-
Realtests NS0-155 189q
Number: NS0-155Passing Score: 800Time Limit: 120 minFile
Version: 26.5
http://www.gratisexam.com/
Netapp NS0-155
Data ONTAP 7-Mode Administrator
I have correct many of questions answers. If there is any more
then update this vce and re-upload.
-
Exam A
QUESTION 1How can you "throttle" SnapValue updates and baseline
transfers so that the primary or secondary is not transmitting data
as it can?
A. Use the -k option in the snapvault start or snapshot modify
commands.B. SnapVault does not support throttling of network
throughout.C. Use the snapvault throttle command.D. Use the -k
option in the snapvault initialize command.
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_snapvault.1.html
The snapvault subcommands are:start [ -r ] [ -k n ] [ -t n ] [ -w ]
[-p {inet | inet6 unspec}] [ -o options ] [ -S
[primary_filer:]primary_path ] secondary_qtreemodify [ -k n ] [ -t
n ] [-p {inet | inet6 | unspec}] [ -o options ] [ -S
primary_filer:primary_path ] sec_ondary_qtree
The -k option sets the maximum speed at which data is
transferred in kilobytes per second. It is used to throttle disk,
CPU, and network usage. If this option is notset, the filer
transmits data as fast as it can. The setting applies to the
initial transfer as well as subsequent update transfers from the
primary.
QUESTION 2Node 1 in a clustered pair detects that it has lost
connectivity to one of its disk shelves. Node 1 is still up, but it
cannot see one of its disk shelves. However, thepartner node, Node
2, can see all of the Node 1's disk shelves. Which feature will
cause Node 2 to monitor this error condition for a period of three
minutes bydefault, and then forcibly take over Node 1 if the error
condition persists?
A. Auto enable of givebackB. Negotiated Fail OverC. Takeover on
panicD. Cf.quickloop.enable
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Real 2Netapp NS0-155 Exam
-
Explanation:http://www.wafl.co.uk/cf/http://wafl.co.uk/options/Negotiated
failover is a general facility which supports negotiated failover
on the basis of decisions made by various modules.
cf.takeover.on_disk_shelf_miscompareThis option allows
negotiated takeover to be enabled when the cluster nodes detect a
mismatch in disk shelf count. By default, this option is set to
off.
This option is available only when cluster is licensed and
changing the value on one filer automatically changes the value on
the partner filer.
QUESTION 3In Data ONTAP, the root user is exempt from those two
quotas: ______________. (Choose two)
A. User quotasB. Tree quotasC. Root quotasD. Group quotasE. File
quotas
Correct Answer: ADSection: (none)Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_quota.1.htmlUser
and group quotas do not apply to the root user or to the Windows
Administrator account; tree quotas, however, do apply even to root
and the WindowsAdministrator account.
QUESTION 4Which two Volume SnapMirror (VSM) relationship are
supported? (Choose two)
A. Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bitB. Data
ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bitC. Data ONTAP
7.3.2 32-bit --> Data ONTAP 8.1 64-bitD. Data ONTAP 7.3.2 32-bit
--> Data ONTAP 8.0.2 64-bit
Real 3Netapp NS0-155 Exam
-
Correct Answer: ACSection: (none)Explanation
Explanation/Reference:Explanation: Volume SnapMirror
Interoperability Matrix.
-
Reference: SnappMirror Async Overview and Best Practices
guide.
QUESTION 5An aggregate is composed of twelve 36-Gigabyte disks.
A drive fails and only 72-Gigabyte spare disks are available. Data
ONTAP will then perform what action.
http://www.gratisexam.com/
A. Chooses a 72-Gigabyte disk and use it as is.B. Chooses a
72-Gigabyte disk and right-size it.C. Halts after 24 hour of
running in degraded mode.D. Alerts you that there are no
36-Gigabyte disks and wait for one to be inserted.
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-8A91F6A2-61B8-42C3-
Real 4Netapp NS0-155 Exam
AEAB7D5AA9BBE9CF.html
If a disk fails and no hot spare disk that exactly matches the
failed disk is available, Data ONTAP uses the best available spare.
Understanding how Data ONTAPchooses an appropriate spare when there
is no matching spare enables you to optimize your spare allocation
for your environment.
Data ONTAP picks a non-matching hot spare based on the following
criteria (and more; in the link above):If the available hot spares
are not the correct size, Data ONTAP uses one that is the next size
up, if there is one.The replacement disk is downsized (aka right
sized) to match the size of the disk it is replacing; the extra
capacity is not available.
