Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You are creating an Ansible playbook to create a new NFS export.

In which order do you need to execute the module tasks in your playbook?

A.

na_ontap_export_policy_rule na_ontap_volume na_ontap_export_policy

B.

na_ontap_volume na_ontap_export_policy_rule na_ontap_export_policy

C.

na_ontap_volume na_ontap_export_policy na_ontap_export_policy_rule

D.

na_ontap_export_policy na_ontap_volume na_ontap_export_policy_rule

Full Access
Question # 5

You are building a software program for a car dealer to manage their asset inventory.

Referring to the exhibit, which statement is correct about the number and the array name in this JSON output?

A.

three arrays; cars, brand, and models

B.

two arrays; cars and models

C.

one array; cars

D.

four arrays; cars and models

Full Access
Question # 6

You must have a firewall adjusted to allow Ansible to work with ONTAP and Element software.

In this scenario, which port must be allowed for both systems?

A.

Telnet(23)

B.

SSH(22)

C.

HTTPS(443)

D.

HTTP(80)

Full Access
Question # 7

Your company's infrastructure includes on-premises multivendor resources and public cloud Amazon Elastic Compute Cloud (Amazon EC2) instances on AWS. Your company is also planning on expanding its public cloud infrastructure to Azure and Google Cloud. You need to implement a tool to monitor the performance issues and errors for your entire environment, using real-time service-level indicators.

In this scenario, which tool should you implement to achieve this goal?

A.

NetApp OnCommand Performance Manager

B.

Amazon Cloudwatch

C.

NetApp Cloud Insights

D.

NetApp Active IQ Unified Manager

Full Access
Question # 8

After a ransomware attack, you are asked to block known ransomware file extensions and to recover encrypted files.

In this scenario, which two native NetApp Cloud Volumes ONTAP technologies will remediate the attack? (Choose two.)

A.

FPolicy

B.

Snapshot policy

C.

NetApp Storage Encryption

D.

NetApp Volume Encryption

Full Access