Special Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

NS0-163 Questions and Answers

Question # 6

Which method should an administrator use to make sure all data In a local tier cannot be read If the underlying device Is repurposed, returned, misplaced, or stolen?

A.

Self-encrypting drives

B.

Multi-admin authentication

C.

SMB encryption

D.

SnapLock volumes

Full Access
Question # 7

Which three are required licenses for Fabric Attached MetroCluster? (Choose 3)

A.

Syncmirror_remote

B.

Syncmirrorocal

C.

Cluster

D.

Cluster remote

Full Access
Question # 8

An administrator Is troubleshooting failed cluster peering between three ONTAP clusters for cascaded SnapMirror replication. Cluster1 is peered to Cluster, cluster^ is peered to Cluster3.

Clusterl and Cluster3 do not have an available route to reach each other. Cluster2 can route to both Cluster1 and Cluster3 using dedicated and separate intercluster LIFs.

What ONTAP network component must be configured on Cluster2 to resolve this issue?

A.

IPspaces

B.

Broadcast domains

C.

Failover groups

D.

Subnets

Full Access
Question # 9

A NearStore system or storage appliance can operate as a secondary and primary system at the same time.

A.

True

B.

False

Full Access
Question # 10

One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make tins configuration persistent across reboots, you must enter tins information in the_____file for each appliance.

A.

/etc/hosts

B.

/etc/rc

C.

/voL'volO/home

D.

/vol/volO/mount

Full Access
Question # 11

Which two commands could be used if the cf giveback command foils? (Choose 2)

A.

cf giveback -force

B.

cf giveback -f

C.

cf forceeiveback -f

D.

cf forceeiveback

Full Access
Question # 12

Which command allows yon to access the other nodes console after a takeover has occurred?

A.

toggle

B.

switch

C.

partner

D.

takeover

Full Access
Question # 13

A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago. Which command continues the relationship?

A.

SnapMirror initialize

B.

SnapMirror quiesce

C.

SnapMirror resume

D.

SnapMirror resync

E.

SnapMirror update.

Full Access
Question # 14

Which is true of the SnapVault backup of NetApp storage system?

A.

The file is the basic unit for SnapVault backup destination.

B.

The qtree is the basic unit for SnapVault backup destination

C.

The volume is the basic unit of SnapVault backup destination.

D.

The directory is the basic unit for SnapVault backup destination.

Full Access
Question # 15

You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage appliances were NFS mounted onto the Solaris host. You attempt to create a file on the NFS mount point for the inaccessible appliance, but you get the following error:NFS server filer2 not responding still trying.Symptoms:

1) When not in takeover mode, both storage appliances operate normally.

2) In takeover mode, the taken over node is not accessible on the network.You perform a "cf giveback" and you can now create a file over NFS on both appliances.

What should vou do first to resolve this issue?

A.

Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.

B.

Replace the NIC adapter.

C.

Use the cluster-config-checker.cgi to identify the problem and corrective action.

D.

Submit a new bug report.

Full Access
Question # 16

What user-controllable security mechanism is built into OSSV?

A.

QSM access list modifiable via svconfigurator

B.

Contents inside a file called access and located in OSSV /snapvault/etc

C.

Via/etc/hosts.equiv file

D.

MD5 based authentication between SnapVault primary and secondary, with changeable password

Full Access
Question # 17

Which two networking components must be configured to failover LIFs across subnets? (Choose two.)

A.

BGP

B.

LACP

C.

VLAN

D.

VIP

Full Access
Question # 18

What command would you enter to restore the /vol/flexvol0/etc/rc file from a snapshot to the /vol/flexvol0/home directory?

A.

snap restore -r vol /vol/flexvol0/home/rc /vol/flexvol0/etc/rc

B.

snap restore -t /vol/flexvol0/home/rc /vol/flexvol0/etc/rc

C.

snap restore -t file -r /vol/flexvol0/home/rc /vol/flexvol0/etc/rc

D.

snap restore -s /vol/flexvol0/home/rc /vol/flexvol0/etc/rc

Full Access
Question # 19

Which one of the following commands or procedures would you use to undo a SnapRestore reversion?

A.

snap restore -r vol

B.

snap revert-s vol

C.

snap restore undo vol

D.

None of the above. You cannot undo a SnapRestore reversion.

Full Access
Question # 20

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

A.

True

B.

False

Full Access
Question # 21

Refer to the exhibit.

A company has three servers that are using the iSCSI protocol to connect to a two node NetApp ONTAP cluster. The server administrator notices that half of the paths are down. The administrator checks the ONTAP cluster and notices the servers are logging into only the first controller.

Which two steps should the administrator take to troubleshoot the issue? (Choose two.)

A.

Verify that each server has been rebooted

B.

Verify that the controller has not been taken over

C.

Verify that the iSCSI data protocol has been enabled on the ports

D.

Verify that the LIFs are up

Full Access
Question # 22

Which ONTAP feature discards identical blocks and replaces them with references to a single shared block?

A.

Compression

B.

Deduplication

C.

Thin provisioning

D.

Compaction

Full Access
Question # 23

An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are available Data ONTAP will then perform what action?

A.

chooses a 72-Gigabyte disk and use it as is

B.

chooses a 72-Gigabyte disk and right-size it

C.

halts after 24 hours of running in degraded mode

D.

alerts you that there are no 36-Gigabyte disks and wait for one to be inserted

Full Access
Question # 24

Identify the two SnapMirror commands that are entered on the source storage appliance.

A.

options snapmirror.access on

B.

snapmirror status

C.

snapmirror initialize

D.

snapmirror resync

Full Access
Question # 25

If an error message indicates that the cluster interconnect adapter itself is faulty, what is your corrective action?

A.

Check the cabling of the Channel A disk shelf loop and reseat and tighten any loose cables.

B.

Check the cabling of the Channel B disk shelf loop and reseat and tighten any loose cables.

C.

Re-cable the cluster interconnect adapter or replace the adapter if needed.

D.

Check for network activity.

Full Access
Question # 26

What needs to be enabled on an ONTAP SMB share to increase data throughput and fault tolerance for Microsoft SQL Server databases?

A.

Multi-channel

B.

Round-robin

C.

Initiator group

D.

Multipathing

Full Access
Question # 27

Which two Interfaces can an administrator use to disable unused Ethernet ports on an ONTAP cluster? (Choose two.)

A.

System Manager

B.

Active IQ Unified Manager

C.

Command line Interface

D.

Active IQ Conflg Advisor

Full Access
Question # 28

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

A.

1

B.

2

C.

4

D.

6

Full Access
Question # 29

Fill in the blank for the following statement using the best answer from the choices that follow. A snapshot is a frozen, read-only image of the entire Data ONTAP file system that reflects the state of the____________at the time the snapshot was created.

A.

qtrees

B.

directory

C.

file system

D.

storage appliance

Full Access
Question # 30

Which two protocols provide NAS access for home directories on an S VM? (Choose two.)

A.

SMB

B.

NVMe/TCP

C.

NFS

D.

iSCSI

E.

FC

Full Access
Question # 31

Which two options must be configured to use tamperproof snapshots? (Choose two.)

A.

Multi Admin Verification

B.

Compliance clock

C.

SnapLock aggregate

D.

SnapLock license

Full Access
Question # 32

You have determined that the failure to a MetroChister is a disaster. Which step should you take?

A.

Ensure the surviving node is isolated from its partner.

B.

Force the surviving node to take over the functions of its partner.

C.

Remount the failed partners volume.

D.

All of the above

Full Access
Question # 33

What is the format for snapvault schedule?

A.

YYYY-MM-DD

B.

crontab format

C.

cnt[@day_Hst][@hour_list]

D.

List of dates in ISO Date format

Full Access
Question # 34

In the NetApp Product line, what makes the AFF Platform unique?

A.

It can only use spinning disks (HDD)

B.

It can only use secure digital (SD) cards.

C.

It can use both spinning and solid state disks (HDD & SSD)

D.

It can only use solid state disks (SSD)

Full Access
Question # 35

Which command disables client access to Snapshot copies on a volume called flexvol1?

A.

cifs shares-change flexvol1 -nosnap

B.

snap access flexvol1 off

C.

vol options flexvol1 nosnapdir on

D.

vol options flexvol1 snapdir off

E.

vol options flexvol1 snapdir on

Full Access
Question # 36

Which two configurations ensure end users are able to restore previous versions of files? (Choose two.)

A.

SVM previous versions enabled

B.

Volume snapshot copy

C.

Enable FlexClone operations

D.

Share previous versions enabled

Full Access
Question # 37

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 re synchronization state when it failed?

A.

Rejoin the two volumes.

B.

Re-create the synchronous mirror

C.

Turn on power to the cluster node at the disaster site.

D.

Determine which volumes are at the remote and disaster sites.

Full Access
Question # 38

Which one of the following commands is used to specify the destination appliance(s) that are allowed to replicate (pul data from the source appliance?

A.

options snapmirror.allow

B.

snapmirror release

C.

snapmirror initialize

D.

options snapmirror.access

Full Access
Question # 39

Which two types of Restore does Cloud Backup allow? (Choose two.)

A.

StorageGRID

B.

Cloud Volumes ONTAP (CVO)

C.

E-Series system

D.

AFF ONTAP system

E.

Windows 2019 server

Full Access
Question # 40

Which one of the following does SnapRestore revert?

A.

Snapshot schedules

B.

Volume option settings

C.

RAID group size

D.

File content

Full Access
Question # 41

Which two SVM types can host intercluster UFs? (Choose two.)

A.

System

B.

Node

C.

Data

D.

Admin

Full Access
Question # 42

In a Fabric Attached Metro Cluster, disk ownership by a node is determined by_____________.

A.

where the FC HBAs for disks connect into the switch, and by where the disks connect to the switch banks.

B.

the types of disks used in the cluster.

C.

the ports on the FC HBA.

D.

the slots in which the FC HBA is installed.

Full Access
Question # 43

Which three tools present statistics from the Data ONTAP counter manager? (Choose three.)

A.

stats

B.

sysstat

C.

windows perfmon

D.

operations manager

Full Access
Question # 44

Which two protocols does Fpolicy support? (Choose two.)

A.

SMB

B.

FCP

C.

iSCSI

D.

NFS

Full Access
Question # 45

How can you "throttle" Snap Vault updates and baseline transfers so that the primary or secondary is not transmitting data as fast as it can?

A.

Use the -k option in the snapvault start command.

B.

Use the snapvault throttle command.

C.

SnapVault doesnt support throttling of networkthroughput

D.

None of the above

Full Access
Question # 46

After an unexpected ONTAP node reboot, an administrator notices that the NAS data LIFs are not on their home port.

Which UF configuration would modify this behavior?

A.

-auto-revert

B.

-home-port

C.

-service-policy

D.

-failover-group

Full Access
Question # 47

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk drives?

A.

aggr mirror aggrY

B.

aggr mirror aggrY-m

C.

aggr mirror aggrY-d 12@ 144

D.

aggr mirror aggrY-m 12@ 144

Full Access
Question # 48

Due to the sensitive nature of AutoSupport messages, what transport protocol should a storage administrator configure?

A.

HTTPS

B.

HTTP

C.

SFTP

D.

SMTP

Full Access
Question # 49

Which two default HA features work together to reduce and avoid client outages on an ONTAP FAS cluster? (Choose two.)

A.

Automatic SAN LIF migration

B.

Automatic failover

C.

Automatic giveback

D.

Automatic takeover

Full Access
Question # 50

Which one of the following statements apply to the Free Space Estimator utility?

A.

This utility determines if there is sufficient space on the secondary volume to perform a transfer

B.

This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer

C.

This utility run automatically after each transfer

D.

This utility must be enabled on the secondary storage system

Full Access
Question # 51

What is the format for snapvault schedule?

A.

YYYY-MM-DD

B.

crontab format

C.

cnt[@day_list][@hour_list]

D.

List of dates in ISO Date format

Full Access
Question # 52

What two actions occur automatically if the system detects ransomware activity when Autonomous Ransomware Protection is enabled? (Choose two.)

A.

Block user access

B.

Email the administrators

C.

Create a new snapshot

D.

Offline the suspicious volume

Full Access
Question # 53

Which one of the following is not recommended asasecondary system forSnapVault?

A.

NearStoreR200

B.

FAS900 series

C.

F700 series

D.

FS80

Full Access
Question # 54

Which command parameter will result in a thin-provisioned LUN?

A.

-space-reservation disabled

B.

-space-guarancea none

C.

-space-allocation enabled

D.

-space-guarantee volume

Full Access
Question # 55

Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?

A.

snap restore-r

B.

snap restore-d

C.

snap restore-s

D.

snap restore-c

Full Access
Question # 56

Which one of the following /etc/snapmirror.conf entries will not support synchronous SnapMirror?

A.

FilerA:source_vol FilerB: destination_vol- sync

B.

FilerA: source_vol FilerB: destination_vol outstanding=3s sync

C.

FilerA: source_vol FilerB: destination_vol-0-55/5***

D.

FilerA: source_vol FilerB: destination_vol visibility_interval=1hr, outstanding=3ms, cksum=crc32 sync

Full Access