QUESTION 6Which statement is true about expanding an aggregate
from 32-bit to 64-bit in place?
-
A. All aggregates are automatically converted from 32-bit to
64-bit with the Data ONTAP 8.1 upgrade.B. The expansion is
triggered by an aggr convert command.C. The expansion is triggered
by adding disks to exceed 16 TB.D. The 32-bit aggregates are
degraded and must be Volume SnapMirrored to a new 64-bit aggregates
with Data ONTAP 8.1 upgrade.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html
To upgrade an aggregate in-place, the only available method is to
add disks to expand theaggregate to >16TB.
QUESTION 7What utility on the storage system will allow you to
capture network packet information?
A. SnoopB. Netstats
Real 5Netapp NS0-155 Exam
C. PkttD. Traceroute
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:The pktt command controls a
simple on-filer packet tracing facility. Packets can be captured
into a trace buffer then dumped to a file, or the captured data can
belogged to a file. The data is stored in "tcpdump" format, and can
be directly viewed with tcpdump, ethereal, and perhaps other
viewers. The output can also beconverted using the editcap(1)
program to a variety of other formats, including Sniffer, NetMon,
and snoop.
QUESTION 8The root admin on the UNIX box receives an "Access
Denied" message when he attempts to access a newly mounted qtree.
What's the most likely cause of thiserror?
-
A. The qtree is missing from the /etc/hosts file.B. NFS is
turned off on the storage system.C. The qtree is set to ntfs
security style.D. The qtree has not been exported.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-F6304830-B124-40A5-95D6-
C646AA85E9E0.html
Only hostnames and IPs are referenced in /etc/hosts, so A is
incorrect. The question states that the qtree was mounted, and B
and D would preclude this so theyare incorrect. You need to set a
qtree to mixed or unix security style to support UNIX users.
QUESTION 9Which two modes support using SnapMirror over multiple
network paths?
Real 6Netapp NS0-155 Exam
A. StandaloneB. PartnerC. MultiD. FailoverE. Give back
Correct Answer: CDSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-75BD4540-A103-4E2B-8B0A-
E6BBC0D3F43F.htmlhttp://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html
Two multipath methods are supported:
-
The multiplexing mode causes snapmirror to use both paths at the
same time. If one should fail, it will switch to use the remaining
path only and use both againshould the failing path be repaired.
Failover mode causes snapmirror to use the first path as the
desired path and only use the second path should problems arisewith
the first path.
QUESTION 10Identify the two commands that could be entered on
the SnapMirror destination storage system.(Choose two)
A. Options snapmirror.access onB. Options snapmirror.resync onC.
Snapmirror initializeD. Snap mirror resync
Correct Answer: CDSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
snapmirror initialize [ -S source ] [ -k kilobytes ] [ -s src_snap
] [ -ccreate_dest_snap ] [ -w ] destination Starts an initial
transfer over the network. An initial transfer is required before
update transfers can take place.
The initialize command must be issued on the destination node.
If the destination is a volume, it must be restricted (see
na_vol(1) for information on how to examineand restrict volumes).
If the destination is a qtree, it must not already exist (see
na_qtree(1) for information on how to list qtrees). If a qtree
already exists, it must berenamed or removed (using an NFS or CIFS
client), or snapmirror initialize to that qtree will not work.
Real 7Netapp NS0-155 Exam
snapmirror resync [ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [
-s src_snap ] [ -c create_dest_snap ] [ -w ] destination
Resynchronizes a broken-off destination to itsformer source,
putting the destination in the snapmirrored state and making it
ready for update transfers. The resync command must be issued on
the destinationnode.
QUESTION 11Which two operations can be performed with the
SnapDrive for windows graphical user interface?
A. Create volumeB. Create Snapshot copiesC. Create FileD. Create
Disk
-
Correct Answer: BDSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecm/ecm_download_file/ECMM1278920
What SnapDrive doesSnapDrive software integrates with the
Windows Volume Manager so that NetApp filers can serve as virtual
storage devices for application data in Windows 2000Server and
Windows Server 2003 environments.
SnapDrive is dependent on the virtual disk service. The virtual
disk service must be started on the host prior to installing
SnapDrive. SnapDrive manages virtualdisks (LUNs) on a NetApp filer,
making these virtual disks available as local disks on Windows
hosts. This allows Windows hosts to interact with the virtual
disksjust as if they belonged to a directly attached redundant
array of independent disks (RAID).
