Orlando Iza Muis
Quiz by , created more than 1 year ago

Network Appliance NS0-155

48
0
0
Orlando Iza Muis
Created by Orlando Iza Muis over 8 years ago
Close

Network Appliance NS0-155

Question 1 of 95

1

Which command or procedure would you use to undo a volume SnapRestore operation?

Select one of the following:

  • A. snap restore -r vol

  • B. snap revert -s vol

  • C. snap restore undo vol

  • D. You cannot undo a SnapRestore operation at the volume level.

Explanation

Question 2 of 95

1

What happens after you use SnapRestore to revert a volume to a specific snapshot?

Select one of the following:

  • A. You must bring the volume back online.

  • B. The storage system automatically performs a snapshot for that volume.

  • C. The Snapshot copies that are older than the snapshot you used are deleted.

  • D. The Snapshot copies that are more recent than the snapshot you used are deleted.

Explanation

Question 3 of 95

1

Which three statements are true when using SnapRestore? (Choose three.)

Select one or more of the following:

  • A. The volume must be online.

  • B. SnapRestore must be licensed before you can use it.

  • C. The snap restore enable on option must be enabled.

  • D. The volume to be reverted must not be a SnapMirror destination mirror.

Explanation

Question 4 of 95

1

Which objects can be restored by a single SnapRestore command? (Choose three)

Select one or more of the following:

  • A. file

  • B. LUN

  • C. qtree

  • D. volume

  • E. directory

Explanation

Question 5 of 95

1

Which option of the snap restore command allows you to specify a different directory, as long as
the directory already exists?

Select one of the following:

  • A. snap restore -c

  • B. snap restore -d

  • C. snap restore -r

  • D. snap restore s

Explanation

Question 6 of 95

1

A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two
days ago. Which command continues the relationship?

Select one of the following:

  • A. SnapMirror initialize

  • B. SnapMirror quiesce

  • C. SnapMirror resume

  • D. SnapMirror resync

  • SnapMirror

Explanation

Question 7 of 95

1

When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)

Select one or more of the following:

  • A. The source volume must be offline.

  • B. SnapMirror must be licensed for each storage system.

  • C. If you are replicating a volume, you must create a restricted volume to be used as the
    SnapMirror

  • D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the
    source destination volume.

Explanation

Question 8 of 95

1

Which command would you use to verify that the iSCSI service is running?

Select one of the following:

  • A. iscsi protocol

  • B. iscsi service

  • C. iscsi show

  • D. iscsi status

Explanation

Question 9 of 95

1

Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two.)

Select one or more of the following:

  • A. snapmirror resync

  • B. snapmirror release

  • C. snapmirror initialize

  • D. options snapmirror.access on

Explanation

Question 10 of 95

1

You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled
updates?

Select one of the following:

  • A. snapmirror restart

  • B. snapmirror resume

  • C. snapmirror resync

  • D. snapmirror update

Explanation

Question 11 of 95

1

In a volume SnapMirror relationship, the source and destination volumes must be the same size.

Select one of the following:

  • True
  • False

Explanation

Question 12 of 95

1

Which two statements apply to the fs_size_fixed volume option? (Choose two.)

Select one or more of the following:

  • A. The default setting is on.

  • B. This option is automatically set to be on when a volume becomes a SnapMirrored volume.

  • C. This option turns to off after the snapmirror break command is issued for the relationship.

  • D. This option causes the SnapMirror destination volume to remain the same size and not grow or
    shrink when a SnapMirrored volume relationship is broken

Explanation

Question 13 of 95

1

Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)

Select one or more of the following:

  • A. The default interval value is five minutes.

  • B. The smallest interval value supported is 30 seconds.

  • C. This variable controls the view of the data on the destination system.

  • D. By setting a value, you specify the amount of time before an automatic snapshot is created on
    the source volume that is synchronously mirrored

Explanation

Question 14 of 95

1

SnapMirror will automatically try to restart a transfer after ___________.

Select one of the following:

  • A. an initial transfer is interrupted

  • B. a manual update is interrupted

  • C. a transfer interrupted by reboot

  • D. a scheduled incremental update is interrupted

Explanation

Question 15 of 95

1

Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a
synchronous SnapMirror relationship?

