NS0155 NetworkAppliance PracticeTest --PDF

Embed Size (px)

Citation preview

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    1/56

    NetApp NSO 155

    Number: 000-000Passing Score: 800Time Limit: 120 minFile Version: 1.0

    EXAM NS0-155

    NetApp Certified 7-Mode Data Administrator

    Total Q&A: 173

    Exam Version: 7.60

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    2/56

    Exam A

    QUESTION 1:

    How can you "throttle" SnapValue updates and baseline transfers so that the primary or secondary is nottransmitting data as it can?

    A. Use the k option in the snapvault start or snapshot modify commands.

    B. SnapVault does not support throttling of network throughout.

    C. Use the snapvault throttle command.

    D. Use the k option in the snapvault initialize command.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 2:

    Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but itcannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1's diskshelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes bydefault, and then forcibly take over Node 1 if the error condition persists?

    A. Auto enable of giveback

    B. Negotiated Fail Over

    C. Takeover on panic

    D. Cf.quickloop.enable

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 3:

    In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)

    A. User quotas

    B. Tree quotasC. Root quotas

    D. Group quotas

    E. File quotas

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    3/56

    QUESTION 4:

    Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)

    A. Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bit

    B. Data ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bit

    C. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.1 64-bit

    D. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.0.2 64-bit

    Correct Answer:ACSection: (none)Explanation

    Explanation/Reference:

    QUESTION 5

    :

    An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks areavailable. Data ONTAP will then perform what action.

    A. Chooses a 72-Gigabyte disk and use it as is.

    B. Chooses a 72-Gigabyte disk and right-size it.

    C. Halts after 24 hour of running in degraded mode.

    D. Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 6:

    Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?

    A. All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.

    B. The expansion is triggered by an aggr convert command.

    C. The expansion is triggered by adding disks to exceed 16 TB.

    D. The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates withData ONTAP 8.1 upgrade.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 7

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    4/56

    :What utility on the storage system will allow you to capture network packet information?

    A. Snoop

    B. Netstats

    C. Pktt

    D. Traceroute

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 8:

    The root admin on the UNIX box receives an "Access Denied" message when he attempts to access a newlymounted qtree. What's the most likely cause of this error?

    A. The qtree is missing from the /etc/hosts file.

    B. NFS is turned off on the storage system.

    C. The qtree is set to ntfs security style.

    D. The qtree has not been exported.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 9:

    Which two modes support using SnapMirror over multiple paths?

    A. Standalone

    B. Partner

    C. Multi

    D. Failover

    E. Give back

    Correct Answer: CD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 10:

    Identify the two commands that could be entered on the SnapMirror destination storage system.(Choose two)

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    5/56

    A. Options snapmirror.access on

    B. Options snapmirror.resync on

    C. Snapmirror initialize

    D. Snap mirror resync

    Correct Answer: CD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 11:

    Which two operations can be performed with the SnapDrive for windows graphical user interface?

    A. Create volume

    B. Create Snapshot copies

    C. Create File

    D. Create Disk

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 12:

    Which storage system command would display the WWPNs of hosts that have logged into storage systemusing a Fibre Channel connection?

    A. fcp config

    B. fcp initiator show

    C. fcp show i

    D. fcp show initiator

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 13:

    In a Fiber Channel configuration, the host's HBA is referred to as the ___________, and the storage system'sHBA to as the _____________.

    A. Target, initiator

    B. Primary, secondary

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    6/56

    C. Initiator, target

    D. Secondary, primary

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 14:

    Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?

    A. Running snapmirroe update on the source storage system.

    B. Running snapmirror release on the source storage system.

    C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system

    D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 15:

    You are trying to do a single file SnapRestore for a file, but you are receiving an error message that thedirectory structure no longer exists. Which is the most likely explanation?

    A. Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore.You must now SnapRestore the volume.

    B. Snapshot copies have been created since the original directory structure was deleted.

    C. You must recreate the directory structure before trying to restore the file.

    D. You cannot restore a file to an alternate location.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 16:

    Which mechanism allows you to make LUNs available to some initiators and unavailable to others?

    A. LUN masking

    B. LUN grouping

    C. LUN cloning

    D. LUN hiding

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    7/56

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 17:

    An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a______________ you can have one or more ____________.

    A. session, session, connections

    B. connection, session, connection

    C. connection, connection, sessions

    D. session, connection, sessions

    Correct Answer:ASection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 18:

    Which NetApp Virtual Storage Tier component works at the host level?

    A. Flash Pool

    B. Flash Disk

    C. Flash Accel

    D. Flash CacheE. Flash IO

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 19:

    When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX server,which three valid objects to include in the data set? (Choose three)

    A. The entire client

    B. A directory

    C. A file

    D. A qtree

    Correct Answer:ABCSection: (none)

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    8/56

    Explanation

    Explanation/Reference:

    QUESTION 20:

    What does it signify if the disks are "not owned" in a FAS2020 system?

    A. The disks are mailbox disks.

    B. The disks are spare disks.

    C. The disks are data disks.

    D. The disks are not used.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 21:

    For each Open Systems platform directory to be backed up to the SnapVault secondary storage system youmust execute _____________.

    A. An initial baseline copy

    B. A temporary copy

    C. An incremental copy

    D. A scheduled update copy

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 22:

    What is the maximum distance between a standard clustered pair at 2Bbps?