SnapDrive provides the following additional features:It enables
online storage configuration, virtual disk expansion, and
streamlined management. It integrates NetApp Snapshot technology,
which creates point-in-timeimages of data stored on virtual
disks.It works in conjunction with SnapMirror® software to
facilitate disaster recovery from either asynchronously or
synchronously mirrored destination volumes.
Real 8Netapp NS0-155 Exam
QUESTION 12Which storage system command would display the WWPNs
of hosts that have logged into storage system using a Fibre Channel
connection?
http://www.gratisexam.com/
A. fcp configB. fcp initiator showC. fcp show iD. fcp show
initiator
-
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html
fcp show initiator [ -v ] [ adapter ]If no adapter name is
given, information about all initiators connected to all adapters
are shown. The command displays the portname of initiators that are
currentlylogged in with the Fibre Channel target adapters. If the
portname is in an initiator group setup through the igroup command,
then the group name is also displayed.Similarly, all aliases set
with the fcp wwpn-alias command for the portname are displayed as
well.If the -v flag is given, the command displays the Fibre
Channel host address and the nodename/portname of the initiators as
well.
QUESTION 13In a Fiber Channel configuration, the host's HBA is
referred to as the ___________, and the storage system's HBA to as
the _____________.
A. Target, initiatorB. Primary, secondaryC. Initiator, targetD.
Secondary, primary
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 14Which action will cause a currently in-sync
SnapMirror relationship to fail out of sync?
Real 9Netapp NS0-155 Exam
A. Running snapmirroe update on the source storage system.B.
Running snapmirror release on the source storage system.C.
Modifying the /etc/snapmirror.conf file for the relationship on the
source storage systemD. Modifying the /etc/snapmirror.conf file for
the relationship on the destination storage system.
-
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html
snapmirror update [ -S source ] [ -k kilobytes ] [ -s src_snap ] [
-c create_dest_snap ] [ -w ] destinationFor asynchronous mirrors,
an update is immediately started from the source to the destination
to update the mirror with the contents of the source.
For synchronous mirrors, a snapshot is created on the source
volume which becomes visible to clients of the destination
volume.
The snapmirror update command must be issued on the destination
filer. snapmirror release source { filer:volume | filer:qtree }
Tell SnapMirror that a certain directmirror is no longer going to
request updates. If a certain destination is no longer going to
request updates, you must tell SnapMirror so that it will no longer
retain asnapshot for that destination. This command will remove
snapshots that are no longer needed for replication to that
destination, and can be used to clean upSnapMirror- created
snapshots after snapmirror break is issued on the destination
side.
The source argument is the source volume or qtree that the
destination is to be released from. The destination argument should
be either the destination filer anddestination volume name or the
destination filer and destination qtree path. You can use a line
from the output of the snapmirror destinations command as the set
ofarguments to this command. The /etc/snapmirror.conf file exists
on the node containing the mirror used for SnapMirror.
QUESTION 15You are trying to do a single file SnapRestore for a
file, but you are receiving an error message that the directory
structure no longer exists. Which is the most
likelyexplanation?
A. Once the directory structure has been deleted, you cannot
restore the file using single file SnapRestore. You must now
SnapRestore the volume.B. Snapshot copies have been created since
the original directory structure was deleted.C. You must recreate
the directory structure before trying to restore the file.
Real 10Netapp NS0-155 Exam
D. You cannot restore a file to an alternate location.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html
-
You can restore a file only to the volume where it was
originally located. The directory structure to which a file is to
be restored must be the same as that specified inthe path. If this
directory structure does not exist, you must create it before
restoring the file.
QUESTION 16Which mechanism allows you to make LUNs available to
some initiators and unavailable to others?
A. LUN maskingB. LUN groupingC. LUN cloningD. LUN hiding
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/Logical_Unit_Number_masking
Logical Unit Number Masking or LUN masking is an authorization
process that makes a Logical UnitNumber available to some hosts and
unavailable to other hosts.
QUESTION 17An iSCSI ______________ is established when the host
initiator logs into the iSCSI target. Within a ______________ you
can have one or more ____________.
