New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which one of the following statements apply to Advanced Single Instance Storage (ASIS)?

A.

Eliminates duplicates files in SnapVault for NetBackup secondary volumes

B.

Eliminates duplicates blocks in SnapVaultfor NetBackup source volumes

C.

Eliminates duplicates blocks in SnapVault for NetBackup secondary volumes

D.

Eliminates duplicates files in SnapVaultfor NetBackup source volumes Correct answers

Full Access
Question # 5

How can you "throttle" Snap Vault updates and baseline transfers so that the primary or secondary is not transmitting data as fast as it can?

A.

Use the -k option in the snapvault start command.

B.

Use the snapvault throttle command.

C.

SnapVault doesnt support throttling of network throughput

D.

None of the above

Full Access
Question # 6

The snapvault snap sched-x command can be used to:

A.

Schedule full backups

B.

Start initial backups

C.

Schedule incremental backups

D.

Specify platforms that can be backed up

Full Access
Question # 7

Exhibit:

To remove a cluster setup, you must perform the steps displayed in the exhibit.

A.

True

B.

False

Full Access
Question # 8

Which ONTAP policy type defines the kind of traffic that Is supported for a LIF?

A.

QoS

B.

Service

C.

Failover

D.

Export

Full Access
Question # 9

When you create a restricted volume to be used as the destination for SnapMirror data replication, which command allows you to check the size of the source and destination volumes?

A.

sysconfig -v

B.

df

C.

vol status -b

D.

vol mirror –v

Full Access
Question # 10

Which one of the following would you use to change the NDMP password on the Open System SnapVault agent?

A.

svpasswd

B.

svpassword

C.

password

D.

password

Full Access
Question # 11

Which one of the following statements is not true when using SnapRestore?

A.

SnapRestore must be licensed before you can use it.

B.

The options snaprestore enable on option must be enabled.

C.

The volume to be reverted must not be a SnapMirror destination mirror.

D.

The volume must be online.

Full Access
Question # 12

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 re synchronization state when it failed?

A.

Rejoin the two volumes.

B.

Re-create the synchronous mirror

C.

Turn on power to the cluster node at the disaster site.

D.

Determine which volumes are at the remote and disaster sites.

Full Access
Question # 13

Which two types of Restore does Cloud Backup allow? (Choose two.)

A.

StorageGRID

B.

Cloud Volumes ONTAP (CVO)

C.

E-Series system

D.

AFF ONTAP system

E.

Windows 2019 server

Full Access
Question # 14

One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make tins configuration persistent across reboots, you must enter tins information in the_____file for each appliance.

A.

/etc/hosts

B.

/etc/rc

C.

/voL'volO/home

D.

/vol/volO/mount

Full Access
Question # 15

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of Node 1s disk shelves. Which one of the following features will cause Node 2 to monitor this error condition for a period of three minutes (by default), and then forcibly take over Node 1 if the error condition persists?

A.

Takeover on panic

B.

Negotiated Fail Over

C.

Auto enable of giveback

D.

cf.quickloop.enable

Full Access
Question # 16

Which ONTAP feature discards identical blocks and replaces them with references to a single shared block?

A.

Compression

B.

Deduplication

C.

Thin provisioning

D.

Compaction

Full Access
Question # 17

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

A.

Block user access

B.

Email the administrators

C.

Create a new snapshot

D.

Offline the suspicious volume

Full Access
Question # 18

Fill in the blanks for the following statement:

The qtree specified for_____must not exist on the secondary system before you run the_____command.

A.

sec_qtree_path. snapvault start

B.

pri_qtree_path. snapvault start

C.

sec_qtree_path. snapvault enable

D.

pri_qtree_path. snapvault enable

Full Access
Question # 19

Which one of the following commands would you use to create a new SyncMirror volume, lettina Data ONTAP select the disk drives?

A.

vol mirror volX -n 12

B.

vol mirror volX -m 12

C.

vol create volX -d 12

D.

vol create volX -m 12

Full Access
Question # 20

SnapMirror will automatically tiy to restart a transfer after_________.

A Ail initial transfer is interrupted

B. A scheduled incremental update is interrupted

C. A manual update is interrupted

D. A transfer interrupted by reboot

Full Access
Question # 21

In a fabric-attached MetroCluster, hardware disk ownership by a node is determined by which two factors (Choose two.)