    A. 10 meters

    B. 50 metersC. 500 meters

    D. 100 meters

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    9/56

    QUESTION 23:

    Which exportfs command will temporally export the resource while ignoring the options specified in the /etc/exports file?

    A. exportfs v

    B. exportfs u

    C. exportfs a

    D. exportfs i

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 24

    :

    Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?

    A. No, but you can file a PVR to request support.

    B. No. it is targeted for a future release of Data ONATP.

    C. Yes, only with a special license installed.

    D. Yes, it has been supported since 8.0.1.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 25:

    Which two cp types would indicate a busy storage system? (Choose two).

    A. cp_from_log_full

    B. cp_from_busy

    C. cp_from_cp

    D. cp_from_timer

    Correct Answer:ACSection: (none)Explanation

    Explanation/Reference:

    QUESTION 26:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    10/56

    There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct sequence of thesephases?

    A. Setup Phase, Mirror Phase, Cutover Phase

    B. Initialization phase, Copy Phase, Migrate Phase

    C. Begin Phase, Move Phase, Complete Phase

    D. Setup Phase, Data Copy Phase, Cutover Phase

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 27:

    Which statement describes the results of the SnapMirror resynce command?

    A. Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and removesall newer information on the storage system on which the command is run.

    B. Resynchronization will cause the loss of all data written to the destination after the original base snapshotwas made.

    C. Resynchronization will update the snapshot on the destination filer.

    D. Resynchronization will update the snapshot on the source filer.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 28:

    If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to these files?

    A. /vol/vol0/etc/log/snaplog/

    B. /vol/vol0/etc/snapmirror/

    C. /vol/vol0/etc/snaplog/

    D. /vol/vol0/etc/log/

    Correct Answer: D

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 29:

    Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths toa LUN.

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    11/56

    A. Token ring, physical

    B. FC SAN, virtual

    C. FC or IP SAN, virtual

    D. FC or IP SAN, Physical

    Correct Answer: D

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 30:

    Which two will allow you to read and analyze a packet trace file generated by the storage system? (Choosetwo)

    A. WireShark

    B. PkttC. Netmon

    D. Eternal View

    Correct Answer:ACSection: (none)Explanation

    Explanation/Reference:

    QUESTION 31:

    How does the NetApp Remote Agent (RSA) connect to NetApp Support?

    A. NetApp Support initiates a non-secure connection to the RSA.

    B. NetApp Support initiates a secure connection to the RSA.

    C. The RSA initiates a secure connection to NetApp Support.

    D. The RSA initiates a non-secure connection to NetApp support.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 32:

    Which two commands can be used to enable LUN reservations? (Choose two)

    A. lun set reservation

    B. lun reservation set

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    12/56

    C. lun map

    D. lun create

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 33:

    Which Data ONTAP option sets system-wide for all transfers?

    A. Options transfers.wide.enable

    B. Options transfer.throttle.enable.

    C. Option replication.wide.enable

    D. Options replication.throttle.enable

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 34:

    What is the correct format for the scheduling component of a SnapVault schedule?

    A. cnt[@day_list][@hour_list]

    B. YYYY-MM-DDC. Crontable format

    D. List of dates in ISO Date format

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 35:

    When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?

    A. When the 64-bit volumes has Volume Guarantee disabled

    B. When the 64-bit volume has compression enabled

    C. When the 64-bit volume has FlexShare enabled

    D. When the 64-bit volume has ASIS enabled

    Correct Answer:A

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    13/56

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 36:

    UNIX allows file access based on___________.

    A. NT ACLs and UNIX permissions.

    B. NT ACLs and SID.

    C. GID or UID and UNIX permissions.

    D. GID or UID and ACLs.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 37:

    Which NetApp Storage Tier component works controller-wide on a FAS controller?

    A. Flash Pool

    B. Flash Accel

    C. Flash Cache

    D. Flash IO

    E. Flash Disk

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 38:

    Which NetApp Storage Tier component works aggregate-wide on a FAS controller?

    A. Flash PoolB. Flash Cache

    C. Flash Accel

    D. Flash IO

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    14/56

    QUESTION 39:

    What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserveset to 0%? (Choose two)

    A. Snap Autodelete

    B. iGroup throttle

    C. LUN reset

    D. Volume AutoSize

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 40:

    Which set of protocols provide block-level access to NetApp storage?

    A. SNA and RPC

    B. iSCSI and FCP

    C. HTTP and FTP

    D. CIFS and NFS

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 41:

    An iSCSI or FC SAN implementation provides ____________ access to LUNs.

    A. VLD

    B. VIIP

    C. File

    D. Block

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 42:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    15/56

    Which command on the storage system allows you to display statistics on the performance of system resourcesuch as CPU, NVRAM, network interfaces, and disks?

    A. netstat

    B. netdiag

    C. pktt

    D. sysstat

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 43:

    Which three protocols can coexist on a NetApp storage system? (Choose three)

    A. DAFS

    B. CIFS

    C. DFS

    D. FCP

    E. NFS

    Correct Answer: BDESection: (none)Explanation

    Explanation/Reference:

    QUESTION 44:

    Which three tools present statistics from the Data ONTAP counter manager? (Choose three)

    A. Operations manager

    B. Window perfmon

    C. Sysstat

    D. Stats

    Correct Answer:ABD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 45:

    What security mechanism can an administrator use on an OSSV client to use permissions allowing backup toa SnapVault secondary system?

