netapp01-01 -home-port a0a-103 -address
10.1.100.64 -netmask 255.255.255.0
(network interface create)

Info: Failed to create logical interface


Error: command failed: Duplicate ip address 10.1.100.64

Question:
You manage a multi-tenant Netapp Storage system. You start configuring an
SVM for a new customer and receive the error shown in the exhibit when you
attempt to create a LIF. You verify that the IP address is correct and that the
customer LIF does not already exist. However, you see that another customer
is using the same IP address in their SVM.
How would you correct this problem?
a. Create an IPspace for the new customer
b. Create a broadcast domain for the new customer
c. Create the LIF with a different IP address
d. Create a new VLAN for the new customer

40. Exhibit:
Question:
You have a 2-node Netapp cluster. You perform a storage failover and notice that
IP address 10.1.100.21 is unreachable while omegana-01 is rebooting. After
omegana1-01 is back online, the IP address becomes reachable again.
However, IP address 10.1.100.20 was still reachable during the reboot. The
commands shown in the exhibit were executed before the storage failover.
In this scenario, why was IP address 10.1.100.21 unreachable?
a. The LIF for 10.1.100.21 has an incorrect failover setting
b. The failover group for 10.1.100.21 is misconfigured
c. The node management LIFs cannot fail over to other nodes
d. The address Resolution Protocol (ARP) cache needs to be cleared on the
upstream switch

41. You need to replicate a FlexVol volume ONTAP 9.1 to ONTAP 8.3
In this scenario, which Snap Mirror relationship type would you use?
a. XDP
b. LS
c. DP
d. TDP

42. Exhibit:
Cluster1: : > volume create -vserver acmefs01 -volume media_vol -aggr-list
sas_01, sas_02 – junction-path /media -size 200TB -space-guarantee none

Question:
You create a volume as shown in the exhibit.
Which statement about the new volume is true?
a. A FlexVol volume is created on the aggregate (sas_01 or sas_02) with the
most free space
b. A FlexVol volume is created on aggregate sas_01 and can only be moved to
aggregate sas_02
c. A FlexVol volume is created with eight constituents
d. A FlexVol volume is created with two constituents

43. Which two feature provide physical path resiliency from a Windows 2016
server to an iSCSI LUN on a 12-node ONTAP cluster? (Choose two)
a. Broadcast domains
b. ALUA
c. MPIO
d. Failover groups

44. Exhibit:
Question:
Referring to the exhibit, which statement is true?
a. The node’s CPU has been underutilized on average for the past one hour
b. The node’s CPU has been overutilized on average for the past one hour
c. The node’s aggregates have been underutilized on average for the past one
hour
d. The node’s aggregates have been overutilized on average for the past one hour

45. Which block protocol does ONTAP Cloud support?


a. iSCSI
b. FCoE
c. NFS
d. CIFS

46. A storage controller named cl1-01 has disk ownership of disks in shelves 10
and 11. Its HA partner, cl1-02, has disk ownership of disks in shelves 20 and
21. Controller cl1-01 has successfully failed over to cl1-02
In this scenario, what are the owner and home attributes for disks in shelf 11 ?
a. A home attribute of none and an owner attribute of cl1-02
b. A home attribute of cl1-01 and an owner attribute of cl1-02
c. A home attribute of cl1-02 and an owner attribute of cl1-01
d. A home attribute of cl1-02 and an owner attribute of cl1-02
47. You have a read-only volume that needs protection within the cluster, but you
do not have a SnapMirror license.
Which mirror type would you use to protect the volume?
a. XDP
b. LS
c. DP
d. TDP

48. What is a characteristic of a single-node cluster ?


a. It does not have a node management LIF
b. It does not have any cluster interconnect LIFs
c. It is unsupported in a production environment
d. It only hosts a single SVM

49. You have a volume in an SVM that needs to be moved to a different SVM.
You do not have room to copy the volume to the other SVM.
Which ONTAP command will accomplish this task?
a. Volume rehost
b. Volume mount
c. Volume modify
d. Volume move