A.

the system ID of the controller

B.

what types of ports are on the HBA

C.

the location of the HBA or onboard port

D.

what types of disks are used in the cluster

E.

how the disks are configured by the administrator

F.

which switch ports the controller and disks are connected to

Full Access
Question # 22

Which two tools should an administrator use to manage NVMe namespaces? (Choose two.)

A.

SAN Host Tools

B.

Config Advisor

C.

System Manager

D.

ONTAP CLI

Full Access
Question # 23

Which two of the following NetApp storage appliances do not support the use of synchronous SnapMirror?

A.

F825

B.

FAS960

C.

F87

D.

F820

Full Access
Question # 24

It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?

A.

True

B.

False

Full Access
Question # 25

When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server, which three are valid objects to include in the data set? (Choose three.)

A.

a file

B.

A qtree

C.

A directory

D.

The entire client

Full Access
Question # 26

In a synchronous SnapMirror configuration, the soui'ce storage appliance exhibits high latency due to user traffic and rapid data change from SnapMirror transactions.Which one of the following tuning methods best resolves this performance behavior? Edit the /etc/snapmirror.conf file on the destination storage appliance and set:

A.

outstandine=3s

B.

visibility interval=3s

C.

cksum=3s

D.

src con=3

Full Access
Question # 27

Which policy type determines access to volumes for NFS within ONTAP?

A.

Service

B.

Tiering

C.

Export

D.

Snapshot

Full Access
Question # 28

Which tool is available on a non-NetApp primary system to assist in starting or stopping SnapVault, modifying NDMP settings, enabling debugging, and capturing trace files?

A.

Data Fabric Manager

B.

Svconfigurator GUI

C.

svdebug.exe

D.

None of the above

Full Access
Question # 29

Which two commands could be used if the cf giveback command foils? (Choose 2)

A.

cf giveback -force

B.

cf giveback -f

C.

cf forceeiveback -f

D.

cf forceeiveback

Full Access
Question # 30

When creating an S3 bucket using System Manager, ONTAP uses which default performance service level for an AFF?

A.

Extreme

B.

Value

C.

Custom

D.

Performance

Full Access
Question # 31

Before enabling an active/active configuration, you should verify and compare the configuration of the nodes. Which tool can perform this task?

A.

cf-config-check.cgi script

B.

cf status command on both nodes

C.

clustercheck script

D.

Release Comparison Tool

Full Access
Question # 32

Which native ONTAP feature allows an administrator to block a Windows user from writing files with the.crypto extension?

A.

FPolicy

B.

Kerberos

C.

IP-SEC

D.

FIPS

Full Access
Question # 33

A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.

A.

125

B.

251

C.

255

D.

Depends on capacity and number of disk drives

Full Access
Question # 34

Which two SVM types can host intercluster UFs? (Choose two.)

A.

System

B.

Node

C.

Data

D.

Admin

Full Access
Question # 35

Which one of the following commands would you use to rejoin the "mil" volume with the "mir(l)" volume?

A.

vol mirror mir -v mir

B.

vol mirror mir -c mir(l)

C.

vol mirror mil -v mir(l)

D.

vol minor mil -n mir(l)

Full Access
Question # 36

What is the maximum distance between a standard clustered pair?

A.

10 meters

B.

50 meters

C.

100 meters

D.

500 meters

Full Access
Question # 37

What does it signify if the disks are "not owned" in a FAS270C appliance?

A.

The disks are data disks.

B.

The disks are spare disks.

C.

The disks are mailbox disks.

D.

The disks are not used.

Full Access
Question # 38

An administrator wants to scale out storage performance for real time read-intensive workloads across multiple controllers.

Which two NetApp ONTAP features accomplish this task? (Choose two.)

A.

FlexCache

B.

FlexGroup

C.

FlexVol

D.

FlexClone

Full Access
Question # 39

Which statement describes the results of the snapmirror resync command?

A.

Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.

B.

Resynchronization will cause the loss of all data written to the destination after the original base snapshot was made.

C.

Resynchronization will update the snapshot on the source filer

D.

Resynchronization will update the snapshot on the destination filer.

Full Access
Question # 40

Which statement describes the results of the snapmirror resync command?

A.

Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.

B.

Resynchronization made. cause the loss of all data written to the destination after the original base snapshot was

C.

Resynchronization. update the snapshot on the source filer.

D.

Resynchronization. update the snapshot on the destination filer.

Full Access
Question # 41

Which one of the following statements is true of storage appliance SnapVault backup?

A.

The volume is the basic unit of SnapVault backup.

B.

The file is the basic unit for SnapVault backup.

C.

The directory is the basic unit for SnapVault backup.

D.

The qtree is the basic unit for SnapVault backup.

Full Access
Question # 42

For a configuration change to be effective when using the OSSV configurator, the OSSV service must be restarted.

A.

True

B.

False

Full Access
Question # 43

Fill in the blank for the following statement using the best answer from the choices that follow. A snapshot is a frozen, read-only image of the entire Data ONTAP file system that reflects the state of the____________at the time the snapshot was created.

A.

qtrees

B.

directory

C.

file system

D.

storage appliance

Full Access
Question # 44

The two copies of a SyncMirror volume are called_______. Each______is a physical copy of the same file system and consists of one or more RAID groups.

A.

plexes. plex

B.

volumes, volume

C.

qtrees. qtree

D.

snapshots, snapshot

Full Access
Question # 45

When using MetroCluster, identify two methods for restricting access to the disaster site node. (Choose 2)

A.

Use manual fencing

B.

Turn off power to the disaster site node.

C.

Use the cf forcetakeover-d command.

D.

Use the cfgiveback-f command.

Full Access
Question # 46

One week ago you performed a single file SnapRestore from a snapshot other than the most recent. You now notice that the storage appliance is now taking longer to perform snapshot deletions. Which one of the following reasons is the most likely cause of this problem?

A.

Snapshots that existed after the one used for the single file SnapRestore need to be manually deleted.

B.

The SnapRestore schedule changed from weekly to hourly.

C.

All of the snapshots created after you did the single file SnapRestore were deleted, and reserved inodesfrom the snapshots still exist.

D.

Before a snapshot can be deleted, the active maps across all snapshots need to be checked for active blocks related to the file you restored.

Full Access
Question # 47

Data ONTAP uses inodes in an active file system to reference__________________.

A.

disk blocks

B.

file segments

C.

qtrees

D.

snapshots

Full Access
Question # 48

You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage appliances were NFS mounted onto the Solaris host. You attempt to create a file on the NFS mount point for the inaccessible appliance, but you get the following error:NFS server filer2 not responding still trying.Symptoms:

1) When not in takeover mode, both storage appliances operate normally.

2) In takeover mode, the taken over node is not accessible on the network.You perform a "cf giveback" and you can now create a file over NFS on both appliances.

What should vou do first to resolve this issue?

A.

Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.

B.

Replace the NIC adapter.

C.

Use the cluster-config-checker.cgi to identify the problem and corrective action.

D.

Submit a new bug report.

Full Access
Question # 49

Which SVM type owns cluster LIFs?

A.

Data

B.

Admin

C.

System

D.

Node

Full Access
Question # 50

The Snap Vault secondary system makes a snapshot of its own volume where the qtrees are located.

A True

B. False

Full Access
Question # 51

What should be done to non-distuptlvely correct capacity Imbalances in a FlexGroup?

A.

Convert the FlexGroup to a FlexVol

B.

Move the FlexGroup to a different aggregate

C.

Move the constituent to a new aggregate

D.

Perform a rebalance of the FlexGroup constituents

Full Access
Question # 52

Which workload type supports Autonomous Ransomware Protection?

A.

NAS

B.

Object

C.

VMFS

D.

SAN

Full Access
Question # 53

A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plex was built. Data ONTAP will:

A.

Choose spare disks to reconstruct from the opposite pool

B.

Warn you that there are no available spares from the proper pool

C.

"Halt" after 24 hours if spare disks are not added to the proper pool

D.

Stop all applications that are running

Full Access
Question # 54

Which two tools can be used to actively monitor ONTAP cluster performance? (Choose two.)

A.

Cloud Sync

B.

Active IQ Unified Manager

C.

Cloud Insights

D.

Active IQ OneCollect

Full Access
Question # 55

A volume can contain up to___snapshots concurrently.

A.

125

B.

225

C.

255

D.

Depends on capacity and number of disk drives

Full Access
Question # 56

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drives?

A.

aggr mirror aggrY

B.

aggr mirror aggrY-m

C.

aggr mirror aggrY-d 12@ 144

D.

aggr mirror aggrY-m 12@ 144

Full Access
Question # 57

An administrator wants to provide isolation from connected hosts to the same FCP LUN. Which two features accomplish this request? (Choose two.)

A.

Portsets

B.

Selective LUN Mapping

C.

IPSpaces

D.

Broadcast Domains

Full Access
Question # 58

When you issue the snapmirror status command, to what does the "Lag" column refer?

A.

The amount of time it takes for the baseline transfer to complete.

B.

The difference between the current time and the last basic snapshot creation time on the destination for a transfer which completed successfully.

C.

The difference between the current time and the last basic snapshot creation time on the source for a transfer which completed successfully.

D.

The difference between the most recent snapshot and the last basic snapshot creation time on the source for a transfer which completed successfully.

Full Access
Question # 59

Which three are true when creating a SyncMirror volume? (Choose 3)

A.

The number of disks added must be an even number and equally divided between the two plexes.

B.

The disks selected for Plex 0 and Plex 1 must come from the same disk pools.

C.

The number of disks selected for one plex must equal the number of disks selected from the other plex.

D.

The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger capacity disk and downsizes it.

Full Access
Question # 60

Open System SnapVault agents can be installed on all non-Network Appliance platforms.

A.

True

B.

False

Full Access
Question # 61

Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?

A.

snap restore -r

B.

snap restore -d

C.

snap restore -s

D.

snap restore -c

Full Access
Question # 62

It is the use of the -Lflag in the snapmirror initialize command and the subsequent successful level 0 transfer that causes the destination volume to become snaplocke?

A.

True

B.

False

Full Access
Question # 63

Which one of the following would you use to change the NDMP password on the Open System SnapVault agent?

A.

svpasswd

B.

svpassword

C.

password

D.

password

Full Access
Question # 64

Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?

A.

snap restore-r

B.

snap restore-d

C.

snap restore -s

D.

snap restore-c

Full Access
Question # 65

Which statement describes the results of the snapmirror resync command?

A Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.

B. Resynchronization will cause the loss of all data written to the destination after the original base snapshot was made.

C. Resynchronization will update the snapshot on the source filer

D. Resynchronization will update the snapshot on the destination filer.

Full Access
Question # 66

Which ONTAP feature will allow WORM and non-WORM volumes in the same aggregate?

A.

NetApp Aggregate Encryption

B.

Unified Aggregate

C.

SnapLock Enterprise

D.

SnapLock Compliance

Full Access
Question # 67

What does it signify if the disks are "not owned" in a FAS270C appliance?

A.

The disks are data disks.

B.

The disks are spare disks.

C.

The disks are mailbox disks.

D.

The disks are not used.

Full Access
Question # 68

Which one of the following is not a pre-requisite for using SnapRestore?

A.

You must enter the SnapRestore license code before you can use it.

B.

Snapshots must exist on the storage appliance so that you can select a snapshot for the reversion.

C.

The volume to be reverted must be offline.

D.

The volume to be reverted must not be a SnapMirror destination.

Full Access
Question # 69

To restore a primary SnapVault qtree to the exact qtree location on the primary storage system (from which it was backed up), you must:

A.

Add the new qtree to the primary storage system

B.

Restore to a non-existing qtree

C.

Overwrite the existing qtree on the primary storage system

D.

Delete the existing qtree from the secondary storage system

Full Access
Question # 70

Which two supported methods would you use to restore data from a SnapVault for NetBackup Volume?

A.

Use the NetBackup Administration Console

B.

Use drag-and-drop technologies

C.

Use the snapvault restore Data ONTAP command

D.

Use the SnapRestore Data ONTAP service

Full Access
Question # 71

Which three statements apply to NearStore Personality license? (Choose three.)

A.

it increases the storage capacity.

B.

it converts the destination storage system to a NearStore system.

C.

It requires the nearstore_option license on the destination storage system.

D.

it provides increased concurrent streams when the storage systems are used as destinations for SnapMirror and SnapVault transfers.

Full Access
Question # 72

You can unlicense the cluster feature only in

A.

normal, disabled

B.

normal, enabled

C.

takeover, disabled

D.

takeover, enabled

Full Access