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    16/56

    A. MD5 authentication between SnapVault primary and secondary, with changeable password

    B. Contents inside file called access and located in OSSV /snapvault/etc

    C. QSM access list modifiable via svconfigurator

    D. Via /etc/hosts.equiv file

    Correct Answer: C

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 46:

    Which command disables client access to Snapshot copies on a volume called flexvoll?

    A. cifs shares change flxvoll nosnap

    B. snap access flexvoll off

    C. vol options flexvoll nonsnapdir on

    D. vol options flexvoll snapdir off

    E. vol options flexvoll snapdir on

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 47:

    When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disastersite node. (Choose two)

    A. Use manual fencing

    B. Use the cf giveback f command.

    C. Use the cf forcetakeover d command.

    D. Turn off power to the disaster site node.

    E. Isolate the failed node from the surviving node.

    Correct Answer:ADSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 48:

    The two copies SyncMirror volume are called ____________, which are physical copies of the same filesystem and consist of one or more RAID groups.

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    17/56

    A. Snapshot copies

    B. Aggregates

    C. Plexes

    D. Volumes

    Correct Answer: CSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 49:

    You want to create an automated test environment that performs a single file SnapRestore time you run theprocedure, however, SnapRestore prompts you to confirm your decision to revert the file. How can youautomate this step?

    A. Use the f option with the snmap restore command

    B. Enable the options snaprestore_noprimpts enable = on option.C. These prompts are for data protection and auditing and cannot be overridden.

    D. Enter the priv set advanced mode on the storage system and prompt will not appear.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 50:

    When viewing the output of the sysstat f command, which three fields are part of the output? (Choose three)

    A. FTP

    B. CIFS

    C. NFS

    D. iSCSI

    E. FCP

    Correct Answer: BCESection: (none)Explanation

    Explanation/Reference:

    QUESTION 51:

    Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS users arenow complaining about getting "stale file handles" for the file. Which is the most likely cause of this problem,and the best procedure to correct it?

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    18/56

    A. This might be due to an NFS storage system and client mismatch. Check to see that these users have thesame version of the NFS client that existed at the time the snapshot was taken.

    B. NFS users why try to access a reverted file without first reopening it might get a "stale file handle" errormessage. Have the users try to reopen the file and see if the problem is resolved.

    C. After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their systems.

    D. These users are on a different subnet from the others. Start troubleshooting by checking their subnet.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 52:

    Using the output below, a co-worker determined that these are types "Solaris" LUNs. What would yourdestination be?lun show m LUN patch mapped to LUN ID ------------------------------------------------------- /vol/vol1/lun0 solaris -

    igroup0 0 /vol/vol1/lun solaris- igroup1

    0 /vol/vol1/qtree1/lun2 solaris igroup2 0 /vol/vol1/qtree1/lun3 solaris igroup3 0

    A. These are type "Solaris" LUNs.

    B. Not enough information is given here. Run the lun status command to get the information requested.

    C. Not enough information is given here. Run the lun show v command to get the information requested.

    D. Not enough information is given here. Run the lun map command to get the information requested.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 53:

    Which statement is true about ASIS deduplication license with Data ONTAP 8.1?

    A. The existing 8.0 license key is used.

    B. A new license key is generated.

    C. The license is capacity-based.

    D. The license no longer exists.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 54:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    19/56

    Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was ina level-0 resynchronization state when it failed?

    A. Determine which volumes are at the remote and disaster sites.

    B. Re-create the synchronous mirror.

    C. Rejoin the two volumes.

    D. Turn on power to the cluster node at the disaster site.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 55:

    When running deduplication on SnapVault destinations, which three statements are true?

    A. The target SnapVault controller deduplicates inline.B. The source SnapVault data is deduplicated inline on the target before it is written to disk.

    C. Deduplication internally synchronize with the SnapVault schedule on the destination.

    D. The source (primary) system sends duplicated data even if the source data is deduplicated.

    E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the snapshot toeffectively deduplicate savings.

    Correct Answer: CDESection: (none)Explanation

    Explanation/Reference:

    QUESTION 56:

    If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solarishost and storage system data for analysis?

    A. sio_ntap.exe

    B. prestart

    C. poststat

    D. perfstat

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 57:

    Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    20/56

    A. FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 syns

    B. FilerA:source_vol FilerB:destination_vol 0-55/5 * * *

    C. FilerA:source_vol FilerB:destination_vol sync

    D. FilerA:source_vol FilerB:destination_vol outstanding=3s sync

    Correct Answer:ACD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 58:

    Which three are valid LUN commands? (Choose three)

    A. lun clone

    B. lun copy

    C. lun move

    D. lun rename

    E. lun snap

    Correct Answer:ACESection: (none)Explanation

    Explanation/Reference:

    QUESTION 59:

    Which three attributes would you specify when creating a LUN? (Choose three)

    A. The host operating system of the system attached to LUN.

    B. The version of Data ONTAP

    C. The size of the LUN.

    D. The path to the LUN.

    Correct Answer:ACDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 60:

    Which three items are NFS resources for export? (Choose three.)

