To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.
When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n, the _________ the snapshot.
A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination volume has unexpired WORM files.
When using SnapRestore to restore a single LUN, the LUN must be ___________.
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system.
Which is true of the SnapVault backup of a NetApp storage system?
Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a NFS mount request on a Solaris system? (Choose three)
Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC).
Each storage system in a cluster must have network access to the __________.
The snapvault snap sched -x command is used to ____________.
With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____.
Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drive?
Which objects can be restored by a single SnapRestore command? (Choose three)
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are designated as ________.
Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default, and then forcibly take over Node 1 if the error condition persists?
How does the NetApp Remote Agent (RSA) connect to NetApp Support?
Which two commands on the storage system allow you to gather detailed statistics about network interfaces, including basic information about network connections? (Choose two.)
Before running lun setup on the storage system, you must first create the igroup to which the initiator will be attached.
Which storage system command would display the WWPNs of hosts that have logged into storage system using a Fibre Channel connection?
Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?
In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore operations on the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored. Which course of action ensures correct incremental backups?
UNIX allows file access based on___________.
What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a SnapVault secondary system?
Which command displays the statistics for Ethernet network interfaces?
If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solaris host and storage system data for analysis?
A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of the ____________ at the time the snapshot was created.
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)
If the security style is set to UNIX, CIFS client file access is determined by ___________.