Network Appliance NS0-155

Description

Network Appliance NS0-155
Orlando Iza Muis
Quiz by Orlando Iza Muis, updated more than 1 year ago
Orlando Iza Muis
Created by Orlando Iza Muis over 8 years ago
48
0

Resource summary

Question 1

Question
Which command or procedure would you use to undo a volume SnapRestore operation?
Answer
  • A. snap restore -r vol
  • B. snap revert -s vol
  • C. snap restore undo vol
  • D. You cannot undo a SnapRestore operation at the volume level.

Question 2

Question
What happens after you use SnapRestore to revert a volume to a specific snapshot?
Answer
  • A. You must bring the volume back online.
  • B. The storage system automatically performs a snapshot for that volume.
  • C. The Snapshot copies that are older than the snapshot you used are deleted.
  • D. The Snapshot copies that are more recent than the snapshot you used are deleted.

Question 3

Question
Which three statements are true when using SnapRestore? (Choose three.)
Answer
  • A. The volume must be online.
  • B. SnapRestore must be licensed before you can use it.
  • C. The snap restore enable on option must be enabled.
  • D. The volume to be reverted must not be a SnapMirror destination mirror.

Question 4

Question
Which objects can be restored by a single SnapRestore command? (Choose three)
Answer
  • A. file
  • B. LUN
  • C. qtree
  • D. volume
  • E. directory

Question 5

Question
Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?
Answer
  • A. snap restore -c
  • B. snap restore -d
  • C. snap restore -r
  • D. snap restore s

Question 6

Question
A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago. Which command continues the relationship?
Answer
  • A. SnapMirror initialize
  • B. SnapMirror quiesce
  • C. SnapMirror resume
  • D. SnapMirror resync
  • SnapMirror

Question 7

Question
When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)
Answer
  • A. The source volume must be offline.
  • B. SnapMirror must be licensed for each storage system.
  • C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror
  • D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source destination volume.

Question 8

Question
Which command would you use to verify that the iSCSI service is running?
Answer
  • A. iscsi protocol
  • B. iscsi service
  • C. iscsi show
  • D. iscsi status

Question 9

Question
Identify the two commands that could be entered on the SnapMirror destination storage system. (Choose two.)
Answer
  • A. snapmirror resync
  • B. snapmirror release
  • C. snapmirror initialize
  • D. options snapmirror.access on

Question 10

Question
You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?
Answer
  • A. snapmirror restart
  • B. snapmirror resume
  • C. snapmirror resync
  • D. snapmirror update

Question 11

Question
In a volume SnapMirror relationship, the source and destination volumes must be the same size.
Answer
  • True
  • False

Question 12

Question
Which two statements apply to the fs_size_fixed volume option? (Choose two.)
Answer
  • A. The default setting is on.
  • B. This option is automatically set to be on when a volume becomes a SnapMirrored volume.
  • C. This option turns to off after the snapmirror break command is issued for the relationship.
  • D. This option causes the SnapMirror destination volume to remain the same size and not grow or shrink when a SnapMirrored volume relationship is broken

Question 13

Question
Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)
Answer
  • A. The default interval value is five minutes.
  • B. The smallest interval value supported is 30 seconds.
  • C. This variable controls the view of the data on the destination system.
  • D. By setting a value, you specify the amount of time before an automatic snapshot is created on the source volume that is synchronously mirrored

Question 14

Question
SnapMirror will automatically try to restart a transfer after ___________.
Answer
  • A. an initial transfer is interrupted
  • B. a manual update is interrupted
  • C. a transfer interrupted by reboot
  • D. a scheduled incremental update is interrupted

Question 15

Question
Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a synchronous SnapMirror relationship?
Answer
  • A. sync
  • B. cksum
  • C. src_con
  • D. outstanding

Question 16

Question
Which option will allow a storage system to SnapMirror from this source system?
Answer
  • A. snapmirror.access
  • B. snapmirror.destination
  • C. options snapmirror.allow host =
  • D. options snapmirror.access host =

Question 17

Question
Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?
Answer
  • A. Running snapmirror update on the source storage system
  • B. Running snapmirror release on the source storage system
  • C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
  • D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system

Question 18

Question
Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)
Answer
  • A. throttle
  • B. visibility interval
  • C. outstanding=3s in DOT 7.2
  • D. using option semi-sync in DOT 7.3 and higher

Question 19

Question
A NearStore license increases the amount of concurrent replication streams.
Answer
  • True
  • False

Question 20

Question
Which is true of the SnapVault backup of a NetApp storage system?
Answer
  • A. The file is the basic unit for SnapVault backup destination.
  • B. The qtree is the basic unit for SnapVault backup destination.
  • C. The volume is the basic unit of SnapVault backup destination.
  • D. The directory is the basic unit for SnapVault backup destination.

