Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default, and then forcibly take over Node 1 if the error condition persists?
To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set on.
Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule.
To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ______________. (Choose two.)
Identify the two commands that could be entered on the SnapMirror destination storage system. (Choose two)
Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two)
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)
To automatically export volumes and directories on storage system reboot, include them in the /etc/exports file.
An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________.
A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of the ____________ at the time the snapshot was created.
Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the next SnapMirror update.
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system.
You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which command would verify that disks are connected and have dual paths?
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make this configuration persistent across reboots, you must enter this information in the _____ file for each system.