Network Appliance NS0-145
Network Appliance NS0-145
Network Appliance NS0-145
Which set of commands should be used for troubleshooting Ethernet connectivity problems from
the storage system console?
A. ifstat, netdiag
B. sysconfig - cr, sysstat
C. scsi test, shelfchk
D. dish shm_stats, sysstat
Answer: A
Explanation:
QUESTION NO: 2
If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on the
storage system and do a restart for the changes to take effect.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 3
Which command would you use to verify that the iSCSI service is running?
Answer: C
Explanation:
QUESTION NO: 4
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 5
A. file
B. block
C. VLD
D. VIIP
Answer: B
Explanation:
QUESTION NO: 6
When viewing the output of the sysstat -f 1 command, which three fields are part of the total
number of operations per second? (Choose three.)
A. CIFS
B. FTP
C. NFS
D. FCP
E. SnapMirror
Answer: A,C,D
Explanation:
QUESTION NO: 7
Which two statements about hard and soft zoning are correct? (Choose two.)
Answer: A,B
Explanation:
QUESTION NO: 8
A. ifstat
B. sysconfig - v
C. ifconfig
D. netstat - i
Answer: C
Explanation:
QUESTION NO: 9
Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
Answer: B
Explanation:
QUESTION NO: 10
The super user receives an "Access Denied" message when he attempts to mount the new qtree.
Answer: B
Explanation:
QUESTION NO: 11
To view per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must
be set on.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 12
To configure a storage system as a member of a Windows active directory domain, the time on the
storage system must be set to be within plus or minus five minutes of the time on the domain
controller.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 13
A. lun move
B. lun copy
C. lun clone
Answer: A,C,D
Explanation:
QUESTION NO: 14
What are 3 true statements about physical reallocation of data added in ONTAP 7.3? (Choose
three.)
A. Volume Snapshots do not need to be deleted for the reallocate to run effectively
B. Reinitialize any SnapMirror relationship for the new physical geometry
C. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of
ONTAP earlier than 7.2
D. Use aggr reallocate -p pathname to run the physical reallocate
E. Use reallocate -p pathname to run the physical reallocate
Answer: A,C,E
Explanation:
QUESTION NO: 15
Answer: D
Explanation:
QUESTION NO: 16
Which iSCSI security method encrypts data between the initiator and the target?
Answer: A
Explanation:
QUESTION NO: 17
A. lun show -v
B. fcp show adapter
C. fcp show all
D. lun stats
Answer: B
Explanation:
QUESTION NO: 18
Which two are Data ONTAP commands for gathering performance information? (Choose two.)
A. sio_ntap_soll
B. sysstat
C. perfstat
D. nfsstat
Answer: B,D
Explanation:
QUESTION NO: 19
A. advisory
B. mandatory
Answer: B
Explanation:
QUESTION NO: 20
What mechanism allows you to make LUNs available to some initiators and unavailable to others?
A. LUN masking
B. LUN hiding
C. LUN grouping
D. LUN cloning
Answer: A
Explanation:
QUESTION NO: 21
A. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source,
destination, or both systems.
B. The fingerprint database and the change logs that the deduplication process uses are located
outside the volume, in the aggregate.
C. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process
continues uninterrupted.
D. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just
like the deduplication schedule for any volume.
E. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup
directory.
Answer: A,B,D
Explanation:
QUESTION NO: 22
Answer: C
Explanation:
QUESTION NO: 23
Before running lun setup on the storage system, you must first create the igroup to which the
initiator will be attached.
A. True
B. False
Answer: B
Explanation:
QUESTION NO: 24
Answer: C
Explanation:
QUESTION NO: 25
- lun setup
- lun map
- FilerView
Answer: B
Explanation:
QUESTION NO: 26
Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose two.)
A. sysstat 1
B. netdiag -n
C. netstat -i
D. ifstat –a
Answer: C,D
Explanation:
QUESTION NO: 27
Starting with Data ONTAP 7.3.1, support for SMB 2.0 in Windows Vista and Windows Server 2008
was added.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 28
Which three items are NFS resources for export? (Choose three.)
A. volume
B. subnet
C. directory/qtree
D. aggregate
Answer: A,C,E
Explanation:
QUESTION NO: 29
A. an aggregate
B. a directory or a qtree
C. a user group, or qtree
D. a specific disk space threshold
Answer: C
Explanation:
QUESTION NO: 30
Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose three.)
A. fcp wwpn
B. igroup show
C. lun show -v
D. fcp show initiator
E. lun show -err
Answer: B,C,D
Explanation:
QUESTION NO: 31
Which option should be used with the nfsstat command to assist in decoding export and mount
errors?
A. nfsstat -d
B. nfsstat -z
Answer: A
Explanation:
QUESTION NO: 32
Two alternatives to guaranteeing LUN space reservations during a snapshot on a volume with
fractional reserve set to 0% can be: (Choose two.)
A. LUN reset
B. Snap Autodelete
C. Volume AutoSize
D. Snapshot Reserve
Answer: B,C
Explanation:
QUESTION NO: 33
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and
group quotas, but not from tree quotas.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 34
If the security style is set to UNIX, CIFS client file access is determined by ___________ .
A. NT ACLs
B. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
C. the last client to set permissions
D. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX
QUESTION NO: 35
Which two conditions might cause a user to receive a disk full message from a storage system?
(Choose two.)
Answer: A,C
Explanation:
QUESTION NO: 36
In a Fibre Channel configuration, the host's HBA is referred to as the ___________ , and the
storage system's HBA is referred to as the __________ .
A. primary, secondary
B. initiator, target
C. secondary, primary
D. target, initiator
Answer: B
Explanation:
QUESTION NO: 37
Which three statements apply to an entry in the /etc/exports file regarding exporting
directories/qtrees and volumes? (Choose three.)
QUESTION NO: 38
A. The source (primary) system sends duplicated data even if the source data is deduplicated.
B. Deduplication internally synchronizes with the SnapVault schedule on the destination.
C. The source SnapVault data is deduplicated inline on the target before it is written to disk.
D. Deduplication savings are available after the baseline snapshot rolls off and the blocks are
freed.
E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the
snapshot to effectively deduplicate savings.
Answer: A,B,E
Explanation:
QUESTION NO: 39
Which two commands can be used to enable LUN reservations? (Choose two.)
A. lun create
B. fcp -r <lun_path>
C. lun set reservation
D. iscsi -r <lun_path>
Answer: A,C
Explanation:
QUESTION NO: 40
Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for
the next SnapMirror update.
A. True
B. False
QUESTION NO: 41
To determine if a problem you are experiencing is known to NetApp, use the NOW site _____
utility.
Answer: B
Explanation:
QUESTION NO: 42
Answer: B
Explanation:
QUESTION NO: 43
Answer: C
QUESTION NO: 44
Which two operations can be performed with the SnapDrive for Windows graphical user interface?
(Choose two.)
A. Create Disk
B. Create File
C. Connect Disk
D. Create Volume
Answer: A,C
Explanation:
QUESTION NO: 45
If you have a space-reserved, completely full 600G LUN with a volume fractional reservation of
100% and no free space, a snapshot copy of the volume fail.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 46
You receive an error message from an iSCSI host stating there is an authentication error. Which
command would you use to troubleshoot the failure?
Answer: D
Explanation:
QUESTION NO: 47
Which exportfs command will temporarily export the resource <path> while ignoring the options
specified in the /etc/exports file?
A. exportfs -a <path>
B. exportfs -u <path>
C. exportfs -v <path>
D. exportfs -i <path>
Answer: D
Explanation:
QUESTION NO: 48
Which command on the storage system allows you to collect statistics on the performance of
system resources such as CPU, NVRAM, network interfaces, and disks?
A. sysstat
B. netdiag
C. pktt
D. netstat
Answer: A
Explanation:
QUESTION NO: 49
What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume
vol2?
QUESTION NO: 50
A. Domain Controller
B. NFS
C. CIFS
D. DFS
E. FCP
Answer: B,C,E
Explanation:
QUESTION NO: 51
To automatically export volumes and directories on reboot, include them in the /etc/exports file.
A. True
B. False
Answer: A
Explanation:
QUESTION NO: 52
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
_______ utility.
Answer: C
Explanation:
QUESTION NO: 53
Which command shares out the directory /vol/vol2/home using the share name "netapp"?
Answer: A
Explanation:
QUESTION NO: 54
Which storage system command would display the WWPNs of hosts that have logged into a
storage system using a Fibre Channel connection?
A. sysconfig -a
B. iscsi show adapter
C. fcp show initiator
D. fcp config
Answer: C
Explanation:
QUESTION NO: 55
In Data ONTAP the root user is exempt from these two quotas: _______. (Choose two.)
A. group quotas
B. user quotas
C. tree quotas
D. root quotas
E. file quotas
Answer: A,B
Explanation:
QUESTION NO: 56
A. netstat
B. ifconfig
C. sysconfig
D. ifstat
Answer: D
Explanation:
QUESTION NO: 57
A. options cifs.symlink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B
Explanation:
QUESTION NO: 58
____________ is the default cfmode for new installations of Data ONTAP 7.3.
A. single image
B. mixed
C. partner
D. dual fabric
Answer: A
Explanation:
Answer: A
Explanation:
QUESTION NO: 60
When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. mounted on a host
B. mapped to a Windows server
C. exported and accessible
D. taken offline or unmapped
Answer: D
Explanation:
QUESTION NO: 61
Which three are used for creating LUNs on a storage system? (Choose three.)
A. lun create
B. lun setup
C. lun config
D. FilerView
Answer: A,B,D
Explanation:
QUESTION NO: 62
lun show -m
0 /vol/vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0
A. True
B. False
Answer: B
Explanation:
QUESTION NO: 63
A. FCP
B. iSCSI
C. NFS
D. CIFS
Answer: A
Explanation:
QUESTION NO: 64
A. Volume
B. Subnet
C. Directory
D. Qtrees
QUESTION NO: 65
Which command can you use to add exports to the /etc/exports file and in memory?
A. exportfs –f
B. exportfs –p
C. exportfs –o
D. exportfs –c
Answer: B
Explanation:
QUESTION NO: 66
A. RAID is a scheme that divides and replicates data among multiple physical disk drives.
B. RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a
parity disk.
C. RAID groups disks in a single enclosure.
D. RAID combines multiple disk drives into an array of disk drives that performs better than a
single large disk drive and provides fault tolerance.
Answer: D
Explanation:
QUESTION NO: 67
Which anon option provides every user with root access to the export?
A. anon=65535
B. anon=65534
C. anon=0
D. anon=1
QUESTION NO: 68
Which statement is NOT true if the /etc/exports file contains the following entry?
A. Read-write access is granted to all the hosts except host1 and host2.
B. Read-only access is granted to both host1 and host3.
C. Root access is granted to host2.
D. Only host1, host2, and host3 can access /vol/vol72.
Answer: D
Explanation:
QUESTION NO: 69
Which three statements about System Manager are TRUE? (Choose three.)
A. System Manager provides graphical management interface that enables you to manage
storage systems.
B. System Manager provides capacity information about the storage objects such as disks and
volumes.
C. System Manager can be used to perform takeover and giveback.
D. System Manager reduces read/write latency in database applications.
Answer: A,B,C
Explanation:
QUESTION NO: 70
A. vFiler
B. HA pairs
Answer: C
Explanation:
QUESTION NO: 71
Which Clustered Data ONTAP logical component handles storage access to the disk shelves?
A. N-blade
B. SCSI blade
C. D-blade
D. Cluster Interconnect
Answer: C
Explanation:
QUESTION NO: 72
What does the SnapProtect “Primary (Classic) copy” of the sub client represent?
Answer: B
Explanation:
QUESTION NO: 73
Which two statements are TRUE about Data ONTAP operating in 7-mode?
A. A port and its configuration are owned by only one vFiler unit at a time.
B. Ports and interface groups can be shared across data Vservers.
C. Only the configuration and NOT the port are owned by a particular data Vserver.
Answer: A,D
Explanation:
QUESTION NO: 74
What is a VSIM?
Answer: C
Explanation:
QUESTION NO: 75
Which items should you consider when you migrate data from Data ONTAP operating in 7-Mode
to Clustered Data ONTAP?
Answer: A,B,D
Explanation:
QUESTION NO: 76
Which user has the default access to the system shell in clustered Data ONTAP?
A. root
B. admin
C. diag
Answer: C
Explanation:
QUESTION NO: 77
Which NetApp technology can create multiple virtual controllers on a single NetApp storage
system operating Data ONTAP 7-Mode?
A. Flash Pool
B. The FlexShare tool
C. FlexClone technology
D. MultiStore software
Answer: D
Explanation:
QUESTION NO: 78
Answer: A,C,D
Explanation:
QUESTION NO: 79
Answer: A
Explanation:
QUESTION NO: 80
Why does Data ONTAP save data in NVRAM memory prior to saving it to storage?
A. Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from
NVRAM.
B. Data ONTAP saves data in NVRAM memory because it is more cost efficient than
disks.snapvault initialize.
C. Data ONTAP saves data in NVRAM memory to allow for faster access to read data than
acquiring the same data from disk
D. Data ONTAP saves data in the NVRAM in order to protect information in the event of power
loss or other disruptions.
Answer: D
Explanation:
QUESTION NO: 81
Which file contains the information on where to look for host information and the order for the
search?
A. /etc/nsswitch
B. /etc/hosts
C. /etc/resolv.conf
D. /etc/registry
Answer: A
Explanation:
QUESTION NO: 82
You wish to export /vol/vol1/data so that any NFS client may mount it read-write, and so that the
admin host (at IP address 10.2.3.4) will have root access. Which CLI command will create this
Answer: B
Explanation:
QUESTION NO: 83
Which command allows you to set the permissions for a share called marketing?
Answer: D
Explanation:
QUESTION NO: 84
Answer: B
Explanation:
QUESTION NO: 85
Answer: D
Explanation:
QUESTION NO: 86
Which four authentication options (types) are supported by the storage controller for cifs setup?
(Choose four.)
Answer: A,C,E,F
Explanation:
QUESTION NO: 87
27. If a volume contains multiple RAID 4 groups, you could have two disks in a volume fail without
data loss, as long as they were not ___________.
Answer: B
Explanation:
QUESTION NO: 88
Answer: D
Explanation:
Answer:
Explanation:
Explanation:
QUESTION NO: 91
Answer: B
Explanation:
A. NAS is a network architecture that refers to storage elements that connect to a network and
provide file-level access services to computer systems.
B. NAS is a network architecture that refers to storage elements that connect to a network and
provide block level access services to computer systems.
C. NAS is a network that uses an encapsulated SCSI protocol.
D. NAS is a network for large enterprise customers.
Answer: A
Reference:http://en.wikipedia.org/wiki/Network-attached_storage
QUESTION NO: 93
Answer: B,D
Reference:http://www.unitek.com/training/netapp/blog/2008/08/raid-groups-and-aggregates/
QUESTION NO: 94
Which three Clustered Data ONTAP objects that are “owned” by a data SVM? (Choose three)
A. Disks
B. LIFs
C. Ports
D. LUNs
E. Volumes
Answer: A,D,E
Explanation:
QUESTION NO: 95
A. UNIX clients
B. A namespace
C. A Storage Virtual Machine (SVM)
D. CIFS clients
Answer: B
Explanation:
Volume junctions are a way to join individual volumes together into a single, logical namespace to
enable data access to NAS clients. Understanding how volume junctions are formed helps you to
interpret and apply the usage rules.
Reference:https://library.netapp.com/ecmdocs/ECMP1368017/html/GUID-B19F98A5-53C7-4504-
95CF-BED861ED8AD5.html
QUESTION NO: 96
Cloud Resources are built specifically for an entity (group, organization, or company),
Infrastructure can be hosted internally or externally and also managed internally or by a third party.
A. Public
B. Private
C. Hybrid
D. Commercial
Answer: B
Explanation:
Private cloud is cloud infrastructure dedicated to a particular organization. Private clouds allow
businesses to host applications in the cloud, while addressing concerns regarding data security
and control, which is often lacking in a public cloud environment. It is not shared with other
organizations, whether managed internally or by a third-party, and it can be hosted internally or
externally.
QUESTION NO: 97
What is FlexArray?
A. FlexArray is a new archival software that helps customers save important archive files for less
money and with more security.
B. Flex Array is new tool to manage software updates and to achieve overall assurance.
C. FlexArray is software that enables the FAS product line to act as both FAS and V-Series on the
same system.
D. FlexArray is a marketing change to the V-Series solution.
Answer: D
Reference:http://searchstorage.techtarget.com/news/2240214706/NetApp-changes-V-Series-to-
FlexArray-launches-new-enterprise-array
QUESTION NO: 98
A. RBAC
B. Export Policy
C. Name Mapping
D. Audit policy
Answer: A
Explanation:
QUESTION NO: 99
Answer: B,C
Explanation:
If a volume is full (because of Snapshot copies, active file system data, or both) what are some
tasks that the administrator can do in order to free up space? (Choose three.)
Answer: A,B,E
Explanation:
In an aggregate using a RAID-DP raid group, what is the minimum number of disks that are
needed to create an aggregate so that it contains three data disks?
A. 9 disks
B. 7 disks
C. 3 disks
D. 5 disks
Answer: C
Explanation:
The minimum number of disks in a RAID-DP group is three: at least one data disk, one regular
paritydisk, and one double-parity (or dParity) disk.
If there is a data-disk or parity-disk failure in a RAID-DP group,Data ONTAP replaces the
faileddisk in the RAID group with a spare disk and uses the parity data to reconstruct the data of
the faileddisk on the replacement disk. If there is a double-disk failure, Data ONTAP replaces the
At the end of the normal write process, RAID sends a completion message to the CPU signaling it
to flush out contents of which log?
A. System Memory
B. Client
C. WAFL
D. NVRAM
Answer: D
Reference:https://annurkarthik.wordpress.com/category/data-storage/
When you create UNIX security style volumes, which two statements are TRUE? (Choose two.)
Answer: B,D
Explanation:
Answer: A,D,E
Explanation:
A. As a SCSI MBA
B. As software initiators
C. As Ethernet NICs
D. As anInfiniband MBA
Answer: B
Explanation:
When you create a new volume, Data ONTAP automatically assigns an export policy to TRUE?
(Choose two.)
A. The default Export Policy is called default and initially contains no export rules.
B. The default Export Policy cannot be modified to add new export rules.
C. The default Export Policy cannot be deleted.
D. There can be only one Export Policy per SVM.
Answer: A,C
Explanation:
Answer: B
Reference:http://www.netapp.com/us/solutions/industry/government/bigdata.aspx
Answer: C
Explanation:
A. SnapManager
B. SnapRestore
C. Snapshot
D. SnapMirror
E. SnapVault
Answer: D
Reference:http://www.netapp.com/uk/products/protection-software/
Which type of Flash memory has high endurance, high performance and high cost?
A. TLC
B. MLC
Answer: C
Reference:http://www.cs.virginia.edu/~vm9u/files/RefreshSSDs.pdf(page 2)
A. A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all
restrictions on the parent.
B. A FlexClone volume is a copy of all data blocks in a volume while a snapshot only references
data blocks.
C. A Flexclone volume is a writeable copy of a patent volume while a snapshot is read-only.
D. A FlexClone volume is a separate copy of all data blocks within a parent volume that lives
outs.de of the volumes while the snapshot lives within the volume.
Answer: B
Explanation:
When creating a flexible volume, which attribute determines the volume’s position in the
namespace?
A. Aggregate
B. SVM
C. Junction path
D. Export policy
Answer: B
Explanation:
Volumes are associated with one Storage Virtual Machine (SVM).The SVM is a virtual
managemententity, or server, that consolidates various cluster resources into a single manageable
unit. When youcreate a volume, you specify the SVM it is associated with. The type of the volume
(FlexVol volumeor Infinite Volume) is determined by an immutable SVM attribute.
Volumes have a language. The language of the volume determines the character set Data
Volumes depend on their associated aggregates for their physical storage; they are not
directlyassociated with any concrete storage objects, such as disks or RAID groups. If the
clusteradministrator has assigned specific aggregates to an SVM, then only those aggregates can
be used toprovide storage to the volumes associated with that SVM. This impacts volume
creation, and alsocopying and moving FlexVol volumes between aggregates.
When WAFL (Write Anywhere File Layout) flushes data to disk, the action is usually known as
what?
A. Write allocation
B. Consistency point
C. File system synchronization
D. NVRAM synchronization
Answer: B
Reference:https://kb.netapp.com/support/index?page=content&id=3014024&pmv=print&impressio
ns=false
Answer: A
Explanation:
A. The application
B. The server only
C. The client and the server
D. The domain controller
Answer: D
Explanation:
If an aggregate contains multiple RAID DP groups, three disks in the same aggregate and
___________ it can fall without data loss.
Answer: C
Explanation:
Which NetApp storage-efficiency technology enables storage to be allocated for current capacity
instead of for future needs?
A. FlexClone software
B. Deduplication
C. Compression
D. Flexible volumes
Answer: D
Explanation:
Answer: B,D
Explanation:
A. SnapVault
B. SnapMirror
C. Snapshot
D. SnapRestore
E. SnapManager
Answer: A,B
Reference:http://www.f5.com/pdf/white-papers/offsite-protection-arx-netapp-wp.pdf
Consider three volumes eng_projects, hr_projects and vol1, their corresponding junction paths are
as follows: /svm/eng_projects, /svm/hr_projects and /svm/eng_projects/vol1. From a LINUX
machine when you mount volume svm and run cd/mnt/svm and is on this directory which
subdirectories would you expect to see?
Answer: C
Explanation:
What are the three major components of enterprise flash devices? (Choose three.)
A. DRAM
B. FABI
C. Flash controller
D. Flash memory
E. Flash deregulator
Answer: A,C,D
Explanation:
Answer: B,C,D
Reference:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-0BB21C74-DB7F-4A83-
AEEB-2AA2B44C5E4A.html
What are two functions of the Flash Translation Layer? (Choose two.)
Answer: B,C
Reference:http://drona.csa.iisc.ernet.in/~gopi/west10/goodson.pdf(page 1&2)
Which NetAPP storage efficiency technology provides an extra level of data protection against
disk failure?
A. Dduplication
B. Data compression
C. Thin provisioning
D. RAID-DP
Answer: D
Reference:http://bnrg.eecs.berkeley.edu/~randy/Courses/CS294.F07/NetApp2.pdf(page 5)
Answer: A,C
Explanation:
A storage administrator creates two volumes, vol1 located in aggr1 and vol2 located in aggr2.
Junction paths for both of them are /vol1 and /vol2. The administrator performs a “volume move”
operation and moved vol1 from aggr1 to aggr2. Which statement is true?
Answer: C
Explanation:
A. File
B. Block
C. Object
D. Virtual local disk (VLD)
Answer: B
Explanation:
Which term do you use to highlight that a storage administrator can add more than two storage
systems to a cluster?
A. Scale vertical
B. Scale up
C. Scale horizontal
D. Scale out
Answer: D
Explanation:
Which technology natively enables block-level access by a host to d.sk storage via a standard
LAN?
A. iSCSI
B. FC
C. CIFS
D. NFS
Answer: A
Explanation:
Which flash deployment is ideal for environments that need extreme database performance?
A. Traditional storage
B. Hybrid array
C. Server cache
D. All-flash array
Answer: D
Explanation:
The major benefit of an all-flash array is the ability to deliver sustained levels of extreme
performance at a lower price point than that of a storage system that employs spinning disk drives.
For the most part, this means dramatic improvements in response-time performance (latency), or
the time it takes to respond to each and every transaction processed in a database-driven
application. For many applications, it is simply unacceptable to have any perceptible variance in
transaction time that could impact the customer experience. In the financial industry, for example,
stringent response-time requirements may be the subject of government regulation.
Another use case for an all-flash array is when you need extreme data throughput (as measured in
IOPS) but don’t have a corresponding need for massive capacity to permanently house all of the
incoming data. An all-flash array is the right approach in this type of environment.
Reference:http://searchstorage.techtarget.com/NetAppSponsoredNews/When-to-Consider-an-All-
Flash-Array
The Data ONTAP FlexVol feature allows administrators to do which two? (Choose two.)
Answer: A,C
Explanation:
A. WWPN
B. iSNS
C. IQN
D. OUT
E. EUI
Answer: C,E
Explanation:
Every iSCSI node must have a node name. The two formats, or type designators, for iSCSI node
names are iqn and eui. The storage system always uses the iqn-type designator. The initiator can
use either the iqn-type or eui-type designator.
Reference:http://www.datadisk.co.uk/html_docs/netapp/netapp_block_access.htm
Which NetApp solution is pre-validated and includes storage, network, and server components?
A. Windows Consolidation
B. V-Series
C. FlashArray
D. FlexPod
Answer: D
Reference:http://www.netapp.com/au/solutions/flexpod/datacenter/
One key attribute of Data ONTAP is unified storage architecture. This refers to supporting which
two simultaneously? (Choose two.)
A. Backup
B. DAS
C. SAN
D. Deduplication
E. NAS
F. Compression
When does a consistency point (CP) flush to disk occur? (Choose two.)
Answer: B
Reference:http://www.slideshare.net/taotao1240/wafl-overview(slide 6)
Which process statement accurately describes the functionality of NetApp Snapshot copies?
A. NetApp Snapshot copies store pointers to data blocks and write original data to a new location
when changed.
B. NetApp Snapshot copies store pointers to data blocks and write changed data to new locations.
C. NetApp Snapshot copies copy all blocks to the Snapshot Reserve when the snapshot is taken.
D. NetApp Snapshot copies copy incrementally changed blocks to a secondary disk.
Answer: B
Explanation:
You create a volume named “vol2” in a data SVM named svm2. You create a junction for the
volume named “music” from the root of SVM2. You will mount this namespace on a LINUX host.
What is the path that the host needs to mount?
A. /music
B. /svm2/music
C. /vol2
D. /svm2/vol2
Which Flash parameter identifies block erase candidates through monitoring page active and
inactive states and cold data pages?
Answer: C
Explanation:
When a client navigates through a junction, the client has entered a different ____________.
A. Node
B. Junction
C. SVM
D. Volume
Answer: A
Explanation:
To access a share from a CIFs client, what parameters are contained in the UNC?
Answer: D
Which Cloud delivery model abstracts the underlying infrastructure and platforms even further to
provide direct functional access to application and its access to the applications and its capability?
A. Software as a Service
B. Infrastructure as a Service
C. Platform as a Service
D. IT as a Service
Answer: A
Explanation:
There are 16 SAS disks available for creating the aggregate; you use 14 disks to create a RAID
DP aggregate. The RAID group size is 8 disks in a raid group.
Answer: B
Explanation:
Cloud Consumers Can provision and manage servers, system and resources through a single
portal or developer API. There is also an On-Demand Component which indicates that resources
are always available to the customer. This is a description of which Cloud characteristic?
A. Measured/Metered
Answer: E
Explanation:
A. Mirroring Port IO
B. Path health monitoring
C. Load balancing
D. RAID reconstruction after a failure
E. Monitoring fiber optical signal quality
Answer: A,C
Explanation:
Which NetApp hardware product helps in performance optimization and functions as an intelligent
read cache for data and metadata?
A. Flash Pool
B. Flex Array
C. Flex Pod
D. Flash Cache
Answer: D
Reference:http://www.netapp.com/us/products/storage-systems/flash-cache/
Which two parameters influence Solid State Disk (SSD) performance? (Choose two.)
Answer: A,D
Explanation:
A. Server visualization is the emulation of physical hardware to deliver higher IT utilization and
flexibility.
B. Server virtualization is the simulation of an operating system on physical hardware to deliver
higher IT utilization and flexibility.
C. Server virtualization is the clustering of multiple servers as a logical entity to deliver higher IT
utilization and flexibility.
D. Server virtualization is an abstraction layer that decouples the physical hardware from the
operating system to deliverhigher IT utilization and flexibility.
Answer: D
Reference:http://www.vmware.com/pdf/vi_architecture_wp.pdf(page 3)
John is a windows user attempting to access a volume or qtree with security style of UNIX.
Assuming no explicit name mapping has been done and to validate authorization, to which default
user does he get mapped?
A. Admin
B. Pcuser
C. Root
D. john
Answer: B
Explanation:
A. Volume
B. RAID groups
C. Fabrics
D. Domains
Answer: B
Explanation:
Answer: A,B,C
Explanation:
One of the steps while configuring CIFS protocol on an SVM using System Manager is joining the
CIFS server to the domain. Which statement is NOT TRUE regarding this task?
Answer: C
Explanation:
NetApp file services solution involves which two protocols? (Choose two.)
A. FCIP
B. NFS
C. iSCSl
D. CIFS
Answer: B,D
Reference:http://documentation.commvault.com/hds/v10/article?p=products/dm_fs_netapp/overvi
ew.htm#File_Access_Protocols_Support
Which two statements are TRUE with regard to Snapshot copies? (Choose two)
A. A snapshot copy is read-only image of a flexible volume or an aggregate that captures the state
of the file system at a point in time.
B. Snapshot copies can be created interactively via command line or created on schedule with the
snapshot configuration.
C. Snapshot copies carry the same read and write permissions as the original file.
D. Snapshot copies are a duplicate copy of the original data.
E. A snapshot residing on the same physical media as the original data is disaster recovery
solution.
Answer: A,D
Explanation: