Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Netapp NS0-155 Data ONTAP 7-Mode Administrator Exam Practice Test

Demo: 28 questions
Total 173 questions

Data ONTAP 7-Mode Administrator Questions and Answers

Question 1

Which three items are NFS resources for export? (Choose three.)

Options:

A.

aggregate

B.

directory/qtree

C.

file

D.

subnet

E.

volume

Question 2

To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utility. (Choose two.)

Options:

A.

AutoSupport

B.

Bugs Online

C.

NetApp Diagnostics

D.

Release Comparison

E.

System Configuration Guide

Question 3

The root admin on the UNIX box receives an “Access Denied” message when he attempts to access a newly mounted qtree. What’s the most likely cause of this error?

Options:

A.

The qtree is missing from the /etc/hosts file.

B.

NFS is turned off on the storage system.

C.

The qtree is set to ntfs security style.

D.

The qtree has not been exported.

Question 4

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default, and then forcibly take over Node 1 if the error condition persists?

Options:

A.

Auto enable of giveback

B.

Negotiated Fail Over

C.

Takeover on panic

D.

Cf.quickloop.enable

Question 5

Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the next SnapMirror update.

Options:

A.

True

B.

False

Question 6

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 resynchronization state when it failed?

Options:

A.

Determine which volumes are at the remote and disaster sites.

B.

Re-create the synchronous mirror.

C.

Rejoin the two volumes.

D.

Turn on power to the cluster node at the disaster site.

Question 7

Which two statements apply to an entry in the /etc/exports file regarding exporting directories/qtrees and volumes? (Choose two.)

Options:

A.

Each volume must be exported separately.

B.

Exports are accessible only to hosts with names.

C.

User names used in an export must be resolvable.

D.

Exports can access multiple paths on the same volume.

Question 8

How does the NetApp Remote Agent (RSA) connect to NetApp Support?

Options:

A.

NetApp Support initiates a non-secure connection to the RSA.

B.

NetApp Support initiates a secure connection to the RSA.

C.

The RSA initiates a secure connection to NetApp Support.

D.

The RSA initiates a non-secure connection to NetApp support.

Question 9

If the security style is set to UNIX, CIFS client file access is determined by ___________.

Options:

A.

NT ACLs

B.

the last client to set permissions

C.

the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions

D.

This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

Question 10

Which command on the storage system allows you to display statistics on the performance of system resource such as CPU, NVRAM, network interfaces, and disks?

Options:

A.

netstat

B.

netdiag

C.

pktt

D.

sysstat

Question 11

An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________.

Options:

A.

session, session, connections

B.

connection, session, connections

C.

connection, connection, sessions

D.

session, connection, sessions

Question 12

When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster site node. (Choose two)

Options:

A.

Use manual fencing

B.

Use the cf giveback –f command.

C.

Use the cf forcetakeover –d command.

D.

Turn off power to the disaster site node.

E.

Isolate the failed node from the surviving node.

Question 13

Which mechanism allows you to make LUNs available to some initiators and unavailable to others?

Options:

A.

LUN masking

B.

LUN grouping

C.

LUN cloning

D.

LUN hiding

Question 14

Using the output below, a co-worker determined that these are types “Solaris” LUNs. What would your destination be?

lun show – m LUN patch mapped to LUN ID -------------------------------------------------------

/vol/vol1/lun0 solaris – igroup0 0 /vol/vol1/lun solaris- igroup1

0 /vol/vol1/qtree1/lun2 solaris – igroup2 0 /vol/vol1/qtree1/lun3 solaris – igroup3 0

Options:

A.

These are type “Solaris” LUNs.

B.

Not enough information is given here. Run the lun status command to get the information requested.

C.

Not enough information is given here. Run the lun show –v command to get the information requested.

D.

Not enough information is given here. Run the lun map command to get the information requested.

Question 15

The quota resize command only affects existing /etc/quotas file target entries, not new quota entries.

Options:

A.

True

B.

False

Question 16

Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)

Options:

A.

throttle

B.

visibility interval

C.

outstanding=3s in DOT 7.2

D.

using option semi-sync in DOT 7.3 and higher

Question 17

The snapvault restore command is run on the _________.

Options:

A.

secondary system to push data to the primary system

B.

primary system to pull data from the secondary system

C.

secondary system to pull data from the primary system

D.

secondary system to push data to the primary storage system

Question 18

What happens when two aggregates are rejoined?

Options:

A.

It is not possible to rejoin aggregates.

B.

Data ONTAP will always retain data from the newest aggregate.

C.

Both aggregates revert to the last common snapshot before the split.

D.

You will have a large new aggregate containing all volumes from both aggregates.

E.

One of the aggregates will be overwritten and you will lose any data changed on it after the split.

Question 19

You receive an error message from an iSCSI host stating that there is an authentication error. Which command would troubleshoot the failure?

Options:

A.

iscsi security show

B.

iscsi security generate

C.

iscsi show authentication

D.

iscsi security authentication

Question 20

Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)

Options:

A.

The default interval value is five minutes.

B.

The smallest interval value supported is 30 seconds.

C.

This variable controls the view of the data on the destination system.

D.

By setting a value, you specify the amount of time before an automatic snapshot is created on the source volume that is synchronously mirrored.

Question 21

To remove a cluster setup, you must perform these steps:

1. Type cf disable.

2. Unlicense cluster.

3. Remove partner entries for network interfaces from the /etc/rc file.

4. Halt and make sure the partner-sysid is blank.

5. Power down and remove the cluster interconnect card.

6. Perform steps 1-5 above on the partner node.

Options:

A.

True

B.

False

Question 22

Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?

Options:

A.

The deduplication fingerprint and change logs were moved to the root volume /etc/dedup directory.

B.

After breaking the deduplication volume destination mirror, the deduplication (a-sis) process continues uninterrupted.

C.

Qtree SnapMirror is supported on the destination for deduplication by enabling on the source, destination, or both systems.

D.

The fingerprint database and the change logs that the deduplication process uses are located outside the volume, in the aggregate.

E.

The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just like the deduplication schedule for any volume.

Question 23

Identify the two commands that could be entered on the SnapMirror destination storage system. (Choose two.)

Options:

A.

snapmirror resync

B.

snapmirror release

C.

snapmirror initialize

D.

options snapmirror.access on

Question 24

Which command shares out the directory /vol/vol2/home using the share name "netapp"?

Options:

A.

cifs shares -add /vol/vol2 netapp

B.

cifs shares -add /vol/vol2/home/netapp

C.

cifs shares -add netapp vol/vol2

D.

cifs shares -add netapp /vol/vol2/home

Question 25

Which three statements are true about SnapLock volumes? (Choose three.)

Options:

A.

SnapMirror supports SnapLock volumes.

B.

There are two types of SnapLock volumes.

C.

SnapLock volumes support per-file retention periods.

D.

In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V-Series controller with NetApp Storage.

Question 26

Which iSCSI security method encrypts data between the initiator and the target?

Options:

A.

IPSec

B.

CHAP

C.

LUN masking

D.

Header and Data Digests

Question 27

The snapvault snap sched -x command is used to ____________.

Options:

A.

schedule full backups

B.

cancel scheduled backups

C.

schedule baseline transfer

D.

schedule incremental backups

Question 28

You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?

Options:

A.

snapmirror restart

B.

snapmirror resume

C.

snapmirror resync

D.

snapmirror update

Demo: 28 questions
Total 173 questions