Question 21

Question
Which system is recommended as a secondary system for SnapVault?
Answer
  • A. IS1200
  • B. DataFort
  • C. NearStore VTL
  • D. FAS with NearStore license

Question 22

Question
Which statement applies to the Open Systems SnapVault Free Space Estimator utility?
Answer
  • A. This utility runs automatically after each transfer.
  • B. This utility must be enabled on the secondary storage system.
  • C. This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer
  • D. This utility determines if there is sufficient disk space available on the secondary to perform an OSSV transfer

Question 23

Question
The snapvault snap sched -x command is used to ____________.
Answer
  • A. schedule full backups
  • B. cancel scheduled backups
  • C. schedule baseline transfer
  • D. schedule incremental backups

Question 24

Question
The snapvault snap create volume snapname command can be executed on the ___________.
Answer
  • A. open systems
  • B. primary system only
  • C. secondary system only
  • D. secondary or primary systems

Question 25

Question
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system
Answer
  • True
  • False

Question 26

Question
Which three statements apply to NearStore Personality license? (Choose three.)
Answer
  • A. It increases the storage capacity.
  • B. It converts the destination storage system to a NearStore system.
  • C. It requires the nearstore_option license on the destination storage system.
  • D. It provides increased concurrent streams when the storage systems are used as destinations for SnapMirror and SnapVault transfers

Question 27

Question
Which Data ONTAP option sets system-wide throttling for all transfers?
Answer
  • A. options transfer.wide.enable
  • B. options transfer.throttle.enable
  • C. options replication.wide.enable
  • D. options replication.throttle.enable

Question 28

Question
The qtree specified for ____ must not exist on the secondary system before you run the ____ command.
Answer
  • A. pri_qtree_path, snapvault start
  • B. sec_qtree_path, snapvault start
  • C. pri_qtree_path, snapvault initialize
  • D. sec_qtree_path, snapvault initialize

Question 29

Question
The snapvault restore command is run on the _________.
Answer
  • A. secondary system to push data to the primary system
  • B. primary system to pull data from the secondary system
  • C. secondary system to pull data from the primary system
  • D. secondary system to push data to the primary storage system

Question 30

Question
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ______________. (Choose two.)
Answer
  • A. restore to a non existing qtree with DOT 7. 2
  • B. add the new qtree to the primary storage system with DOT 7.2
  • C. overwrite the existing qtree on the primary storage system with DOT 7.3
  • D. delete the existing qtree from the secondary storage system with DOT 7.3

Question 31

Question
The snapvault update command is only available on the secondary system.
Answer
  • True
  • False

Question 32

Question
The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications
Answer
  • True
  • False

Question 33

Question
What security mechanism can an administrator use on an OSSV client to set permissions allowing backups to a SnapVault secondary system?
Answer
  • A. Via /etc/hosts.equiv file
  • B. QSM access list modifiable via svconfigurator
  • C. Contents inside a file called access and located in OSSV /snapvault/etc
  • D. MD5 based authentication between SnapVault primary and secondary, with changeable password

Question 34

Question
Which tool is available on an OSSV client to assist in starting or stopping the OSSV service, modifying NDMP settings, enabling debugging, and capturing trace files?
Answer
  • A. Operations Manager
  • B. Protection Manager
  • C. Svconfigurator GUI
  • D. svdebug.exe

Question 35

Question
Which three statements are true about SnapLock volumes? (Choose three.)
Answer
  • A. SnapMirror supports SnapLock volumes.
  • B. There are two types of SnapLock volumes.
  • C. SnapLock volumes support per-file retention periods.
  • D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the VSeries controller with NetApp Storage

Question 36

Question
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule
Answer
  • True
  • False

Question 37

Question
A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination volume has unexpired WORM files
Answer
  • True
  • False

Question 38

Question
What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
Answer
  • A. 1
  • B. 2
  • C. 4
  • D. 6

Question 39

Question
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
Answer
  • A. disk own -s
  • B. disk show -v
  • C. vol status -r
  • D. disk display r