    A. directory/qtree

    B. file

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    21/56

    C. subnet

    D. volume

    E. aggregate

    Correct Answer:ABDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 61:

    Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.

    A. True

    B. False

    Correct Answer: B

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 62:

    In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore operationson the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored.Which course of action ensures correct incremental backups?

    A. Perform a base-level backup of the volume after you restore it.B. Reboot the storage system to reset timestamps back to their original times before the reversion.

    C. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.

    D. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup, andthen perform a base-level backup of the volume after you restore it.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 63:

    Which changes the NDMP password on the Open System SnapVault agent?

    A. password

    B. password

    C. svpasswd

    D. svpassword

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    22/56

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 64:Which three licenses are required for fabric-attached MetroCluster? (Choose three.)

    A. Cluster

    B. Cluster_remote

    C. Syncmirror_local

    D. Syncmirror_fabric

    E. Syncmirror_remote

    Correct Answer:ABCSection: (none)Explanation

    Explanation/Reference:

    QUESTION 65:

    Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)

    A. A LUN can be converted into a VLD.

    B. LUNs can be accessed using the FCP protocol.

    C. LUNs can be accessed using the iSCSI protocol.

    D. Block services are associated with an iSCSI or FCP SAN environment.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 66:

    To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utili ty.(Choose two.)

    A. AutoSupport

    B. Bugs Online

    C. NetApp Diagnostics

    D. Release Comparison

    E. System Configuration Guide

    Correct Answer: BDSection: (none)

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    23/56

    Explanation

    Explanation/Reference:

    QUESTION 67:

    Which two commands on the storage system allow you to gather detailed statistics about network interfaces,including basic information about network connections? (Choose two.)

    A. ifstat -a

    B. netdiag -n

    C. netstat -i

    D. sysstat 1

    Correct Answer:ACSection: (none)Explanation

    Explanation/Reference:

    QUESTION 68:

    To configure a storage system as a member of a Windows active directory domain, the time on the storagesystem must be set to be within plus or minus five minutes of the time on the domain controller.

    A. True

    B. False

    Correct Answer:A

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 69:

    For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must dowhat?

    A. Enter the CIFS user in the NIS database.

    B. Enter the user names in the /etc/hosts.equiv file.

    C. Use both a NIS server and a Domain Controller in the network.

    D. Nothing: mapping will occur if user name authentication is available.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    24/56

    QUESTION 70:

    If the security style is set to UNIX, CIFS client file access is determined by ___________.

    A. NT ACLs

    B. the last client to set permissions

    C. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissionsD. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 71:

    NTFS allows file access based on ___________.

    A. NT ACLs and SID.

    B. NT ACLs and UNIX permissions.

    C. SID and password.

    D. UNIX permissions.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 72:

    UNIX allows file access based on __________.

    A. GID or UID and ACLs.

    B. GID or UID and UNIX permissions.

    C. NT ACLs and SID.

    D. NT ACLs and UNIX permissions.

    Correct Answer: B

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 73:Executing this command will have what effect?options wafl.default_security_style ntfs

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    25/56

    A. It will set the security style of all files to be ntfs.

    B. It will change the security style of all qtrees to be ntfs.

    C. It will change the security style of all existing volumes to be ntfs.

    D. It will set the security style of all newly created volumes to ntfs.

    Correct Answer: DSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 74:

    Which two statements apply to an entry in the /etc/exports file regarding exporting directories/qtrees andvolumes? (Choose two.)

    A. Each volume must be exported separately.

    B. Exports are accessible only to hosts with names.

    C. User names used in an export must be resolvable.

    D. Exports can access multiple paths on the same volume.

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 75:

    To automatically export volumes and directories on storage system reboot, include them in the /etc/exports file.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 76

    :

    Which exportfs command will temporarily export the resource while ignoring the options specified in the /etc/exports file?

    A. exportfs -a

    B. exportfs -i

    C. exportfs -u

    D. exportfs -v

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    26/56

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 77:

    Which two are Data ONTAP commands for displaying performance information? (Choose two.)

    A. nfsstat

    B. perfstat

    C. sio_ntap_soll

    D. sysstat

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 78:

    Which statement best describes the output of this command? sysstat -s 5

    A. Display the default output every five seconds and terminate after five counts.

    B. Display extended output every five seconds and print a summary after five counts.

    C. Display extended output every five seconds and print a summary upon termination.

    D. Display the default output every five seconds and print a summary upon termination.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 79:

    To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set on.

    A. TrueB. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    27/56

    QUESTION 80:

    Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)

    A. lun create

    B. lun config

    C. lun makeD. lun setup

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 81:

    In a Fibre Channel configuration, the host's HBA is referred to as the ___________, and the storage system'sHBA is referred to as the __________ .

    A. initiator, target.

    B. primary, secondary.

    C. secondary, primary.

    D. target, initiator.

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 82:

    Before running lun setup on the storage system, you must first create the igroup to which the initiator will beattached.

    A. True

    B. False

    Correct Answer: BSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 83:

    These are three methods of creating a LUN:

    * lun create

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    28/56

    * lun map* lun setup

    A. True

    B. False

    Correct Answer: B

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 84:

    Which set of commands should be used for troubleshooting Ethernet connectivity problems from the storagesystem console?

