Which two Interfaces can an administrator use to disable unused Ethernet ports on an ONTAP cluster? (Choose two.)
Which two tools should an administrator use to monitor system performance in real time? (Choose two.)
Which three tools present statistics from the Data ONTAP counter manager? (Choose three.)
Which ONTAP feature will allow WORM and non-WORM volumes in the same aggregate?
Which one of the following statements apply to the Free Space Estimator utility?
Which ONTAP policy type defines the kind of traffic that Is supported for a LIF?
What is the minimum number of HA pairs required for Epsilon to be automatically assigned?
The required hardware to add SyncMirror to an existing Clustered Failover system consists of:
What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)
The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.
Which two productscan be used to administer CloudVolumes ONTAP? (Choose two.)
An administrator is troubleshooting connection problems with ONTAP System Manager. The cluster management L1F is on port aOa-33. Web clients on VLAN 33 are able to access System Manager. Web clients on other subnets are unable to reach System Manager.
Which network component should the administrator modify?
In a Fabric Attached Metro Cluster, disk ownership by a node is determined by_____________.
Which Data ONTAP option would you enable to set system wide throttling for all transfers?
Normally, before you split a SyncMirror volume, you ensure that both plexes are
Which one of the following keywords alone can be used to convert an asynchronous mirror to be synchornous?
NetApp X1024 Fibre Channel HBA is required on the storage systems for IP over Fibre Channel functionality.
An administrator wants to provide isolation from connected hosts to the same FCP LUN. Which two features accomplish this request? (Choose two.)
Which tool is available on a non-NetApp primary system to assist in starting or stopping SnapVault, modifying NDMP settings, enabling debugging, and capturing trace files?
An administrator Is troubleshooting failed cluster peering between three ONTAP clusters for cascaded SnapMirror replication. Cluster1 is peered to Cluster, cluster^ is peered to Cluster3.
Clusterl and Cluster3 do not have an available route to reach each other. Cluster2 can route to both Cluster1 and Cluster3 using dedicated and separate intercluster LIFs.
What ONTAP network component must be configured on Cluster2 to resolve this issue?
Which three are required licenses for Fabric Attached MetroCluster? (Choose 3)
Which native ONTAP feature allows an administrator to block a Windows user from writing files with the.crypto extension?
Which NetApp SnapMirror method allows for transparent failover between two AFF clusters with applications using iSCSI LUNs?
When creating an S3 bucket using System Manager, ONTAP uses which default performance service level for an AFF?
Fill in the blank for the following statement: To manage a SnapVault backup through a commercial NDMP application, you must specify a_____authorized through that application.
Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?
In a synchronous SnapMirror configuration, the source storage appliance exhibits high latency due to user traffic and rapid data change from SnapMirror transactions. Which one of the following tuning methods best resolves this performance behavior? Edit the /etc/snapmirror.conf file on the destination storage appliance and set:
Alter a SnapRestore reversion of a volume, incremental backup and restore operations on the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored. Which one of the following is the most likely course of action to take to ensure correct incremental backups?
How can you "throttle" Snap Vault updates and baseline transfers so that the primary or secondary is not transmitting data as fast as it can?
Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drives?
Which two networking components must be configured to failover LIFs across subnets? (Choose two.)
Fill in the blank for the following statement using the best answer from the choices that follow. A snapshot is a frozen, read-only image of the entire Data ONTAP file system that reflects the state of the____________at the time the snapshot was created.
Which two commands could be used if the cf giveback command foils? (Choose 2)
Before enabling an active/active configuration, you should verify and compare the configuration of the nodes. Which tool can perform this task?
Fill in the blank for the following statement: To manage a SnapVault backup through a commercial NDMP application, you must specify a_____authorized through that application.
If you were troubleshooting and wanted to look at SnapMirror log files, what is the path and directory to these files?
Which one of the following SyncMirror commands would you use to mirror an existing unmirrored volume where Data ONTAP selects the disk drives?
In which two tools can an administrator identify security vulnerabilities and receive actionable intelligence? (Choose two.)
The required hardware to add SyncMirror to an existing system would be ___________.
An administrator wants to present datastores to a VMware environment that is using VLAN-10 and creates an SVM with NFS enabled on lif_NFS.
What does the administrator need to correct?
An administrator has an existing FlexVol accessed by Linux hosts over NFSv3. A CIFS share to the same FlexVol was created for SMB access. Windows users are unable to view the share. CIFS share permissions allow for read and write access for the Windows users.
What does the administrator need to modify to allow SMB access?
Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)
Which ONTAP authentication method must be added to enable two-factor authentication to an existing administrator's SSH login?
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage appliances were NFS mounted onto the Solaris host. You attempt to create a file on the NFS mount point for the inaccessible appliance, but you get the following error:NFS server filer2 not responding still trying.Symptoms:
1) When not in takeover mode, both storage appliances operate normally.
2) In takeover mode, the taken over node is not accessible on the network.You perform a "cf giveback" and you can now create a file over NFS on both appliances.
What should vou do first to resolve this issue?