Question 40

Question
To remove a cluster setup, you must perform these steps: 1. Type cf disable. 2. Unlicense cluster. 3. Remove partner entries for network interfaces from the /etc/rc file. 4. Halt and make sure the partner-sysid is blank. 5. Power down and remove the cluster interconnect card. 6. Perform steps 1-5 above on the partner node
Answer
  • True
  • False

Question 41

Question
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file on the NFS mount point for the inaccessible system, but you get the following error: NFS server filer2 not responding still trying. When not in takeover mode, both storage systems operate normally and you do not get the error. You perform a "cf giveback" and you can now create a file over NFS on both systems. What should you do first to resolve this issue?
Answer
  • A. Replace the NIC adapter.
  • B. Submit a new bug report.
  • C. Use the cluster-config-checker.cgi to identify the problem and corrective action.
  • D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation

Question 42

Question
Each storage system in a cluster must have network access to the __________.
Answer
  • A. Internet
  • B. cluster partner
  • C. same administration
  • D. host same collection of subnets

Question 43

Question
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make this configuration persistent across reboots, you must enter this information in the _____ file for each system
Answer
  • A. /etc/rc
  • B. /etc/hosts
  • C. /vol/vol0/home
  • D. /vol/vol0/mount

Question 44

Question
What is the maximum distance between a standard clustered pair at 2Gbps?
Answer
  • A. 10 meters
  • B. 50 meters
  • C. 100 meters
  • D. 500 meters

Question 45

Question
In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity of the ________.
Answer
  • A. local interfaces only
  • B. failed partner interfaces only
  • C. local and failed partner interfaces
  • D. interfaces as defined in the /etc/rc file

Question 46

Question
When using SnapRestore to restore a single LUN, the LUN must be ___________
Answer
  • A. exported and accessible
  • B. mapped to a Windows server
  • C. mounted on a host
  • D. taken offline or unmapped

Question 47

Question
For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex should be identical with regard to ____________
Answer
  • A. NVRAM
  • B. Mirrored Snapshot copies
  • C. RAID groups and disk sizes
  • D. NDMP and Snapshot copies

Question 48

Question
What happens when two aggregates are rejoined?
Answer
  • A. It is not possible to rejoin aggregates.
  • B. Data ONTAP will always retain data from the newest aggregate.
  • C. Both aggregates revert to the last common snapshot before the split.
  • D. You will have a large new aggregate containing all volumes from both aggregates.
  • E. One of the aggregates will be overwritten and you will lose any data changed on it after the split

Question 49

Question
You cannot remove the SyncMirror license if one or more mirrored volumes exist.
Answer
  • True
  • False

Question 50

Question
A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plex was built. Data ONTAP will __________
Answer
  • A. halt all operations to volumes in that pool
  • B. choose spare disks to reconstruct from the opposite pool
  • C. warn you that there are no available spares from the proper pool
  • D. "halt" after 24 hours if spare disks are not added to the proper pool

Question 51

Question
The required hardware to add SyncMirror to an existing system would be ____________.
Answer
  • A. disk shelves and cluster interconnect
  • B. disk shelves and termination switches
  • C. disk shelves, Ethernet adapters, and cabling
  • D. disk shelves, Fibre Channel adapters, and cabling

Question 52

Question
Which two are true when creating a SyncMirror volume? (Choose two.)
Answer
  • A. The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.
  • B. The disks selected for Plex 0 and Plex 1 must come from the same disk pools.
  • C. The number of disks added must be an even number and equally divided between the two plexes
  • D. The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger capacity disk and right-sizes it

Question 53

Question
After issuing the aggr split aggr0/plex0 aggrNew command ____________.
Answer
  • A. there is a new plex called aggrNew
  • B. there are two new plexes, plex0 and plexNew
  • C. there is a new mirrored aggregate called aggrNew
  • D. there are two unmirrored aggregates, aggr0 and aggrNew
  • E. flexible volumes are evenly split between aggr0 and aggrNew

Question 54

Question
Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and _______
Answer
  • A. offline, quiesced
  • B. online, consistent
  • C. online, normal
  • D. restricted, offline

Question 55

Question
You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is ________
Answer
  • A. in a giveback mode
  • B. fenced off manually
  • C. powered on and accessible
  • D. powered off and inaccessible

Question 56

Question
You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which command would verify that disks are connected and have dual paths?
Answer
  • A. disk show
  • B. sysconfig -p
  • C. vol status -r
  • D. storage show disk -p

Question 57

Question
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster site node. (Choose two.)
Answer
  • A. Use manual fencing.
  • B. Use the cf giveback -f command.
  • C. Use the cf forcetakeover -d command.
  • D. Turn off power to the disaster site node.
  • E. Isolate the failed node from the surviving node.