A. session, session, connectionsB. connection, session,
connectionsC. connection, connection, sessionsD. session,
connection, sessions
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Real 11Netapp NS0-155 Exam
Explanation:http://scst.sourceforge.net/mc_s.htmlhttp://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf
-
Meme: Remember the acronym: MCS or MC/S - Multiple Connections
per Session. Microsoft Windows 2008's MPIO driver supports
MC/S.
QUESTION 18Which NetApp Virtual Storage Tier component works at
the host level?
A. Flash PoolB. Flash DiskC. Flash AccelD. Flash CacheE. Flash
IO
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3366.pdf&cc=us
Flash Accel utilizes server-based flash storage as cache for the
host.
QUESTION 19When using a Protection Manager policy to manage Open
systems SnapValut backups on a UNIX server, which three valid
objects to include in the data set?(Choose three)
A. The entire clientB. A directoryC. A fileD. A qtree
Correct Answer: ABCSection: (none)Explanation
Explanation/Reference:Explanation:
Real 12Netapp NS0-155 Exam
QUESTION 20
-
What does it signify if the disks are "not owned" in a FAS2020
system?
A. The disks are mailbox disks.B. The disks are spare disks.C.
The disks are data disks.D. The disks are not used.
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:Disks must be assigned to an
aggregate to be used as raid group members or spares.Unassigned
disks are displayed as "not owned".
Real 13Netapp NS0-155 Exam
QUESTION 21For each Open Systems platform directory to be backed
up to the SnapVault secondary storage
Real 14Netapp NS0-155 Examsystem you must execute
_____________.
A. An initial baseline copyB. A temporary copyC. An incremental
copyD. A scheduled update copy
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-EEBC8B52-BEA9-4B49-874F-
7EC78D3F602E.html
Each open systems platform, when prompted by the secondary
system, transfers initial base images of specified directories to
qtree locations on the secondary
-
system. Note: There are no primary-side Snapshot copies in Open
Systems SnapVault.
QUESTION 22What is the maximum distance between a standard
clustered pair at 2Bbps?
A. 100 metersB. 10 metersC. 50 metersD. 500 meters
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 23Which exportfs command will temporally export the
resource while ignoring the options specified in the /etc/exports
file?
A. exportfs v B. exportfs u C. exportfs a D. exportfs i
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Real 15Netapp NS0-155 Exam
Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_exportfs.1.html
exportfs [ -v ] [ -io options ] path -i Ignores the options
specified for a file systempath in the /etc/exports file. If you do
not specify the I option with the -o option, Data ONTAP uses the
options specified for the file system path in the /etc/ exportsfile
instead of the options you specify on the command line.
QUESTION 24Is NetApp storage Encryption supported in Data ONTAP
8.1.1 Cluster-Mode?
-
http://www.gratisexam.com/
A. No, but you can file a PVR to request support.B. No. it is
targeted for a future release of Data ONATP.C. Yes, only with a
special license installed.D. Yes, it has been supported since
8.0.1.
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:http://www.ntapgeek.com/2011/03/netapp-storage-encryption-available.html
March, 2011: "With the recent release of Data ONTAP 8.0.1, NetApp
now offers fulldisk encryption to prevent unauthorized access to
data at rest."
QUESTION 25Which two cp types would indicate a busy storage
system? (Choose two).
A. cp_from_log_fullB. cp_from_busyC. cp_from_cpD.
cp_from_timer
Correct Answer: ACSection: (none)Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html
http://redhunter.com/blog/2010/02/11/netapp-consistency-points-in-cacti/
cp_from_log_full (log full) - thecurrent NVRAM bank is full and the
system switches to the other one and starts writing this to disk.
Very heavy write activity.
-
Real 16Netapp NS0-155 Exam
cp_from_cp (aka Back to Back) - filer is overloaded. The write
traffic is coming in faster than it can be written and the filer is
running out of NVRAM capacity in onebank before the data in the
other bank can be written.
cp_from_busy is not a real cp typecp_from_timer - 10 seconds
since the last CP it means the system is pretty idle
write-wise.
QUESTION 26There are three phases of Non Disruptive Volume
Movement (NDVM). What is the correct sequence of these phases?
A. Setup Phase, Mirror Phase, Cutover PhaseB. Initialization
phase, Copy Phase, Migrate PhaseC. Begin Phase, Move Phase,
Complete PhaseD. Setup Phase, Data Copy Phase, Cutover Phase
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1-
17848/PDF_Tips_Data_Motion_0211.pdf
Non-disruptive Volume Movement is called DataMotion. DataMotion
uses SnapMirror for volume migration.A DataMotion migration occurs
in three phases:1. Setup2. Data copy3. Cutover
QUESTION 27Which statement describes the results of the
SnapMirror resynce command?
