Special Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Netapp NS0-163 Dumps

Page: 1 / 19
Total 188 questions

NetApp Certified Data Administrator ONTAP Professional Questions and Answers

Question 1

What NetApp tool includes Crafana dashboards to display ONTAP performance, capacity and hardware metrics?

Options:

A.

ONTAP System Manager.

B.

Unified Manager

C.

Digital Advisor

D.

NetApp Harvest

Question 2

What are two ways that an administrator can define a new consistency group? (Choose two.)

Options:

A.

SANtricity

B.

ONTAP ReST API

C.

Active IQ Unified Manager

D.

System Manager

Question 3

Which statement is true of the cf forcetakover -d command?

Options:

A.

The surviving cluster node takes over the functions of the failed partner.

B.

Mirrored volumes are implicitly split.

C.

Both of the above

D.

None of the above

Question 4

An administrator has an ESXi cluster with VMware VMFS LUNs on an AFF system. Alter troubleshooting performance issues, the administrator determines that timeout best practices are not set on the hosts.

Which NetApp tool would apply the best practice settings?

Options:

A.

SnapCenter Plug-in for VMware vSphere

B.

SAN Host Utilities

C.

SnapManager

D.

ONTAP Tools for vSphere

Question 5

After configuring an ONTAP duster for SAN access, the administrator is notified that the cluster nodes are connected to separate fc switches.

Given the following output:

as

What action will correct the redundancy issue?

Options:

A.

swap cable at node-01 / Id with cable at node-02 / Id

B.

swap cable at node-01 / lb with cable at node-02 / lb

C.

swap cable at node-01 / la with cable at node-01 / Id

D.

swap cable at node-01 / lc with cable at node-02 / lc

Question 6

To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ______________. (Choose two.)

Options:

A.

restore to a non existing qtree, with DOT 7. 2

B.

add the new qtree to the primary storage system with DOT 7.2

C.

overwrite the existing qtree on the primary storage system with DOT 7.3

D.

delete the existing qtree from the secondary storage system with DOT 7.3

Question 7

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

Options:

A.

True

B.

False

Question 8

Which method should an administrator use to make sure all data In a local tier cannot be read If the underlying device Is repurposed, returned, misplaced, or stolen?

Options:

A.

Self-encrypting drives

B.

Multi-admin authentication

C.

SMB encryption

D.

SnapLock volumes

Question 9

You cannot disable the SyncMirror license if one or more mirrored volumes exist.

Options:

A.

True

B.

False

Question 10

Refer to the exhibit.

as

An administrator creates a new qtree and an associated export policy. When the client tries to connect, they are denied.

What should the administrator do?

Options:

A.

Update the superuser entry lo "any" in the volume export-policy

B.

Replace the IP with the client hostname in the qtree export policy

C.

Add the new host IP with at least read access to the volume export-policy

D.

Add a new rule in the qtree export policy in allow read-write access for the new host

Question 11

Which ONTAP authentication method must be added to enable two-factor authentication to an existing administrator's SSH login?

Options:

A.

domain

B.

publickey

C.

nsswltch

D.

cert

Question 12

Which one of the following statements is not true of SnapLock volumes?

Options:

A.

There are two types of SnapLock volumes.

B.

SnapLock volumes support SnapMirror.

C.

SnapLock volumes support per-file retention periods.

D.

SnapLock volumes are supported on the gFiler appliance.

Question 13

Which objects can be restored by a single SnapRestore command? (Choose three)

Options:

A.

file

B.

LUN

C.

qtree

D.

volume

E.

directory

Question 14

Which NetApp SnapMirror method allows for transparent failover between two AFF clusters with applications using iSCSI LUNs?

Options:

A.

SM BC

B.

SnapVault

C.

SVM-DR

D.

SM_S

Question 15

What is the default FabricPool tiering policy for a newly created volume?

Options:

A.

auto

B.

snapshot-only

C.

all

D.

none

Question 16

If you were troubleshooting and wanted to look at SnapMirror log files, what is the path and directory to these files?

Options:

A.

root volume, /etc/snaplog/

B.

ootvolume, /etc/log/snaplog/

C.

root volume, /etc/log/

D.

destination volume, /etc/log/

Question 17

If the local node has its FC HBA connected to switch Bank 1, it owns the disks connected to switch bank

Options:

A.

1

B.

3

C.

4

D.

2

Question 18

Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC).

Options:

A.

True

B.

False

Question 19

When cabling a standard storage appliance for SyncMirror. disk pool 1 volumes must be cabled to Fibre Channel adapter(s) located in what range of slots on the FAS960 appliance?

Options:

A.

Slots 2 throii&h 5

B.

Slots 3 throuah 11

C.

Slots 3 throuah 8

D.

Slots S throuah 11

Question 20

How would you initiate a cluster takeover of filer2 from filer 1?

Options:

A.

filer2> cf giveback

B.

filerl> cf giveback

C.

filer2> cf takeover

D.

filer 1> cf takeover

Question 21

When creating an S3 bucket using System Manager, ONTAP uses which default performance service level for an AFF?

Options:

A.

Extreme

B.

Value

C.

Custom

D.

Performance

Question 22

The required hardware to add SyncMirror to an existing Clustered Failover system consists of:

Options:

A.

Disk shelves and cluster interconnect

B.

Disk shelves, adapters and cabling

C.

Disk shelves and cabling

D.

Disk shelves and termination switches

Question 23

Alter a SnapRestore reversion of a volume, incremental backup and restore operations on the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored. Which one of the following is the most likely course of action to take to ensure correct incremental backups?

Options:

A.

Perform a base-level backup of the volume after you restore it.

B.

Reboot the storage appliance to reset timestamps back to their original times before the reversion.

C.

Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.

D.

First perform choice c and then choice a.

Question 24

Which ONTAP feature will allow WORM and non-WORM volumes in the same aggregate?

Options:

A.

NetApp Aggregate Encryption

B.

Unified Aggregate

C.

SnapLock Enterprise

D.

SnapLock Compliance

Question 25

Which RDMA protocol does ONTAP support with NFS using TCP?

Options:

A.

IWARP

B.

FC/NVMe

C.

RoCE

D.

Infiniband

Question 26

Which workload type supports Autonomous Ransomware Protection?

Options:

A.

NAS

B.

Object

C.

VMFS

D.

SAN

Question 27

Which tool is available on a non-NetApp primary system to assist in starting or stopping SnapVault, modifying NDMP settings, enabling debugging, and capturing trace files?

Options:

A.

Data Fabric Manager

B.

Svconfigurator GUI

C.

svdebug.exe

D.

None of the above

Question 28

One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make tins configuration persistent across reboots, you must enter tins information in the_____file for each appliance.

Options:

A.

/etc/hosts

B.

/etc/rc

C.

/voL'volO/home

D.

/vol/volO/mount

Question 29

Which two tools can be used to actively monitor ONTAP cluster performance? (Choose two.)

Options:

A.

Cloud Sync

B.

Active IQ Unified Manager

C.

Cloud Insights

D.

Active IQ OneCollect

Question 30

Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)

Options:

A.

SVM previous versions enabled

B.

Volume snapshot copy

C.

Enable FlexClone operations

D.

Share previous versions enabled

Question 31

Which one of the following /etc/snapmirror.conf entries will not support synchronous SnapMirror?

Options:

A.

FilerA:source_vol FilerB: destination_vol- sync

B.

FilerA: source_vol FilerB: destination_vol outstanding=3s sync

C.

FilerA: source_vol FilerB: destination_vol-0-55/5***

D.

FilerA: source_vol FilerB: destination_vol visibility_interval=1hr, outstanding=3ms, cksum=crc32 sync

Question 32

Which one of the following commands is used to specify the destination appliance(s) that are allowed to replicate (pul data from the source appliance?

Options:

A.

options snapmirror.allow

B.

snapmirror release

C.

snapmirror initialize

D.

options snapmirror.access

Question 33

The two copies of a SyncMirror volume are called_______. Each______is a physicalcopy of the same file system and consists of one or more RAID groups.

Options:

A.

plexes. plex

B.

volumes, volume

C.

qtrees. qtree

D.

snapshots, snapshot

Question 34

While troubleshooting a double disk failure with SyncMirror. You decide to remove and destroy a plex from a mirrored volume. What steps would you perform to remove a plex from a mirrored volume?

Options:

A.

Ensure the plex is offline and use the vol destroy plexname command.

B.

Ensure the plex is online and use the vol destroy plexname command.

C.

Take the volume offline and use the vol destroy command.

D.

Take the volume offline and use the vol destroy -f command.

Question 35

What user-controllable security mechanism is built into OSSV?

Options:

A.

QSM access list modifiable via svconfigurator

B.

Contents inside a file called access and located in OSSV /snapvault/etc

C.

Via/etc/hosts.equiv file

D.

MD5 based authentication between SnapVault primary and secondary, with changeable password

Question 36

What console message is a good indication that the storage appliance is ready to reinstate the cluster from a previous takeover?

Options:

A.

waiting for takeover

B.

waiting for giveback

C.

resume takeover

D.

enter cf giveback

Question 37

The snapvault snap create volume snapname command can be executed on the__________.

Options:

A.

secondary system only

B.

primary system only

C.

secondary or primary appliance systems

D.

open systems

Question 38

Which two modes support using SnapMirror over multiple paths?

Options:

A.

Multiplexing

B.

Failover

C.

Giveback

D.

Standalone

Question 39

Before enabling an active/active configuration, you should verify and compare the configuration of the nodes. Which tool can perform this task?

Options:

A.

cf-config-check.cgi script

B.

cf status command on both nodes

C.

clustercheck script

D.

Release Comparison Tool

Question 40

Refer to the exhibit.

as

Based on the CPU headroom statistics provided for one node in the cluster, what is the available performance capacity?

Options:

A.

72

B.

-14

C.

86

D.

14

Question 41

Which two Interfaces can an administrator use to disable unused Ethernet ports on an ONTAP cluster? (Choose two.)

Options:

A.

System Manager

B.

Active IQ Unified Manager

C.

Command line Interface

D.

Active IQ Conflg Advisor

Question 42

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

Options:

A.

1

B.

2

C.

4

D.

6

Question 43

Which three are required licenses for Fabric Attached MetroCluster? (Choose 3)

Options:

A.

Syncmirror_remote

B.

Syncmirrorocal

C.

Cluster

D.

Cluster remote

Question 44

Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two.)

Options:

A.

snapmirror update

B.

snapmirror status

C.

snapmirror initialize

D.

options snapmirror.access all

Question 45

An administrator wants to scale out storage performance for real time read-intensive workloads across multiple controllers.

Which two NetApp ONTAP features accomplish this task? (Choose two.)

Options:

A.

FlexCache

B.

FlexGroup

C.

FlexVol

D.

FlexClone

Question 46

Which SVM type owns cluster LIFs?

Options:

A.

Data

B.

Admin

C.

System

D.

Node

Question 47

When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server, which three are valid objects to include in the data set? (Choose three.)

Options:

A.

a file

B.

A qtree

C.

A directory

D.

The entire client

Question 48

Which one of the following keywords alone can be used to convert an asynchronous mirror to be synchornous?

Options:

A.

cksum

B.

src_con

C.

sync

D.

outstanding

Question 49

Fill in the blank for the following statement: To manage a SnapVault backup through a commercial NDMP application, you must specify a_____authorized through that application.

Options:

A.

volume and qtree

B.

directory path

C.

user and password

D.

SnapVault license

Question 50

You have determined that the failure to a MetroChister is a disaster. Which step should you take?

Options:

A.

Ensure the surviving node is isolated from its partner.

B.

Force the surviving node to take over the functions of its partner.

C.

Remount the failed partners volume.

D.

All of the above

Question 51

Which ONTAP feature allows the most efficient use of disk space for provisioning root aggregates?

Options:

A.

DDP

B.

ADP

C.

XDP

D.

XCP

Question 52

Which two conditions would prevent an ONTAP upgrade? (Choose two.)

Options:

A.

Established iSCSI sessions

B.

Offline volume

C.

Failed disk

D.

Offline LIF

E.

Established NFS sessions

Question 53

Which two networking components must be configured to failover LIFs across subnets? (Choose two.)

Options:

A.

BGP

B.

LACP

C.

VLAN

D.

VIP

Question 54

Identify the twoSnapMirrorcommands that are entered on the destination storage appliance.

Options:

A.

options snapmirror.access on

B.

snapmirror release

C.

snapmirror initialize

D.

snapmirror resync

Question 55

In a fabric-attached MetroCluster, a "site failure" is described as a __________.

Options:

A.

failure of the Inter-Switch-Links (ISL)

B.

failure of the interconnect cable

C.

complete failure of the primary controller and disk shelves

D.

malfunction of the Fibre Channel adapter on the cluster node

Question 56

An administrator enables the NFS protocol on an SVM and creates a volume to be used as a datastore in a VMware environment. After a rescan, the volume is not visible on the ESXi hosts.

What must the administrator validate to resolve this problem?

Options:

A.

Export policy

B.

Name service

C.

Security style

D.

Access control

Page: 1 / 19
Total 188 questions