Question 58

Question
In a fabric-attached MetroCluster, a "site failure" is described as a __________.
Answer
  • A. failure of the Inter-Switch-Links (ISL)
  • B. failure of the interconnect cable
  • C. complete failure of the primary controller and disk shelves
  • D. malfunction of the Fibre Channel adapter on the cluster node

Question 59

Question
Which two statements are true of the cf forcetakeover -d command? (Choose two.)
Answer
  • A. Mirrored volumes are implicitly split.
  • B. Partner mailboxes must be available.
  • C. The failed cluster node is powered off automatically.
  • D. The surviving cluster node takes over the functions of the failed partner.

Question 60

Question
Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC)
Answer
  • True
  • False

Question 61

Question
Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp Host Agent installed
Answer
  • True
  • False

Question 62

Question
Which are three valid data protection solutions? (Choose three.)
Answer
  • A. SnapVault toVolume SnapMirror
  • B. SnapVault toVolume SnapMirror to SnapVault
  • C. SnapVault toVolume SnapMirror toVolume SnapMirror
  • D. Volume SnapMirror to SnapVault

Question 63

Question
Protection Manager has policies that allow for tape-based protection as well as disk-based protection
Answer
  • True
  • False

Question 64

Question
When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server, which three are valid objects to include in the data set? (Choose three.)
Answer
  • A. A file
  • B. A qtree
  • C. A directory
  • D. The entire client

Question 65

Question
XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.
Answer
  • True
  • False

Question 66

Question
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ________
Answer
  • A. 16-bit
  • B. 32-bit
  • D. Foreign
  • E. Unknown

Question 67

Question
To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create command must be included?
Answer
  • A. b 64
  • B. B 64
  • C. l 64
  • D. L 64
  • E. No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default

Question 68

Question
After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit aggregates
Answer
  • True
  • False

Question 69

Question
With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____
Answer
  • A. 500
  • B. 1000
  • C. 6400
  • D. 64000

Question 70

Question
The largest volume that can be created on a 64-bit aggregate is ___.
Answer
  • A. 10 TB
  • B. 16 TB
  • C. 64 TB
  • D. Equal to size of the aggregate

Question 71

Question
Which command will show the FCP target(s) on a storage system?
Answer
  • A. fcp show adapter
  • B. fcp show all
  • C. fcp show -t
  • D. fcp status

Question 72

Question
You are having problems accessing three recently-created LUNs. Given the output below, the reason is because all of the LUNs are using the same LUN ID of 0. lun show -m LUN pathMapped to LUNID --------------------------------------------------- /vol/vol1/lun0 solaris-igroup0 0 /vol/vol1/lun1 windows-igroup 0 /vol/vol1/qtree1/lun2 aix-igroup 0 /vol/vol1/qtree1/lun3 linux-igroup 0
Answer
  • True
  • False

Question 73

Question
Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would your determination be?
Answer
  • A. These are type "Solaris" LUNs.
  • B. Not enough information is given here. Run the lun map command to get the information requested
  • C. Not enough information is given here. Run the lun show -v command to get the information requested
  • D. Not enough information is given here. Run the lun status command to get the information requested

Question 74

Question
Which two commands would help you troubleshoot a LUN that cannot be accessed by a host? (Choose two.)
Answer
  • A. fcp show wwpn
  • B. fcp wwpn
  • C. igroup show
  • D. lun show -err
  • E. lun show -v

Question 75

Question
NetApp recommends that Fibre Channel switches that have both disk and tape connected to them should have separate zones created for each
Answer
  • True
  • False

Question 76

Question
Which command shares out the directory /vol/vol2/home using the share name "netapp"?
Answer
  • A. cifs shares -add /vol/vol2 netapp
  • B. cifs shares -add /vol/vol2/home/netapp
  • C. cifs shares -add netapp vol/vol2
  • D. cifs shares -add netapp /vol/vol2/home

Question 77

Question
The quota resize command only affects existing /etc/quotas file target entries, not new quota entries
Answer
  • True
  • False

Question 78

Question
In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)
Answer
  • A. file quotas
  • B. group quotas
  • C. root quotas
  • D. tree quotas
  • E. user quotas

Question 79

Question
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and group quotas, but not from tree quotas
Answer
  • True
  • False