A. Resynchronization finds the newest common snapshot shared by
the two volumes or qtree, and removes all newer information on the
storage system on whichthe command is run.
B. Resynchronization will cause the loss of all data written to
the destination after the original base Real 17Netapp NS0-155
Examsnapshot was made.
-
C. Resynchronization will update the snapshot on the destination
filer.D. Resynchronization will update the snapshot on the source
filer.
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
snapmirror resync[ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [
-s src_snap ] [ -c create_dest_snap ] [ -w ]
destinationResynchronizes a broken-off destination to its former
source, putting the destination in the snapmirrored state and
making it ready for update transfers. The resynccommand must be
issued on the destination node.
The resync command can cause data loss on the destination.
Because it is effectively making destination a replica of the
source, any edits made to the destinationafter the break will be
undone.
For formerly mirrored volumes, the resync command effectively
performs a SnapRestore (see na_vol(1)) on the destination to the
newest snapshot which is common to both the source and the
destination. In most cases, this is the last snapshot transferred
from thesource to the destination, but it can be any snapshot which
is on both the source and destination due to SnapMirror
replication. If new data has been written to thedestination since
the newest common snapshot was created, that data will be lost
during the resync operation.
QUESTION 28If you were troubleshooting and wanted to look at
SnapMirror log files, what is the path to these files?
A. /vol/vol0/etc/log/snaplog/B. /vol/vol0/etc/snapmirror/C.
/vol/vol0/etc/snaplog/D. /vol/vol0/etc/log/
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
-
Real 18Netapp NS0-155 Exam
The root volume is always vol0 and etc is contained therein.
When exporting the root volume via NFS, the path is/vol/vol0; so
the full path to snapmirror log files is
/vol/vol0/etc/log./etc/log/snapmirror.
This file logs SnapMirror activity. Log file for current week.
/etc/log/snapmirror.[0-5] SnapMirror log files for previous
weeks.
QUESTION 29Host multi-pathing describes a ____________ solution
that has at least two distinct ______________ paths to a LUN.
A. Token ring, physicalB. FC SAN, virtualC. FC or IP SAN,
virtualD. FC or IP SAN, Physical
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/Multipath_I/OFiber
Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI
further encapsulate the transport within IP; hence the term IP
SAN.
In computer storage, multipath I/O is a fault-tolerance and
performance enhancement technique whereby there is more than one
physical path between the CPU ina computer system and its mass
storage devices through the buses, controllers, switches, and
bridge devices connecting them.
A simple example would be a SCSI disk connected to two SCSI
controllers on the same computer or a disk connected to two Fibre
Channel ports. Should onecontroller, port or switch fail, the
operating system can route I/O through the remaining controller
transparently to the application, with no changes visible to
theapplications, other than perhaps incremental latency.
QUESTION 30Which two will allow you to read and analyze a packet
trace file generated by the storage system? (Choose two)
Real 19Netapp NS0-155 Exam
A. WireShark
-
B. PkttC. NetmonD. Eternal View
Correct Answer: ACSection: (none)Explanation
Explanation/Reference:Explanation:pktt is part of the Data OnTap
command set.The output of pktt is not very human-readable, but it
utilizes the tcpdump format which many traffic analyzers can read
or import. Only two such analyzers havebeen offered here.
Wireshark is the successor of Etherreal, and available for
several platforms. Netmon is a Microsoft project, available for
Windows, soon to be deprecated by theMicrosoft Message Analyzer
project.
QUESTION 31How does the NetApp Remote Agent (RSA) connect to
NetApp Support?
A. NetApp Support initiates a non-secure connection to the
RSA.B. NetApp Support initiates a secure connection to the RSA.C.
The RSA initiates a secure connection to NetApp Support.D. The RSA
initiates a non-secure connection to NetApp support.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecm/ecm_download_file/ECMP1200040
Remote Support Agent is the facility to provide NetApp Support
Engineers with the ability to remotely trigger AutoSupport.
Remote Support Agent uses HTTP or HTTPS to communicate with the
storage controller to initiate commands and to collect files. It
uses HTTPS to send systemlogs and core files from the Data ONTAP
root volume to Remote Support Enterprise on the NetApp Support
side. NetApp RSA is not related to the RSA public keyencryption
algorithm.
