Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You are asked to provision some new storage for VMware. Which two tools are available to perform this task?(Choose two.)

A.

OnCommand Insight

B.

Virtual Storage Console

C.

ONTAP System Manager

D.

SnapCenter Plug-in for VMware vSphere

Full Access
Question # 5

A FAS2750 cluster administrator experiences network issues during replication updates that pass over a low- bandwidth WAN link to their DR site. They also replicate locally to another cluster for testing and development. The administrator wants to enable network compression only on the existing WAN Link SnapMirror jobs.

In this scenario, which statement is correct?

A.

Network compression must be enabled when initializing the replica, the current jobs need to be deleted and new ones created.

B.

Network compression is a global option and it cannot be used.

C.

The current DR transfers must be aborted and the option enabled on each job, then resume the transfer.

D.

Network compression ispossible but not on a FAS2750.

Full Access
Question # 6

You want to modify the existing Snapshot copy schedule to allow for more granularity in your ability to recover data after a corruption or loss.

In this scenario, which two tools allow you to accomplish this task (Choose two.)

A.

OnCommand System Manager

B.

OnCommand Unified Manager

C.

NetApp SnapCenter

D.

ONTAP CLI

Full Access
Question # 7

Your customer needs to activate a destination SVM DRfollowing a disaster.

In this situation, which two actions should be performed? (Choose two.)

A.

Shut down the source cluster.

B.

From the destination cluster, break the SVM DR relationship.

C.

From the source cluster, break the SVM DR relationship.

D.

Start the destination SVM.

Full Access
Question # 8

You have successfully deployed a primary and a secondary ONTAP cluster. You want to set up an intercluster SnapMirror relationship between your primary and secondary sites.

In this scenario, which two actions are required before accomplishing this task? (Choose two.)

A.

NDMP must be enabled.

B.

The SVMs must bepeered.

C.

The primary and secondary clusters must be peered.

D.

The Snapshot schedule must be configured.

Full Access
Question # 9

A customer’s infrastructure consists of multiple ONTAP clusters, both physical and virtual. The clusters replicate some data with each other. You want to generate a comprehensive report of all the replication that is present on the infrastructure.

In this scenario, which tool accomplishes this task?

A.

OnCommand System Manager

B.

Storage Replication Adapter

C.

OnCommand Unified Manager

D.

OnCommand Workflow Automation

Full Access
Question # 10

A customer has application data corruption on a LUN that is in a volumewith six other data LUNs. The customer needs to restore the corrupted LUN from a Snapshot copy without affecting the other six LUNs.

Which process would accomplish this task?

A.

Use volume SnapRestore.

B.

Use LUN mapping.

C.

Use the volume Snapshot partial-restore file.

D.

Use a single-file restore.

Full Access
Question # 11

Click the Exhibit button.

Referring to the exhibit, what must be performed on nodes aff-01 and aff-02 to allow them to failover and giveback properly?

A.

Disconnect the HA connection between the nodes.

B.

Reboot aff-02 to resolve the LIF issue.

C.

No additional action is necessary.

D.

Move the LIFs to their home ports.

Full Access
Question # 12

Click the Exhibit button.

You have a SnapProtect v11 environment as shown in the exhibit. What are the two default Snapshot copies created automatically after creating a Storage Policy.

(Choose two.)

A.

Primary (Tape)

B.

Primary (Classic)

C.

Primary (NetApp)

D.

primary (Snap)

Full Access
Question # 13

Your customer wants to implement SVM DR, but the customer is not certain whether theidentity-preserve parameter should be enabled. The customer explains that the source and destination clusters are in different network subnets.

In this scenario, which SVM DR solution should the customer use?

A.

SVM DR using the identity-preserve parameter disabled and the default SnapMirror policy.

B.

SVM DR using the identity-preserve parameter enabled and then administratively take the data LIFs offline on the DR cluster.

C.

SVM DR with the identity-preserve parameter enabled and a SnapMirror policy with the discard-configs network parameter.

D.

SVM DR with the identity-preserve parameter enabled and the default SnapMirror policy.

Full Access
Question # 14

Click the Exhibit button.

A customer wants to have a local mirror and a remote mirror of their data.

Referring to the exhibit, which two solutions satisfy these requirements? (Choose two.)

A.

Solution I

B.

Solution IV

C.

Solution II

D.

Solution III

Full Access
Question # 15

After deploying an ONTAP Select 2 node HA cluster at a remote site, you successfully perform manual takeover and giveback before placing the cluster into production. After the cluster runs in production for a week, you notice that you can no longer perform a manual takeover.

In this scenario, what are two causes of this problem? (Choose two.)

A.

There is a network disruption between sites.

B.

ONTAP Deploy has been deleted.

C.

The vSphere HA service has failed.

D.

The HA interconnect cables have been removed.

Full Access
Question # 16

You configured a SnapMirror relationship with a default policy for the daily mirroring of a volume which contains financial data. Although the data is critical, it only changes on a monthly basis.

Using OnCommand System Manager, which two actions would change the frequency of the SnapMirror updates? (Choose two.)

A.

Select or create a different schedule.

B.

Edit the parameters of the default schedule.

C.

Select or create a different policy.

D.

Edit the parameters of the default policy.

Full Access
Question # 17

You are the administrator of an ONTAP 9.7 cluster. You configured an hourly Snapshot schedule for all volumes. One of your users accidentally deleted an important spreadsheet file on an SMB share. This file must be restored within a minimum amount of time.

Which two actions satisfy this requirement? (Choose two.)

A.

On the cluster CLI, issue the volume clone restore command.

B.

On the cluster CLI, issue the volume snapshot restore-file command.

C.

In Windows Explorer, right-click on the SMB share where the file was deleted, goto "Previous Versions" and select the file, then copy it to the original location.

D.

In ONTAP System Manager, navigate to the volume where the share resides, click on "Snapshot Copies" and restore the latest Snapshot copy.

Full Access
Question # 18

You are running a NetApp AFF A220 cluster. Each node has one volume. You create Snapshot copies on both volumes every four hours and keep the copies for 30 days. You are running out of disk space and want to free up space.

In this scenario, what do you do?

A.

Add a disk shelf with NL-SAS HDDs.

B.

Activate aggregate-inline deduplication.

C.

Add a capacity tier and set the tiering policy tosnapshot-only.

D.

Activate aggregate-background deduplication.

Full Access
Question # 19

You experience a node outage as a result of a component failure in a high-availability (HA) pair. You replace the failed component and get thenode booted up again, but are unable to perform the giveback operation. The

onscreen error is:

"Connected to partner, Takeover is not possible: Storage failover mailbox disk state is invalid, Local node has encountered errors while reading the storage failover partner's mailbox disks. Local node missing partner disks"

What are two ways to solve this problem? (Choose two.)

A.

Correct the shelf cabling errors.

B.

Destroy the root aggregate.

C.

Correct the failover group configuration.

D.

Destroy the mailboxes on both nodes.

Full Access
Question # 20

You have deployed volume-level replication with NetApp Synchronous SnapMirrorreplication technology.

In this scenario, which two statements are true? (Choose two.)

A.

In Sync mode, the application I/O fails if the write to the secondary storage is not completed, thereby ensuring that the primary and secondary storage are identical.

B.

In StrictSync mode, the application is allowed to continue writing to the primary storage if the write to the secondary storage is not completed.

C.

In Sync mode, the application is allowed to continue writing to the primary storage if the write to the secondary storage is not completed.

D.

In StrictSync mode, the application I/O fails if the write to the secondary storage is not completed, thereby ensuring that the primary and secondary storage are identical.

Full Access
Question # 21

Acompany has a 4-node FAS9000 fabric MetroCluster cluster separated by 101 km. Site A has an unmirrored HDD aggregate. An FC-VI card fails in one of the nodes in site A and a switchover occurs.

Which statement is correct in this scenario?

A.

The aggregateis accessible using Site A's surviving node.

B.

Only SSD aggregates are accessible.

C.

The distance is not supported.

D.

The aggregate is accessible using Site B's cluster.

Full Access
Question # 22

Click the Exhibit button.

A customer needs to add an additional X91143A card into a FAS9000 to allow mirroring between theproduction system and the disaster recovery FAS9000 platform. Slots 1, 4, 6, 8, and 9 have cards in them.

Referring to the exhibit, in which slot should you install the card?

A.

5

B.

10

C.

3

D.

7

Full Access
Question # 23

You have a SnapMirror relationship established between two sites and want to verify that the data on the DR site is usable without disturbing the source.

In this scenario, which three steps are required to accomplish this task? (Choose three.)

A.

Resynchronize the destination to the source volume, then update the source volume.

B.

Resume the SnapMirror destination, then updatethe SnapMirror destination.

C.

Quiesce the SnapMirror destination, then break the SnapMirror destination.

D.

Reverse the SnapMirror source and destination, then re-initialize SnapMirror.

E.

Configure the destination volume for data access, then access thedata volume from a client.

Full Access