Question 80

Question
What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2?
Answer
  • A. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
  • B. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
  • C. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent
  • D. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent

Question 81

Question
Which iSCSI security method encrypts data between the initiator and the target?
Answer
  • A. IPSec
  • B. CHAP
  • C. LUN masking
  • D. Header and Data Digests

Question 82

Question
You receive an error message from an iSCSI host stating that there is an authentication error. Which command would troubleshoot the failure
Answer
  • A. iscsi security show
  • B. iscsi security generate
  • C. iscsi show authentication
  • D. iscsi security authentication

Question 83

Question
Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a NFS mount request on a Solaris system? (Choose three)
Answer
  • A. check the client's fstab
  • B. check the /etc/sd.conf file on the client
  • C. check show mount -e to the storage system from the client
  • D. check for connectivity to the storage system from the client
  • E. check the output of the exportfs command on the storage system

Question 84

Question
Which three configurations would increase data transfer rates in a volume SnapMirror environment for traditional volumes?
Answer
  • A. The destination volumes are flexible volumes.
  • B. The destination and source contain disks of the same size.
  • C. The destination and the source contain RAID groups of the same size.
  • D. The destination and source contain the same number of raid groups.
  • E. The destination and source storage systems are no father than 30 meters apart.

Question 85

Question
Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two)
Answer
  • A. snapmirror update
  • B. snapmirror status
  • C. snapmirror initialize
  • D. options snapmirror.access all

Question 86

Question
Which OSSV tool would you use to perform an OSSV unattended installation?
Answer
  • A. msipackage
  • B. svunattendossv
  • C. svconfigpackager
  • D. unattendpackager

Question 87

Question
Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?
Answer
  • A. aggr create aggrX -d 12
  • B. aggr create aggrX -m 12
  • C. aggr mirror aggrX -m 12
  • D. aggr mirror aggrX -n 12

Question 88

Question
Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drive?
Answer
  • A. aggr mirror aggrY
  • B. aggr mirror aggrY -m
  • C. aggr mirror aggrT -d 12@144
  • D. aggr mirror aggrY -m 12@144

Question 89

Question
When troubleshooting a double disk failure with SyncMirror, you decide to remove and destroy a plex from a mirrored aggregate. What steps remove a plex from a mirrored aggregate?
Answer
  • A. Take the aggregate offline and use the aggr destroy command
  • B. Take the aggregate offline and use the destroy -f command
  • C. Ensure the plex is online and use the aggr destroy plexname command.
  • D. Ensure the plex is offline and use the aggr destroy plexname command.

Question 90

Question
When replicating data between 32-bit and 64-bit aggregates, which two are allowed? (Choose two)
Answer
  • A. NDMPcopy
  • B. QSM
  • C. vol copy
  • D. VSM

Question 91

Question
What types of migration are supported from 32-bit to 64-bit?
Answer
  • A. migration of qtrees via QSM
  • B. migration of volumes via ndmpcopy
  • C. migration of volumes via SnapMirror
  • D. Both A & B
  • E. Both B & C
  • F. Both A & C

Question 92

Question
How do you migrate LUNs under volumes from 32-bit to 64-bit?
Answer
  • A. lrep
  • B. ndmpcopy
  • C. rsync
  • D. snapvault

Question 93

Question
Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?
Answer
  • A. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup directory
  • B. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process continues uninterrupted
  • C. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source, destination, or both systems
  • D. The fingerprint database and the change logs that the deduplication process uses are located outside the volume, in the aggregate
  • E. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just like the deduplication schedule for any volume

Question 94

Question
To manage SnapVault relationships with an NDMP management application, you must specify a:
Answer
  • A. directory path
  • B. volume and qtree
  • C. SnapVault license
  • D. username and password

Question 95

Question
For OSSV sources, the qtree is the basic unit of SnapVault backups.
Answer
  • True
  • False
Show full summary Hide full summary

Similar

Geography Coasts Questions
becky_e
The Cold War: An Overview_2
Andrea Leyden
History- Medicine through time key figures
gemma.bell
Chemistry 2
Peter Hoskins
The Berlin Crisis
Alina A
B7 Quiz - The Skeleton, Movement and Exercise
Leah Firmstone
GCSE - Introduction to Economics
James Dodd
The GoConqr Guide to End of Term Exams
Sarah Egan
1PR101 2.test - Část 3.
Nikola Truong
1PR101 2.test - Část 11.
Nikola Truong
Core 1.4 Developments in Modern and Smart Materials
T Andrews