QUESTION 32
-
Real 20Netapp NS0-155 ExamWhich two commands can be used to
enable LUN reservations? (Choose two)
A. lun set reservationB. lun reservation setC. lun mapD. lun
create
Correct Answer: ADSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun set reservation lun_path [ enable | disable ]Enables or
disables the space reservation on the LUN. If no arguments are
supplied after the lun_path, then the space reservation status of
the given lun_path isdisplayed. lun create -s size -t ostype [ -o
noreserve ] [ -e space_alloc ] lun_path This usage of the lun
create command should be employed to create a new LUN ofgiven size,
with initially zero contents. The LUN is created at the lun_path
given. No file should already exist at the given lun_path. The
directory specified in thelun_path must be a qtree root
directory.
The size is specified in bytes. Optionally, a number followed by
a one-character multiplier suffix can be used: c (1), w (2), b
(512), k (1024), m (k*k), g (k*m), t(m*m).
The size of the created LUN could be larger than the size
specified, in order to get an integral number of cylinders while
reporting the geometry using SANprotocols.
The size of the LUN actually created is reported if it is
different from that specified in the command.The mandatory ostype
argument is one of: solaris (the LUN will be used to store a
Solaris raw disk in a singleslice partition), windows (the LUN will
be used to storea raw disk device in a single- partition Windows
disk using the MBR (Master Boot Record) partitioning style), hpux
(the LUN will be used to store HP-UX data), aix(the LUN will be
used to store AIX data), vld (the LUN contains a SnapManager VLD),
linux (the LUN will be used to store a Linux raw disk without any
partitiontable), netware (the LUN will be used to store NetWare
data), vmware (the LUN will be used to store VMware data),
windows_gpt (the LUN will be used to storeWindows data using the
GPT (GUID Partition Type) partitioning style), windows_2008 (the
LUN will be used to store Windows data for Windows 2008
systems),openvms (the LUN will be used to store Open-VMS data), xen
(the LUN will be used to store Xen data), hyper_v (the LUN will be
used to store Hyper-V data),solaris_efi
By default, the LUN is space-reserved. To manage space usage
manually, -o noreserve can be specified.
Real 21
-
Netapp NS0-155 Exam
Using this option will create a LUN without any space being
reserved. Provisioning threshold events can be enabled by
specifying -e space_alloc option. This optionhas to be used in
conjunction with -o noreserve.
lun map [ -f ] lun_path initiator_group [ lun_id ]Maps a LUN to
all the initiators in the supplied group. If a LUN ID is not
specified, the smallest number that can be used for the various
initiators in the group isautomatically picked. Note that this
command can be used multiple times to configure multiple maps for a
LUN, or for an initiator group. Once created, you can uselun show
-m to list all the LUN mappings. The optional -f argument disables
checking with the HA partner for LUN mapping conflicts.
QUESTION 33Which Data ONTAP option sets system-wide for all
transfers?
A. Options transfers.wide.enableB. Options
transfer.throttle.enable.C. Option replication.wide.enableD.
Options replication.throttle.enable
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
replication.throttle.enable Enables global network throttling of
SnapMirror and SnapVault transfers.The default value for this
option is off.replication.throttle.incoming.max_kbsThis option
specifies the maximum total bandwidth used by all the incoming
(applied at destination) SnapMirror and SnapVault transfers,
specified in kilobytes/sec.The default value for this option is
unlimited, which means there is no limit on total bandwidth used.
This option is valid only when the
optionreplication.throttle.enable is on.
replication.throttle.outgoing.max_kbsThis option specifies the
maximum total bandwidth used by all the outgoing (applied at
source) SnapMirror and SnapVault transfers specified in
kilobytes/sec. Thedefault value for this option is unlimited, which
means there is no limit on total bandwidth used. This option is
valid only when the option replication.throttle.enable ison.
Real 22Netapp NS0-155 Exam
-
QUESTION 34What is the correct format for the scheduling
component of a SnapVault schedule?