    A. ifstat, netdiag

    B. perfstat, tracertC. sysconfig - cr, sysstat

    D. dish shm_stats, sysstat

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 85:

    Which command displays the statistics for Ethernet network interfaces?

    A. ifconfig

    B. ifstat

    C. sysconfig

    D. sysstat

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 86:

    Which command is used to set the configuration of an Ethernet network interface?

    A. ifconfig

    B. ifstat

    C. netstat - i

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    29/56

    D. sysconfig - v

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 87:

    What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose three.)

    A. Use reallocate -p pathname to run the physical reallocate.

    B. Use aggr reallocate -p pathname to run the physical reallocate.

    C. Reinitialize any SnapMirror relationship for the new physical geometry.

    D. Volume Snapshots do not need to be deleted for the reallocate to run effectively.

    E. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlierthan 7.2.

    Correct Answer:ADESection: (none)Explanation

    Explanation/Reference:

    QUESTION 88:

    Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the nextSnapMirror update.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 89:

    A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state ofthe ____________ at the time the snapshot was created.

    A. qtrees

    B. volume

    C. directory

    D. storage system

    Correct Answer: B

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    30/56

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 90:

    Data ONTAP uses inodes in an active file system to reference ___________.

    A. qtrees

    B. disk blocks

    C. file segments

    D. Snapshot copies

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 91:

    Which command disables client access to Snapshot copies on a volume called flexvol1?

    A. cifs shares -change flexvol1 -nosnap

    B. snap access flexvol1 off

    C. vol options flexvol1 nosnapdir on

    D. vol options flexvol1 snapdir off

    E. vol options flexvol1 snapdir on

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 92:

    When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap listcommand) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n, the

    _________ the snapshot.

    A. older

    B. newer

    C. more important

    D. least important

    Correct Answer:ASection: (none)Explanation

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    31/56

    Explanation/Reference:

    QUESTION 93:

    A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.

    A. 125

    B. 251

    C. 255

    D. Depends on capacity and number of disk drives

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 94:

    Which three are pre-requisites for using SnapRestore? (Choose three.)

    A. The volume to be reverted must be offline.

    B. The volume to be reverted must not be a SnapMirror destination.

    C. You must enter the SnapRestore license code before you can use it.

    D. Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.

    Correct Answer: BCDSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 95:

    Which command or procedure would you use to undo a volume SnapRestore operation?

    A. snap restore -r vol

    B. snap revert -s vol

    C. snap restore undo vol

    D. You cannot undo a SnapRestore operation at the volume level.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 96

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    32/56

    :

    What happens after you use SnapRestore to revert a volume to a specific snapshot?

    A. You must bring the volume back online.

    B. The storage system automatically performs a snapshot for that volume.

    C. The Snapshot copies that are older than the snapshot you used are deleted.

    D. The Snapshot copies that are more recent than the snapshot you used are deleted.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 97:

    Which three statements are true when using SnapRestore? (Choose three.)

    A. The volume must be online.

    B. SnapRestore must be licensed before you can use it.

    C. The snap restore enable on option must be enabled.

    D. The volume to be reverted must not be a SnapMirror destination mirror.

    Correct Answer:ABDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 98:

    Which objects can be restored by a single SnapRestore command? (Choose three)

    A. file

    B. LUN

    C. qtree

    D. volume

    E. directory

    Correct Answer:ABD

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 99:

    Which option of the snap restore command allows you to specify a different directory, as long as the directoryalready exists?

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    33/56

    A. snap restore -c

    B. snap restore -d

    C. snap restore -r

    D. snap restore s

    Correct Answer: C

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 100:

    A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago.Which command continues the relationship?

    A. SnapMirror initialize

    B. SnapMirror quiesceC. SnapMirror resume

    D. SnapMirror resync

    E. SnapMirror update

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 101:

    When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)

    A. The source volume must be offline.

    B. SnapMirror must be licensed for each storage system.

    C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.

    D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the sourcedestination volume.

    Correct Answer: BCDSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 102:

    Which command would you use to verify that the iSCSI service is running?

    A. iscsi protocol

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    34/56

    B. iscsi service

    C. iscsi show

    D. iscsi status

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 103:

    Identify the two commands that could be entered on the SnapMirror destination storage system.(Choose two.)

    A. snapmirror resync

    B. snapmirror release

    C. snapmirror initialize

    D. options snapmirror.access on

    Correct Answer:ACSection: (none)Explanation

    Explanation/Reference:

    QUESTION 104:

    You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?

    A. snapmirror restart

    B. snapmirror resume

    C. snapmirror resync

    D. snapmirror update

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 105:

    In a volume SnapMirror relationship, the source and destination volumes must be the same size.

    A. True

    B. False

    Correct Answer: BSection: (none)

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    35/56

    Explanation

    Explanation/Reference:

    QUESTION 106:

    Which two statements apply to the fs_size_fixed volume option? (Choose two.)

    A. The default setting is on.

    B. This option is automatically set to be on when a volume becomes a SnapMirrored volume.

    C. This option turns to off after the snapmirror break command is issued for the relationship.

    D. This option causes the SnapMirror destination volume to remain the same size and not grow or shrinkwhen a SnapMirrored volume relationship is broken.

