Front | Back |
You create a volume as shown in the exhibit. Which statement about the new volume is true?A. A FlexVol volume is created on the aggregate (sas_01 or sas_02) with the most free space.B. A FlexVol volume is created on aggregate sas_01 can only be moved to aggregate sas_02.C. A FlexGroup volume is created with eight constituents.D. A FlexGroup volume is created with two constituents |
D
|
Which two features are supported by SnapLock Enterprise but not by SnapLock Compliance? (Choose two.)A. FlexArrayB. privileged deleteC. NetApp Volume Encryption (NVE)D. SnapMirror
|
BD
|
What is the minimum number of disks required to create a data aggregate with a RAID type of RAID-TEC?A. 7B. 6C. 5D. 4
|
B
|
Which LIF role type is used by a volume move operation between nodes?A. dataB. clusterC. interclusterD. cluster-mgmt
|
D
|
Which two link layer discovery protocols does NetApp ONTAP support? (Choose two.)A. Link Layer Topology Discovery ProtocolB. Cisco Discovery ProtocolC. Link Layer Discovery ProtocolD. Foundry Discovery Protocol
|
AB
|
You have a 2-node NetApp cluster. You would like to use an onboard UTA2 port for host connectivity. The port was previously connected to a tape library using native FC.What must you do to configure the port for host connectivity?A. Change the port mode to FC.B. Change the port mode to CNA.C. Change the FC type to initiator.D. Change the FC type to target.
|
B
|
You want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage Encryption (NSE).Which action accomplishes this task?A. Perform a takeover-giveback of each node in the cluster to update the passphrase on each mode.B. Use the security key-manager setup command to change the passphrase.C. Use the volume move command to migrate a volume and update the passphrase during the move.D. Use the security key-manager update-passphrase command to change the passphrase.
|
D
|
Referring to the exhibit, which two statements about the connectivity from the 2-node cluster to the cluster interconnects are true? (Choose two.)A. The CN1610 switches were discovered by using Cisco CDP.B. The nodes are cabled correctly.C. The nodes are cabled incorrectly.D. The CN1610 switches were discovered by using LLDP. |
AC
|
You have a 2-node cluster named cl1 that has separate LIFs on each node for both SAN and NAS traffic. A storage failover takeover process is initiated as shown in the exhibit.In this scenario, which two statements about the takeover process are true? (Choose two.)A. The SAN LIFs on cl1-01 go offline.B. The NAS LIFs on cl1-01 automatically migrate to cl1-02.C. The NAS LIFs on cl1-01 go offline.D. The SAN LIFs on cl1-01 automatically migrate to cl1-02. |
BC
|
Referring to the exhibit, which statement about the volume move process is true?A. Client access to the volume is blocked during this phase of operation.B. The initial replication phase sent 39 MB from the source to the destination location.C. Client access is being redirected to the destination location during this phase of the operation.D. The cutover process failed and is in a holding pattern before being attempted again. |
B
|
What are three causes of a storage failover partial giveback? (Choose three.)A. iSCSI sessions are active.B. AutoSupports are being generated.C. NFSv3 mounts are active.D. CIFS sessions are active.E. SnapMirrors are running.
|
BDE
|
The size of the aggr1 RAID group shown in the exhibit is 8.What is the RAID type?A. RAID-TECB. RAID-DPC. RAID4D. RAID0 |
B
|
Which CLI command is used to move epsilon to a new node?A. cluster modifyB. cluster identity modifyC. cluster setupD. storage failover takeover
|
A
|
You just finished upgrading a cluster to ONTAP 9.1 and would like to enable NetApp Volume Encryption (NVE) on an existing volume. You do not have NetApp Storage Encryption (NSE) drives installed.Which three steps would you take to accomplish this task? (Choose three.)A. Replace drives with NSE drives.B. Modify the volume options with the –encrypt true parameter.C. Install the NVE license.D. Execute the key manager setup wizard.E. Perform volume move operation using the –encrypt-destination true parameter.
|
CDE
|
You have a cluster of FAS controllers with HDD aggregates. The data is being compressed into 32 KB blocks before being written to a volume. In this scenario, which type of compression is being used?A. secondary, inline compressionB. adaptive, inline compressionC. adaptive, postprocess compressionD. secondary, postprocess compression
|
A
|