A. cnt[@day_list][@hour_list]B. YYYY-MM-DDC. Crontable formatD.
List of dates in ISO Date format
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html
http://www.geekyfacts.com/index.php?option=com_content&view=article&id=64:snapvault
snapvault snap sched [ -f ] [ -x ] [ -o options ] [ volname [
snapname [ schedule ]]] schedule is cnt[@day_list][@hour_list] or
cnt[@hour_list][@day_list] In the schedule, cnt tells SnapVault how
many of the snapshots to keep for primaries and for non- SnapLock
secondaryvolumes. The snapshots will be numbered newest to oldest
from 0 to cnt-1. When creating a new snapshot, SnapVault will
delete the oldest snapshots, incrementby one the number on the
remaining snapshots and then create a new number 0 snapshot. If a
snapshot is missing from the sequence (e.g. sv.0, sv.1, and
sv.3exist but sv.2 does not), only snapshots that need to be
renumbered to make room for the new sv.0 snapshot will be
renumbered. In the example, sv.0 and sv.1would be renamed to sv.1
and sv.2, but sv.3 would remain unchanged.
The cnt in the schedule is interpreted differently for SnapVault
secondary SnapLock volumes. For SnapLock secondary volumes,
snapshots are created with aname that includes an encoded date and
time of when the snapshot is created. These snapshots are never
renamed and they are never automatically deleted.These snapshots
may be deleted using snap delete after the retention period of the
snapshot has expired. If cnt is 0, no snapshots will be taken. If
cnt is any non-zero value, snapshots will be taken and no snapshots
will be automatically deleted.
If specified, the day_list specifies which days of the week the
snapshot should be created. The day_list is a comma-separated list
of the first three letters of the day:mon, tue, wed, thu, fri, sat,
sun. The names are not case sensitive. Day ranges such as mon-fri
can also be given. The default day_list is mon-sun, i.e. every
day.
If specified, the hour_list specifies which hours of the day the
snapshot should be created, on each scheduled day. The hour_list is
a comma-separated list of thehours during the day, where hours are
integers from 0 to 23. Hour ranges such as 8-17 are allowed. Also,
step values are allowed in conjuction with ranges. Forexample,
0-23/2 means "every two hours". The default hour_list is 0, i.e.
midnight on the morning of each scheduled day.
Real 23Netapp NS0-155 Exam
QUESTION 35When will a Volume SnapMirror (VSM) from a 64-bit
source to a 32-bit destination volume fail?
-
http://www.gratisexam.com/
A. When the 64-bit volumes has Volume Guarantee disabledB. When
the 64-bit volume has compression enabledC. When the 64-bit volume
has FlexShare enabledD. When the 64-bit volume has ASIS enabled
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-87340429-8F4A-4AA6-B081-
0F5040089C78.htmlData compression requires 64-bit aggregates.
QUESTION 36UNIX allows file access based on___________.
A. NT ACLs and UNIX permissions.B. NT ACLs and SID.C. GID or UID
and UNIX permissions.D. GID or UID and ACLs.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
-
In OnTap 8.0, when UNIX security style is selected, only UNIX
security objects can be used. The correct answer is GID, UID and
UNIX permissions.
Basic UNIX permissions are organized into three classes: user,
group, and others. UNIX operating systems identify users with a
numerical value: a user identifier,also known as a UID or User ID.
Each user is a member of a group of the same name as the user. Like
UIDs, groups (GIDs) are also specified using a numericalvalue.
Real 24Netapp NS0-155 Exam
QUESTION 37Which NetApp Storage Tier component works
controller-wide on a FAS controller?
A. Flash PoolB. Flash DiskC. Flash AccelD. Flash CacheE. Flash
IO
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us
http://www.netapp.com/us/products/storage-systems/flash-
cache/index.aspx?ref_source=ntp141p359372brg-c-26967a63-442e-c7e9-6a73-
00002efa4dd6&gclid=CLLdsqWKrbkCFS4aOgodb1AAuA
Flash Cache is a controller-attached PCIe intelligent caching
solution.Flash Accel is a host-attached caching solution.Flash Pool
utilizes SSDs to enhance performance of disk aggregates (implicitly
not controller- wide).Flash Disk and Flash IO are ambiguous
terms.
QUESTION 38Which NetApp Storage Tier component works
aggregate-wide on a FAS controller?
A. Flash PoolB. Flash DiskC. Flash CacheD. Flash Accel
-
E. Flash IO
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us
Real 25Netapp NS0-155 Exam
http://www.netapp.com/us/products/platform-os/flashpool.aspx
Flash Pool utilizes SSDs to enhance performance of disk aggregates.