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 107:

    Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)

    A. The default interval value is five minutes.

    B. The smallest interval value supported is 30 seconds.

    C. This variable controls the view of the data on the destination system.

    D. By setting a value, you specify the amount of time before an automatic snapshot is created on the sourcevolume that is synchronously mirrored.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 108:

    SnapMirror will automatically try to restart a transfer after ___________.

    A. an initial transfer is interruptedB. a manual update is interrupted

    C. a transfer interrupted by reboot

    D. a scheduled incremental update is interrupted

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    36/56

    QUESTION 109:

    Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a synchronousSnapMirror relationship?

    A. sync

    B. cksum

    C. src_con

    D. outstanding

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 110:

    Which option will allow a storage system to SnapMirror from this source system?

    A. snapmirror.access

    B. snapmirror.destination

    C. options snapmirror.allow host =

    D. options snapmirror.access host =

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 111:

    Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?

    A. Running snapmirror update on the source storage system

    B. Running snapmirror release on the source storage system

    C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system

    D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 112:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    37/56

    Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)

    A. throttle

    B. visibility interval

    C. outstanding=3s in DOT 7.2

    D. using option semi-sync in DOT 7.3 and higher

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 113:A NearStore license increases the amount of concurrent replication streams.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 114:

    Which is true of the SnapVault backup of a NetApp storage system?

    A. The file is the basic unit for SnapVault backup destination.

    B. The qtree is the basic unit for SnapVault backup destination.

    C. The volume is the basic unit of SnapVault backup destination.

    D. The directory is the basic unit for SnapVault backup destination.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 115:

    Which system is recommended as a secondary system for SnapVault?

    A. IS1200

    B. DataFort

    C. NearStore VTL

    D. FAS with NearStore license

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    38/56

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 116:

    Which statement applies to the Open Systems SnapVault Free Space Estimator utility?

    A. This utility runs automatically after each transfer.

    B. This utility must be enabled on the secondary storage system.

    C. This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer.

    D. This utility determines if there is sufficient disk space available on the secondary to perform an OSSVtransfer.

    Correct Answer: CSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 117:

    The snapvault snap sched -x command is used to ____________.

    A. schedule full backups

    B. cancel scheduled backups

    C. schedule baseline transfer

    D. schedule incremental backups

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 118:

    The snapvault snap create volume snapname command can be executed on the ___________.

    A. open systems

    B. primary system only

    C. secondary system only

    D. secondary or primary systems

    Correct Answer: DSection: (none)Explanation

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    39/56

    Explanation/Reference:

    QUESTION 119:

    The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from yourprimary system.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 120:

    Which three statements apply to NearStore Personality license? (Choose three.)

    A. It increases the storage capacity.

    B. It converts the destination storage system to a NearStore system.

    C. It requires the nearstore_option license on the destination storage system.

    D. It provides increased concurrent streams when the storage systems are used as destinations forSnapMirror and SnapVault transfers.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 121:

    Which Data ONTAP option sets system-wide throttling for all transfers?

    A. options transfer.wide.enable

    B. options transfer.throttle.enable

    C. options replication.wide.enable

    D. options replication.throttle.enable

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 122:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    40/56

    The qtree specified for ____ must not exist on the secondary system before you run the ____

    command.

    A. pri_qtree_path, snapvault start

    B. sec_qtree_path, snapvault staart

    C. pri_qtree_path, snapvault initialize

    D. sec_qtree_path, snapvault initialize

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 123:

    The snapvault restore command is run on the _________.

    A. secondary system to push data to the primary system

    B. primary system to pull data from the secondary system

    C. secondary system to pull data from the primary system

    D. secondary system to push data to the primary storage system

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 124:

    To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system,you can ______________. (Choose two.)

    A. restore to a non existing qtree with DOT 7. 2

    B. add the new qtree to the primary storage system with DOT 7.2

    C. overwrite the existing qtree on the primary storage system with DOT 7.3

    D. delete the existing qtree from the secondary storage system with DOT 7.3

    Correct Answer:AC

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 125:

    The snapvault update command is only available on the secondary system.

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    41/56

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 126:

    The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

    A. True

    B. False

    Correct Answer:ASection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 127:

    What security mechanism can an administrator use on an OSSV client to set permissions allowing backups toa SnapVault secondary system?

    A. Via /etc/hosts.equiv file

    B. QSM access list modifiable via svconfigurator

    C. Contents inside a file called access and located in OSSV /snapvault/etcD. MD5 based authentication between SnapVault primary and secondary, with changeable password

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 128:

    Which tool is available on an OSSV client to assist in starting or stopping the OSSV service, modifying NDMPsettings, enabling debugging, and capturing trace files?

    A. Operations Manager

    B. Protection Manager

    C. Svconfigurator GUI

    D. svdebug.exe

    Correct Answer: CSection: (none)

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    42/56

    Explanation

    Explanation/Reference:

    QUESTION 129:

    Which three statements are true about SnapLock volumes? (Choose three.)

    A. SnapMirror supports SnapLock volumes.

    B. There are two types of SnapLock volumes.

    C. SnapLock volumes support per-file retention periods.

    D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V- Seriescontroller with NetApp Storage.

    Correct Answer:ABCSection: (none)Explanation

    Explanation/Reference:

    QUESTION 130:

    Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in theSnapshot schedule.

    A. True

    B. False

    Correct Answer:A

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 131:

    A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destinationvolume has unexpired WORM files.

    A. True

    B. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 132:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    43/56

    What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

    A. 1

    B. 2

    C. 4

    D. 6

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 133:

    Which command displays the disk ownership for both CPU modules in a FAS2020 system?

    A. disk own -sB. disk show -v

    C. vol status -r

    D. disk display r

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 134

    :

    To remove a cluster setup, you must perform these steps:1. Type cf disable.2. Unlicense cluster.3. Remove partner entries for network interfaces from the /etc/rc file.4. Halt and make sure the partner-sysid is blank.5. Power down and remove the cluster interconnect card.6. Perform steps 1-5 above on the partner node.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 135:

    You are troubleshooting a clustered failover problem at a customer site. The customer explains that both

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    44/56

    storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a fileon the NFS mount point for the inaccessible system, but you get the following error:NFS server filer2 not responding still trying.

    When not in takeover mode, both storage systems operate normally and you do not get the error. You performa "cf giveback" and you can now create a file over NFS on both systems. What should you do first to resolvethis issue?

    A. Replace the NIC adapter.

    B. Submit a new bug report.

    C. Use the cluster-config-checker.cgi to identify the problem and corrective action.

    D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 136:

    Each storage system in a cluster must have network access to the __________.

    A. Internet

    B. cluster partner

    C. same administration

    D. host same collection of subnets

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 137:

    One method of configuring an interface for takeover is to enter ifconfig interface partner address at thecommand line. To make this configuration persistent across reboots, you must enter this information in the_____ file for each system.

    A. /etc/rc

    B. /etc/hosts

    C. /vol/vol0/homeD. /vol/vol0/mount

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    45/56

    QUESTION 138:

    What is the maximum distance between a standard clustered pair at 2Gbps?

    A. 10 meters

    B. 50 meters

    C. 100 metersD. 500 meters

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 139:

    In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity ofthe ________.

    A. local interfaces only

    B. failed partner interfaces only

    C. local and failed partner interfaces

    D. interfaces as defined in the /etc/rc file

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 140:

    When using SnapRestore to restore a single LUN, the LUN must be ___________.

    A. exported and accessible

    B. mapped to a Windows server

    C. mounted on a host

    D. taken offline or unmapped

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 141:

    For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex should be

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    46/56

    identical with regard to ____________.

    A. NVRAM

    B. Mirrored Snapshot copies

    C. RAID groups and disk sizes

    D. NDMP and Snapshot copies

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 142:

    What happens when two aggregates are rejoined?

    A. It is not possible to rejoin aggregates.

    B. Data ONTAP will always retain data from the newest aggregate.C. Both aggregates revert to the last common snapshot before the split.

    D. You will have a large new aggregate containing all volumes from both aggregates.

    E. One of the aggregates will be overwritten and you will lose any data changed on it after the split.

    Correct Answer: ESection: (none)Explanation

    Explanation/Reference:

    QUESTION 143:

    You cannot remove the SyncMirror license if one or more mirrored volumes exist.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 144:

    A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plexwas built. Data ONTAP will __________.

    A. halt all operations to volumes in that pool

    B. choose spare disks to reconstruct from the opposite pool

    C. warn you that there are no available spares from the proper pool

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    47/56

    D. "halt" after 24 hours if spare disks are not added to the proper pool

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 145:

    The required hardware to add SyncMirror to an existing system would be ____________.

    A. disk shelves and cluster interconnect

    B. disk shelves and termination switches

    C. disk shelves, Ethernet adapters, and cabling

    D. disk shelves, Fibre Channel adapters, and cabling

    Correct Answer: D

    Section: (none)Explanation

    Explanation/Reference:

    QUESTION 146:

    Which two are true when creating a SyncMirror volume? (Choose two.)

    A. The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.

    B. The disks selected for Plex 0 and Plex 1 must come from the same disk pools.

    C. The number of disks added must be an even number and equally divided between the two plexes.D. The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of the

    size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger capacity disk and right-sizes it.

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 147

    :

    After issuing the aggr split aggr0/plex0 aggrNew command ____________.

    A. there is a new plex called aggrNew

    B. there are two new plexes, plex0 and plexNew

    C. there is a new mirrored aggregate called aggrNew

    D. there are two unmirrored aggregates, aggr0 and aggrNew

    E. flexible volumes are evenly split between aggr0 and aggrNew

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    48/56

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 148:

    Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and _______.

    A. offline, quiesced

    B. online, consistent

    C. online, normal

    D. restricted, offline

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 149:

    You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is________.

    A. in a giveback mode

    B. fenced off manually

    C. powered on and accessible

    D. powered off and inaccessible

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 150:

    You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which command would

    verify that disks are connected and have dual paths?

    A. disk show

    B. sysconfig -p

    C. vol status -r

    D. storage show disk -p

    Correct Answer: DSection: (none)Explanation

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    49/56

    Explanation/Reference:

    QUESTION 151:

    When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster

    site node. (Choose two.)

    A. Use manual fencing.

    B. Use the cf giveback -f command.

    C. Use the cf forcetakeover -d command.

    D. Turn off power to the disaster site node.

    E. Isolate the failed node from the surviving node.

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

    QUESTION 152:In a fabric-attached MetroCluster, a "site failure" is described as a __________.

    A. failure of the Inter-Switch-Links (ISL)

    B. failure of the interconnect cable

    C. complete failure of the primary controller and disk shelves

    D. malfunction of the Fibre Channel adapter on the cluster node

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 153:

    Which two statements are true of the cf forcetakeover -d command? (Choose two.)

    A. Mirrored volumes are implicitly split.

    B. Partner mailboxes must be available.

    C. The failed cluster node is powered off automatically.

    D. The surviving cluster node takes over the functions of the failed partner.

    Correct Answer:ADSection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    50/56

    QUESTION 154:

    Protection Manager is an optional component of the Operations Manager that can be licensed and accessedfrom the NetApp Management Console (NMC).

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 155:

    Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp Host Agentinstalled.

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 156:

    Which are three valid data protection solutions? (Choose three.)

    A. SnapVault toVolume SnapMirror

    B. SnapVault toVolume SnapMirror to SnapVault

    C. SnapVault toVolume SnapMirror toVolume SnapMirror

    D. Volume SnapMirror to SnapVault

    Correct Answer:ACDSection: (none)Explanation

    Explanation/Reference:

    QUESTION 157:

    Protection Manager has policies that allow for tape-based protection as well as disk-based protection.

    A. True

    B. False

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    51/56

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 158:

    When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server,which three are valid objects to include in the data set? (Choose three.)

    A. A file

    B. A qtree

    C. A directory

    D. Theentire client

    Correct Answer:ACDSection: (none)

    Explanation

    Explanation/Reference:

    QUESTION 159:

    XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.

    A. True

    B. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 160:

    When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates aredesignated as ________.

    A. 16-bit

    B. 32-bit

    C. 64-bit

    D. Foreign

    E. Unknown

    Correct Answer: BSection: (none)Explanation

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    52/56

    Explanation/Reference:

    QUESTION 161:

    To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create command must beincluded?

    A. b 64

    B. B 64

    C. l 64

    D. L 64

    E. No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 162:

    After upgrading to DOT 8.0 7-mode, you can convert existing 32-bit aggregates into 64-bit aggregates.

    A. True

    B. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 163:

    With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____.

    A. 500

    B. 1000

    C. 6400

    D. 64000

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 164:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    53/56

    The largest volume that can be created on a 64-bit aggregate is ___.

    A. 10 TB

    B. 16 TB

    C. 64 TB

    D. Equal to size of the aggregate

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 165:

    Which command will show the FCP target(s) on a storage system?

    A. fcp show adapterB. fcp show all

    C. fcp show -t

    D. fcp status

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

    QUESTION 166

    :

    You are having problems accessing three recently-created LUNs. Given the output below, the reason isbecause all of the LUNs are using the same LUN ID of 0.lun show -mLUN pathMapped to LUNID--------------------------------------------------- /vol/vol1/lun0 solaris-igroup0 0/vol/vol1/lun1 windows-igroup 0/vol/vol1/qtree1/lun2 aix-igroup 0/vol/vol1/qtree1/lun3 linux-igroup 0

    A. True

    B. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 167:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    54/56

    Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would yourdetermination be?lun show -mLUN pathMapped to LUN ID---------------------------------------------------

    /vol/vol1/lun0 solaris-igroup0 0/vol/vol1/lun1 solaris-igroup1 0/vol/vol1/qtree1/lun2 solaris-igroup2 0

    /vol/vol1/qtree1/lun3 solaris-igroup3 0

    A. These are type "Solaris" LUNs.

    B. Not enough information is given here. Run the lun map command to get the information requested.

    C. Not enough information is given here. Run the lun show -v command to get the information requested.

    D. Not enough information is given here. Run the lun status command to get the information requested.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

    QUESTION 168:

    Which two commands would help you troubleshoot a LUN that cannot be accessed by a host? (Choose two.)

    A. fcp show wwpn

    B. fcp wwpn

    C. igroup show

    D. lun show -err

    E. lun show -v

    Correct Answer: CESection: (none)Explanation

    Explanation/Reference:

    QUESTION 169:

    NetApp recommends that Fibre Channel switches that have both disk and tape connected to them should haveseparate zones created for each.

    A. TrueB. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference:

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    55/56

    QUESTION 170:

    Which command shares out the directory /vol/vol2/home using the share name "netapp"?

    A. cifs shares -add /vol/vol2 netapp

    B. cifs shares -add /vol/vol2/home/netapp

    C. cifs shares -add netapp vol/vol2D. cifs shares -add netapp /vol/vol2/home

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:

    QUESTION 171:

    The quota resize command only affects existing /etc/quotas file target entries, not new quota entries.

    A. True

    B. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:

    QUESTION 172

    :

    In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)

    A. file quotas

    B. group quotas

    C. root quotas

    D. tree quotas

    E. user quotas

    Correct Answer: BESection: (none)Explanation

    Explanation/Reference:

    QUESTION 173:

    In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and group quotas,but not from tree quotas.

  • 7/24/2019 NS0155 NetworkAppliance PracticeTest --PDF

    56/56

    A. True

    B. False

    Correct Answer:ASection: (none)Explanation

    Explanation/Reference: