New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Netapp NS0-155 Data ONTAP 7-Mode Administrator Exam Practice Test

Demo: 28 questions
Total 173 questions

Data ONTAP 7-Mode Administrator Questions and Answers

Question 1

To remove a cluster setup, you must perform these steps:

1. Type cf disable.

2. Unlicense cluster.

3. Remove partner entries for network interfaces from the /etc/rc file.

4. Halt and make sure the partner-sysid is blank.

5. Power down and remove the cluster interconnect card.

6. Perform steps 1-5 above on the partner node.

Options:

A.

True

B.

False

Question 2

When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n, the _________ the snapshot.

Options:

A.

older

B.

newer

C.

more important

D.

least important

Question 3

A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination volume has unexpired WORM files.

Options:

A.

True

B.

False

Question 4

When using SnapRestore to restore a single LUN, the LUN must be ___________.

Options:

A.

exported and accessible

B.

mapped to a Windows server

C.

mounted on a host

D.

taken offline or unmapped

Question 5

The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system.

Options:

A.

True

B.

False

Question 6

Which is true of the SnapVault backup of a NetApp storage system?

Options:

A.

The file is the basic unit for SnapVault backup destination.

B.

The qtree is the basic unit for SnapVault backup destination.

C.

The volume is the basic unit of SnapVault backup destination.

D.

The directory is the basic unit for SnapVault backup destination.

Question 7

Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a NFS mount request on a Solaris system? (Choose three)

Options:

A.

check the client's fstab

B.

check the /etc/sd.conf file on the client

C.

check show mount -e to the storage system from the client

D.

check for connectivity to the storage system from the client

E.

check the output of the exportfs command on the storage system

Question 8

Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC).

Options:

A.

True

B.

False

Question 9

Each storage system in a cluster must have network access to the __________.

Options:

A.

Internet

B.

cluster partner

C.

same administration

D.

host same collection of subnets

Question 10

The snapvault snap sched -x command is used to ____________.

Options:

A.

schedule full backups

B.

cancel scheduled backups

C.

schedule baseline transfer

D.

schedule incremental backups

Question 11

With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____.

Options:

A.

500

B.

1000

C.

6400

D.

64000

Question 12

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drive?

Options:

A.

aggr mirror aggrY

B.

aggr mirror aggrY -m

C.

aggr mirror aggrT -d 12@144

D.

aggr mirror aggrY -m 12@144

Question 13

Which objects can be restored by a single SnapRestore command? (Choose three)

Options:

A.

file

B.

LUN

C.

qtree

D.

volume

E.

directory

Question 14

When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ________.

Options:

A.

16-bit

B.

32-bit

C.

64-bit

D.

Foreign

E.

Unknown

Question 15

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default, and then forcibly take over Node 1 if the error condition persists?

Options:

A.

Auto enable of giveback

B.

Negotiated Fail Over

C.

Takeover on panic

D.

Cf.quickloop.enable

Question 16

How does the NetApp Remote Agent (RSA) connect to NetApp Support?

Options:

A.

NetApp Support initiates a non-secure connection to the RSA.

B.

NetApp Support initiates a secure connection to the RSA.

C.

The RSA initiates a secure connection to NetApp Support.

D.

The RSA initiates a non-secure connection to NetApp support.

Question 17

Which two commands on the storage system allow you to gather detailed statistics about network interfaces, including basic information about network connections? (Choose two.)

Options:

A.

ifstat -a

B.

netdiag -n

C.

netstat -i

D.

sysstat 1

Question 18

Before running lun setup on the storage system, you must first create the igroup to which the initiator will be attached.

Options:

A.

True

B.

False

Question 19

Which storage system command would display the WWPNs of hosts that have logged into storage system using a Fibre Channel connection?

Options:

A.

fcp config

B.

fcp initiator show

C.

fcp show –i

D.

fcp show initiator

Question 20

Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?

Options:

A.

All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.

B.

The expansion is triggered by an aggr convert command.

C.

The expansion is triggered by adding disks to exceed 16 TB.

D.

The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with Data ONTAP 8.1 upgrade.

Question 21

In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore operations on the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored. Which course of action ensures correct incremental backups?

Options:

A.

Perform a base-level backup of the volume after you restore it.

B.

Reboot the storage system to reset timestamps back to their original times before the reversion.

C.

Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.

D.

Take a new snapshot of the volume to create new base-level timestamps for the incremental backup, and then perform a base-level backup of the volume after you restore it.

Question 22

UNIX allows file access based on___________.

Options:

A.

NT ACLs and UNIX permissions.

B.

NT ACLs and SID.

C.

GID or UID and UNIX permissions.

D.

GID or UID and ACLs.

Question 23

What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a SnapVault secondary system?

Options:

A.

MD5 authentication between SnapVault primary and secondary, with changeable password

B.

Contents inside file called access and located in OSSV /snapvault/etc

C.

QSM access list modifiable via svconfigurator

D.

Via /etc/hosts.equiv file

Question 24

Which command displays the statistics for Ethernet network interfaces?

Options:

A.

ifconfig

B.

ifstat

C.

sysconfig

D.

sysstat

Question 25

If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solaris host and storage system data for analysis?

Options:

A.

sio_ntap.exe

B.

prestart

C.

poststat

D.

perfstat

Question 26

A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of the ____________ at the time the snapshot was created.

Options:

A.

qtrees

B.

volume

C.

directory

D.

storage system

Question 27

What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)

Options:

A.

Snap Autodelete

B.

iGroup throttle

C.

LUN reset

D.

Volume AutoSize

Question 28

If the security style is set to UNIX, CIFS client file access is determined by ___________.

Options:

A.

NT ACLs

B.

the last client to set permissions

C.

the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions

D.

This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

Demo: 28 questions
Total 173 questions