Select one of the following:

  • A. sync

  • B. cksum

  • C. src_con

  • D. outstanding

Explanation

Question 16 of 95

1

Which option will allow a storage system to SnapMirror from this source system?

Select one of the following:

  • A. snapmirror.access

  • B. snapmirror.destination

  • C. options snapmirror.allow host =

  • D. options snapmirror.access host =

Explanation

Question 17 of 95

1

Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?

Select one of the following:

  • A. Running snapmirror update on the source storage system

  • B. Running snapmirror release on the source storage system

  • C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system

  • D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system

Explanation

Question 18 of 95

1

Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose
two.)

Select one or more of the following:

  • A. throttle

  • B. visibility interval

  • C. outstanding=3s in DOT 7.2

  • D. using option semi-sync in DOT 7.3 and higher

Explanation

Question 19 of 95

1

A NearStore license increases the amount of concurrent replication streams.

Select one of the following:

  • True
  • False

Explanation

Question 20 of 95

1

Which is true of the SnapVault backup of a NetApp storage system?

Select one of the following:

  • A. The file is the basic unit for SnapVault backup destination.

  • B. The qtree is the basic unit for SnapVault backup destination.

  • C. The volume is the basic unit of SnapVault backup destination.

  • D. The directory is the basic unit for SnapVault backup destination.

Explanation

Question 21 of 95

1

Which system is recommended as a secondary system for SnapVault?

Select one of the following:

  • A. IS1200

  • B. DataFort

  • C. NearStore VTL

  • D. FAS with NearStore license

Explanation

Question 22 of 95

1

Which statement applies to the Open Systems SnapVault Free Space Estimator utility?

Select one of the following:

  • A. This utility runs automatically after each transfer.

  • B. This utility must be enabled on the secondary storage system.

  • C. This utility determines if there is sufficient disk space available on the primary to perform an
    OSSV transfer

  • D. This utility determines if there is sufficient disk space available on the secondary to perform an
    OSSV transfer

Explanation

Question 23 of 95

1

The snapvault snap sched -x command is used to ____________.

Select one of the following:

  • A. schedule full backups

  • B. cancel scheduled backups

  • C. schedule baseline transfer

  • D. schedule incremental backups

Explanation

Question 24 of 95

1

The snapvault snap create volume snapname command can be executed on the ___________.

Select one of the following:

  • A. open systems

  • B. primary system only

  • C. secondary system only

  • D. secondary or primary systems

Explanation

Question 25 of 95

1

The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies
from your primary system

Select one of the following:

  • True
  • False

Explanation

Question 26 of 95

1

Which three statements apply to NearStore Personality license? (Choose three.)

Select one or more of the following:

  • A. It increases the storage capacity.

  • B. It converts the destination storage system to a NearStore system.

  • C. It requires the nearstore_option license on the destination storage system.

  • D. It provides increased concurrent streams when the storage systems are used as destinations
    for SnapMirror and SnapVault transfers

Explanation

Question 27 of 95

1

Which Data ONTAP option sets system-wide throttling for all transfers?

Select one of the following:

  • A. options transfer.wide.enable

  • B. options transfer.throttle.enable

  • C. options replication.wide.enable

  • D. options replication.throttle.enable

Explanation

Question 28 of 95

1

The qtree specified for ____ must not exist on the secondary system before you run the ____
command.

Select one of the following:

  • A. pri_qtree_path, snapvault start

  • B. sec_qtree_path, snapvault start

  • C. pri_qtree_path, snapvault initialize

  • D. sec_qtree_path, snapvault initialize

Explanation

Question 29 of 95

1

The snapvault restore command is run on the _________.

Select one of the following:

  • A. secondary system to push data to the primary system

  • B. primary system to pull data from the secondary system

  • C. secondary system to pull data from the primary system

  • D. secondary system to push data to the primary storage system

Explanation

Question 30 of 95

1

To restore a qtree protected with SnapVault from the secondary storage system to the primary
storage system, you can ______________. (Choose two.)

Select one or more of the following:

  • A. restore to a non existing qtree with DOT 7. 2

  • B. add the new qtree to the primary storage system with DOT 7.2

  • C. overwrite the existing qtree on the primary storage system with DOT 7.3

  • D. delete the existing qtree from the secondary storage system with DOT 7.3

Explanation

Question 31 of 95

1

The snapvault update command is only available on the secondary system.

Select one of the following:

  • True
  • False

Explanation

Question 32 of 95

1

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault
communications

Select one of the following:

  • True
  • False

Explanation

Question 33 of 95

1

What security mechanism can an administrator use on an OSSV client to set permissions allowing
backups to a SnapVault secondary system?

Select one of the following:

  • A. Via /etc/hosts.equiv file

  • B. QSM access list modifiable via svconfigurator

  • C. Contents inside a file called access and located in OSSV /snapvault/etc

  • D. MD5 based authentication between SnapVault primary and secondary, with changeable
    password

Explanation

Question 34 of 95

1

Which tool is available on an OSSV client to assist in starting or stopping the OSSV service,
modifying NDMP settings, enabling debugging, and capturing trace files?

Select one of the following:

  • A. Operations Manager

  • B. Protection Manager

  • C. Svconfigurator GUI

  • D. svdebug.exe

Explanation

Question 35 of 95

1

Which three statements are true about SnapLock volumes? (Choose three.)

Select one or more of the following:

  • A. SnapMirror supports SnapLock volumes.

  • B. There are two types of SnapLock volumes.

  • C. SnapLock volumes support per-file retention periods.

  • D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the VSeries controller with NetApp Storage

Explanation

Question 36 of 95

1

Snapshot copies for SnapLock volumes are deleted automatically according to the retention count
set in the Snapshot schedule

Select one of the following:

  • True
  • False

Explanation

Question 37 of 95

1

A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the
destination volume has unexpired WORM files

Select one of the following:

  • True
  • False

Explanation

Question 38 of 95

1

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

Select one of the following:

  • A. 1

  • B. 2

  • C. 4

  • D. 6

Explanation

Question 39 of 95

1

Which command displays the disk ownership for both CPU modules in a FAS2020 system?

Select one of the following:

  • A. disk own -s

  • B. disk show -v

  • C. vol status -r

  • D. disk display r

Explanation

Question 40 of 95

1

To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node

Select one of the following:

  • True
  • False

Explanation

Question 41 of 95

1

You are troubleshooting a clustered failover problem at a customer site. The customer explains
that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you
attempt to create a file on the NFS mount point for the inaccessible system, but you get the
following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the error.
You perform a "cf giveback" and you can now create a file over NFS on both systems. What
should you do first to resolve this issue?

Select one of the following:

  • A. Replace the NIC adapter.

  • B. Submit a new bug report.

  • C. Use the cluster-config-checker.cgi to identify the problem and corrective action.

  • D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system
    operation

Explanation

Question 42 of 95

1

Each storage system in a cluster must have network access to the __________.

Select one of the following:

  • A. Internet

  • B. cluster partner

  • C. same administration

  • D. host same collection of subnets

Explanation

Question 43 of 95

1

One method of configuring an interface for takeover is to enter ifconfig interface partner address at
the command line. To make this configuration persistent across reboots, you must enter this
information in the _____ file for each system

Select one of the following:

  • A. /etc/rc

  • B. /etc/hosts

  • C. /vol/vol0/home

  • D. /vol/vol0/mount

Explanation

Question 44 of 95

1

What is the maximum distance between a standard clustered pair at 2Gbps?

Select one of the following:

  • A. 10 meters

  • B. 50 meters

  • C. 100 meters

  • D. 500 meters

Explanation

Question 45 of 95

1

In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the
identity of the ________.

Select one of the following:

  • A. local interfaces only

  • B. failed partner interfaces only

  • C. local and failed partner interfaces

  • D. interfaces as defined in the /etc/rc file

Explanation

Question 46 of 95

1

When using SnapRestore to restore a single LUN, the LUN must be ___________

Select one of the following:

  • A. exported and accessible

  • B. mapped to a Windows server

  • C. mounted on a host

  • D. taken offline or unmapped

Explanation

Question 47 of 95

1

For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex
should be identical with regard to ____________

Select one of the following:

  • A. NVRAM

  • B. Mirrored Snapshot copies

  • C. RAID groups and disk sizes

  • D. NDMP and Snapshot copies

Explanation

Question 48 of 95

1

What happens when two aggregates are rejoined?

Select one of the following:

  • A. It is not possible to rejoin aggregates.

  • B. Data ONTAP will always retain data from the newest aggregate.

  • C. Both aggregates revert to the last common snapshot before the split.

  • D. You will have a large new aggregate containing all volumes from both aggregates.

  • E. One of the aggregates will be overwritten and you will lose any data changed on it after the
    split

Explanation

Question 49 of 95

1

You cannot remove the SyncMirror license if one or more mirrored volumes exist.

Select one of the following:

  • True
  • False

Explanation

Question 50 of 95

1

A mirrored volume has a failed disk, but there are no available spares in the pool from which the
degraded plex was built. Data ONTAP will __________

Select one of the following:

  • A. halt all operations to volumes in that pool

  • B. choose spare disks to reconstruct from the opposite pool

  • C. warn you that there are no available spares from the proper pool

  • D. "halt" after 24 hours if spare disks are not added to the proper pool

Explanation

Question 51 of 95

1

The required hardware to add SyncMirror to an existing system would be ____________.

Select one of the following:

  • A. disk shelves and cluster interconnect

  • B. disk shelves and termination switches

  • C. disk shelves, Ethernet adapters, and cabling

  • D. disk shelves, Fibre Channel adapters, and cabling

Explanation

Question 52 of 95

1

Which two are true when creating a SyncMirror volume? (Choose two.)

Select one or more of the following:

  • A. The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.

  • B. The disks selected for Plex 0 and Plex 1 must come from the same disk pools.

  • C. The number of disks added must be an even number and equally divided between the two
    plexes

  • D. The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the
    basis of the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger
    capacity disk and right-sizes it

Explanation

Question 53 of 95

1

After issuing the aggr split aggr0/plex0 aggrNew command ____________.

Select one of the following:

  • A. there is a new plex called aggrNew

  • B. there are two new plexes, plex0 and plexNew

  • C. there is a new mirrored aggregate called aggrNew

  • D. there are two unmirrored aggregates, aggr0 and aggrNew

  • E. flexible volumes are evenly split between aggr0 and aggrNew

Explanation

Question 54 of 95

1

Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and
_______

Select one of the following:

  • A. offline, quiesced

  • B. online, consistent

  • C. online, normal

  • D. restricted, offline

Explanation

Question 55 of 95

1

You can avoid data corruption when you issue the cf forcetakeover -d command if the remote
node is ________

Select one of the following:

  • A. in a giveback mode

  • B. fenced off manually

  • C. powered on and accessible

  • D. powered off and inaccessible

Explanation

Question 56 of 95

1

You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which
command would verify that disks are connected and have dual paths?

Select one of the following:

  • A. disk show

  • B. sysconfig -p

  • C. vol status -r

  • D. storage show disk -p

Explanation

Question 57 of 95

1

When using MetroCluster in a forced takeover mode, identify two methods for restricting access to
the disaster site node. (Choose two.)

Select one or more of the following:

  • A. Use manual fencing.

  • B. Use the cf giveback -f command.

  • C. Use the cf forcetakeover -d command.

  • D. Turn off power to the disaster site node.

  • E. Isolate the failed node from the surviving node.

Explanation

Question 58 of 95

1

In a fabric-attached MetroCluster, a "site failure" is described as a __________.

Select one of the following:

  • A. failure of the Inter-Switch-Links (ISL)

  • B. failure of the interconnect cable

  • C. complete failure of the primary controller and disk shelves

  • D. malfunction of the Fibre Channel adapter on the cluster node

Explanation

Question 59 of 95

1

Which two statements are true of the cf forcetakeover -d command? (Choose two.)

Select one or more of the following:

  • A. Mirrored volumes are implicitly split.

  • B. Partner mailboxes must be available.

  • C. The failed cluster node is powered off automatically.

  • D. The surviving cluster node takes over the functions of the failed partner.

Explanation

Question 60 of 95

1

Protection Manager is an optional component of the Operations Manager that can be licensed and
accessed from the NetApp Management Console (NMC)

Select one of the following:

  • True
  • False

Explanation

Question 61 of 95

1

Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp
Host Agent installed

Select one of the following:

  • True
  • False

Explanation

Question 62 of 95

1

Which are three valid data protection solutions? (Choose three.)

Select one or more of the following:

  • A. SnapVault toVolume SnapMirror

  • B. SnapVault toVolume SnapMirror to SnapVault

  • C. SnapVault toVolume SnapMirror toVolume SnapMirror

  • D. Volume SnapMirror to SnapVault

Explanation

Question 63 of 95

1

Protection Manager has policies that allow for tape-based protection as well as disk-based
protection

Select one of the following:

  • True
  • False

Explanation

Question 64 of 95

1

When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX
server, which three are valid objects to include in the data set? (Choose three.)

Select one or more of the following:

  • A. A file

  • B. A qtree

  • C. A directory

  • D. The entire client

Explanation

Question 65 of 95

1

XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.

Select one of the following:

  • True
  • False

Explanation

Question 66 of 95

1

When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional
aggregates are designated as ________

Select one of the following:

  • A. 16-bit

  • B. 32-bit

  • D. Foreign

  • E. Unknown

Explanation

Question 67 of 95

1

To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create
command must be included?

Select one of the following:

  • A. b 64

  • B. B 64

  • C. l 64

  • D. L 64

  • E. No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default

Explanation

Question 68 of 95

1

After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit
aggregates

Select one of the following:

  • True
  • False

Explanation

Question 69 of 95

1

With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is
____

Select one of the following:

  • A. 500

  • B. 1000

  • C. 6400

  • D. 64000

Explanation

Question 70 of 95

1

The largest volume that can be created on a 64-bit aggregate is ___.

Select one of the following:

  • A. 10 TB

  • B. 16 TB

  • C. 64 TB

  • D. Equal to size of the aggregate

Explanation

Question 71 of 95

1

Which command will show the FCP target(s) on a storage system?

Select one of the following:

  • A. fcp show adapter

  • B. fcp show all

  • C. fcp show -t

  • D. fcp status

Explanation

Question 72 of 95

1

You are having problems accessing three recently-created LUNs. Given the output below, the
reason is because all of the LUNs are using the same LUN ID of 0.
lun show -m
LUN pathMapped to LUNID
---------------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0

Select one of the following:

  • True
  • False

Explanation

Question 73 of 95

1

Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would
your determination be?

Select one of the following:

  • A. These are type "Solaris" LUNs.

  • B. Not enough information is given here. Run the lun map command to get the information
    requested

  • C. Not enough information is given here. Run the lun show -v command to get the information
    requested

  • D. Not enough information is given here. Run the lun status command to get the information
    requested

Explanation

Question 74 of 95

1

Which two commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose two.)

Select one or more of the following:

  • A. fcp show wwpn

  • B. fcp wwpn

  • C. igroup show

  • D. lun show -err

  • E. lun show -v

Explanation

Question 75 of 95

1

NetApp recommends that Fibre Channel switches that have both disk and tape connected to them
should have separate zones created for each

Select one of the following:

  • True
  • False

Explanation

Question 76 of 95

1

Which command shares out the directory /vol/vol2/home using the share name "netapp"?

Select one of the following:

  • A. cifs shares -add /vol/vol2 netapp

  • B. cifs shares -add /vol/vol2/home/netapp

  • C. cifs shares -add netapp vol/vol2

  • D. cifs shares -add netapp /vol/vol2/home

Explanation

Question 77 of 95

1

The quota resize command only affects existing /etc/quotas file target entries, not new quota
entries

Select one of the following:

  • True
  • False

Explanation

Question 78 of 95

1

In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)

Select one or more of the following:

  • A. file quotas

  • B. group quotas

  • C. root quotas

  • D. tree quotas

  • E. user quotas

Explanation

Question 79 of 95

1

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and
group quotas, but not from tree quotas

Select one of the following:

  • True
  • False

Explanation

Question 80 of 95

1

What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume
vol2?

Select one of the following:

  • A. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent

  • B. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent

  • C. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent

  • D. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent

Explanation

Question 81 of 95

1

Which iSCSI security method encrypts data between the initiator and the target?

Select one of the following:

  • A. IPSec

  • B. CHAP

  • C. LUN masking

  • D. Header and Data Digests

Explanation

Question 82 of 95

1

You receive an error message from an iSCSI host stating that there is an authentication error.
Which command would troubleshoot the failure

Select one of the following:

  • A. iscsi security show

  • B. iscsi security generate

  • C. iscsi show authentication

  • D. iscsi security authentication

Explanation

Question 83 of 95

1

Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a
NFS mount request on a Solaris system? (Choose three)

Select one or more of the following:

  • A. check the client's fstab

  • B. check the /etc/sd.conf file on the client

  • C. check show mount -e to the storage system from the client

  • D. check for connectivity to the storage system from the client

  • E. check the output of the exportfs command on the storage system

Explanation

Question 84 of 95

1

Which three configurations would increase data transfer rates in a volume SnapMirror environment
for traditional volumes?

Select one or more of the following:

  • A. The destination volumes are flexible volumes.

  • B. The destination and source contain disks of the same size.

  • C. The destination and the source contain RAID groups of the same size.

  • D. The destination and source contain the same number of raid groups.

  • E. The destination and source storage systems are no father than 30 meters apart.

Explanation

Question 85 of 95

1

Identify the two commands that could be entered on a system with a SnapMirror source. (Choose
two)

Select one or more of the following:

  • A. snapmirror update

  • B. snapmirror status

  • C. snapmirror initialize

  • D. options snapmirror.access all

Explanation

Question 86 of 95

1

Which OSSV tool would you use to perform an OSSV unattended installation?

Select one of the following:

  • A. msipackage

  • B. svunattendossv

  • C. svconfigpackager

  • D. unattendpackager

Explanation

Question 87 of 95

1

Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?

Select one of the following:

  • A. aggr create aggrX -d 12

  • B. aggr create aggrX -m 12

  • C. aggr mirror aggrX -m 12

  • D. aggr mirror aggrX -n 12

Explanation

Question 88 of 95

1

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects
the disk drive?

Select one of the following:

  • A. aggr mirror aggrY

  • B. aggr mirror aggrY -m

  • C. aggr mirror aggrT -d 12@144

  • D. aggr mirror aggrY -m 12@144

Explanation

Question 89 of 95

1

When troubleshooting a double disk failure with SyncMirror, you decide to remove and destroy a
plex from a mirrored aggregate. What steps remove a plex from a mirrored aggregate?

Select one of the following:

  • A. Take the aggregate offline and use the aggr destroy command

  • B. Take the aggregate offline and use the destroy -f command

  • C. Ensure the plex is online and use the aggr destroy plexname command.

  • D. Ensure the plex is offline and use the aggr destroy plexname command.

Explanation

Question 90 of 95

1

When replicating data between 32-bit and 64-bit aggregates, which two are allowed? (Choose
two)

Select one or more of the following:

  • A. NDMPcopy

  • B. QSM

  • C. vol copy

  • D. VSM

Explanation

Question 91 of 95

1

What types of migration are supported from 32-bit to 64-bit?

Select one of the following:

  • A. migration of qtrees via QSM

  • B. migration of volumes via ndmpcopy

  • C. migration of volumes via SnapMirror

  • D. Both A & B

  • E. Both B & C

  • F. Both A & C

Explanation

Question 92 of 95

1

How do you migrate LUNs under volumes from 32-bit to 64-bit?

Select one of the following:

  • A. lrep

  • B. ndmpcopy

  • C. rsync

  • D. snapvault

Explanation

Question 93 of 95

1

Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?

Select one or more of the following:

  • A. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup
    directory

  • B. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process
    continues uninterrupted

  • C. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source,
    destination, or both systems

  • D. The fingerprint database and the change logs that the deduplication process uses are located
    outside the volume, in the aggregate

  • E. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just
    like the deduplication schedule for any volume

Explanation

Question 94 of 95

1

To manage SnapVault relationships with an NDMP management application, you must specify a:

Select one of the following:

  • A. directory path

  • B. volume and qtree

  • C. SnapVault license

  • D. username and password

Explanation

Question 95 of 95

1

For OSSV sources, the qtree is the basic unit of SnapVault backups.

Select one of the following:

  • True
  • False

Explanation