50. You have a FlexVol with LUNs and need to manually free space to prevent
ENOSPC error on the host.
In this scenario, which two commands will keep the LUN available to the host?
(Choose Two)
a. Snapshot autodelete
b. Snapshot delete
c. Volume autosize
d. Volume size

51. An SVM CIFS server has the ability to be configured as a member of which
two security models? (Choose Two)
a. Active Directory domain
b. Dynamic DNS (DDNS)
c. Workgroup
d. Broadcast domain

52. Exhibit
Volume Move Detail
Move State (Phase) : Healty (Cutover)
Node (Aggregate) : cl1-02(dco_n_msn_cl1_02_sas_01)
Percentage Complete : 79%
Time to Complete : Completes on Oct/18/2016 13:43:02
Details : Cutover Started: (1 of 3 attemps)
(39.00MB Sent) : Volume move job
Commit

Referring to the exhibit, which statement about the volume move process is true?
a. The cutover process failed and is in a holding pattern before being attempted
again
b. Client access to the volume is blocked during this phase of operation
c. Client access is being redirected to the destination location during this
phase of the operation
d. The initial replication phase sent 39 MB from the source to the destination
location

53. Which command enables the vsadmin accout?


a. Security login unlock
b. Security login modify
c. Security login domain-tunnel create
d. Security login create

54. A storage administrator wants to recover a file a snapshot. The rest of the data
in this volume should be preserved.
In this scenario, which command would you use?
a. Volume snapshot restore-file
b. Volume snapshot compute-reclainable
c. Volume snapshot rename
d. Volume snapshot restore

55. You have a FAS8080 EX system using NetApp Storage Encryption (NSE)
drives encrypted with an external key management (KMIP) server. You want
to enable NetApp Volume Encryption (NVE).
To accomplish this task, which three statements are corrects ?
(Choose three)
a. Delete all FlexClone
b. Unencrypt the NSE drives and delete the external key manager
configuration
c. License NVE
d. Configure time synchronization
e. Configure the Onboard Key Manager (OKM)

56. An administrator has a FAS8200 system and is adding a DS224C disk shelf
for Flash Pool use, consisting of 800GB SSDs.
When a flash pool is created out of these disks, what is the default RAID group
type?
a. RAID-TEC
b. RAID-4
c. RAID1
d. RAID-DP

57. An administrator has a FlexGroup volume configured on a 4-node FAS8200


cluster, New nodes have been added to the cluster, and the administrator wants
to improve performance on the FlexGroup volume using the new nodes.
Additionally, the FlexGroup volume size needs to Increase to accommodate
new workloads.
Which command would satisfy the requirements in the scenario?
a. Aggregate add-disks
b. Volume mount
c. Volume modify
d. Volume expand

58. When a two-node cluster is expanded, which cluster configuration would be


supported?
a. A 4-node switchless cluster
b. A 3-node switchless cluster
c. A 3-node switched cluster
d. A 4 node switched cluster
59.
You create a new SVM named acmefs01, a new LIF and several shares. While
testing access, users report that they are unable to access the new shares or
ping the new LIF. However, you are able to access the shares from servers in
the same VLAN. While troubleshooting, you run the commands shown in the
exhibit.
In this scenario, what is the problem ?
a. The default route metric is too high
b. The LIF’s subnet mask is incorrect
c. A default route is missing
d. The LIF is not on its home port

60. You have a 2-node NetApp cluster. You would like to use an onboard UTA2
port for host connectivity. The port was previously connected to a tape library
using native FC.
What must you do to configure this port for host connectivity?
a. A change the FC type to initiator
b. Change the FC type to target
c. Change the port mode to CNA
d. Change the port mode to FC

61. You want to permanently reassign ownership of an aggregate to a node’s


partner.
What should you do to accomplish this task?
a. Execute the storage aggregate relocation start command
b. Reassign ownership of each disk in the aggregate to the partner node
c. Execute the storage failover command
d. Move all volumes on the aggregate to an aggregate that is owned by the
partner

Você também pode gostar