Flash Cache is a controller-attached PCIe intelligent caching
solution.Flash Accel is a host-attached caching solution.Flash Disk
and Flash IO are ambiguous terms.
QUESTION 39What are two methods of protecting LUN overwrites
using Snapshot copies on a volume with fractional reserve set to
0%? (Choose two)
A. Snap AutodeleteB. iGroup throttleC. LUN resetD. Volume
AutoSize
Correct Answer: ADSection: (none)Explanation
Explanation/Reference:Explanation:https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional-
reservation--lunoverwrite
From the article:"If you reduce the Fractional Reservation to 0,
you need to make sure the rate of change is within the volume size,
or you need to make sure the volume can auto-grow when required or
even snap auto-delete to reduce the reserved blocks and free up
space (although I am not a huge fan of snap auto-delete for
variousreasons)."
QUESTION 40Which set of protocols provide block-level access to
NetApp storage?
-
A. SNA and RPCB. iSCSI and FCPC. HTTP and FTPD. CIFS and NFS
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Real 26Netapp NS0-155 Exam
Explanation:iSCSI and Fiber Channel encapsulate SCSI protocol,
simulating direct disk access. These are commonly referred to as a
block storage protocols. FCoE is anothersuch protocol. CIFS and
NFS, HTTP and FTP provide file access not block access.
QUESTION 41An iSCSI or FC SAN implementation provides
____________ access to LUNs.
A. VLDB. VIIPC. FileD. Block
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:iSCSI and Fiber Channel
encapsulate SCSI protocol, simulating direct disk access. These are
commonly referred to as a block storage protocols. FCoE is
anothersuch protocol. CIFS and NFS, HTTP and FTP provide file
access not block access.
QUESTION 42Which command on the storage system allows you to
display statistics on the performance of system resource such as
CPU, NVRAM, network interfaces, anddisks?
-
A. netstatB. netdiagC. pkttD. sysstat
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html
sysstat reports aggregated filer performance statistics such as the
current CPUutilization, the amount of network I/O, the amount of
disk I/O, and the amount of tape I/O.
Real 27Netapp NS0-155 Exam
QUESTION 43Which three protocols can coexist on a NetApp storage
system? (Choose three)
A. DAFSB. CIFSC. DFSD. FCPE. NFS
Correct Answer: BDESection: (none)Explanation
Explanation/Reference:Explanation:Data OnTap can simultaneously
serve NAS and SAN protocols. CIFS, NFS, and FC protocol are
examples of NAS and SAN protocols respectively.
Data OnTap 7.1 or later does not support DAFS.DFS provides
location transparency and redundancy by allowing shares in multiple
different locations to be logically grouped under one folder, or
DFS root. Whilepractically a CIFS server shared by a Data OnTap
filer can be a DFS target, DFS namespaces can only be hosted on
Windows systems.
QUESTION 44
-
Which three tools present statistics from the Data ONTAP counter
manager? (Choose three)
A. Operations managerB. Window perfmonC. SysstatD. Stats
Correct Answer: ABDSection: (none)Explanation
Explanation/Reference:Explanation: Section: OnTap
AdministrationExplanation
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html
https://communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5-34635/TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performance-
Real 28Netapp NS0-155 Exam
stats-withoutperfstat-or-ops-mgr
Note in the diagram below how the performance tools integration
with Data OnTap. statit and sysstat interface directly with the
performance counters while the othertools - including stats, a
command line tool -integrate with the Counter Manager.
-
QUESTION 45What security mechanism can an administrator use on
an OSSV client to use permissions allowing backup to a SnapVault
secondary system?
A. MD5 authentication between SnapVault primary and secondary,
with changeable passwordB. Contents inside file called access and
located in OSSV /snapvault/etcC. QSM access list modifiable via
svconfiguratorD. Via /etc/hosts.equiv file
Correct Answer: CSection: (none)Explanation
Explanation/Reference:
-
Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf
In order to restrict the NetApp secondary systems that are
allowedto initiate backups from an OSSV host, the QSM Access List
field can be populated with the hostname of the secondary using the
OSSV Configurator utility. Whenusing this option, make sure the
"Check QSM Access List" box is enabled.
Real 29Netapp NS0-155 Exam
The snapvault.access option on the NetApp secondary can be used
to restrict the OSSV hosts that are allowed to initiate restores
from that secondary system. Thisoption can be populated with a list
of hostnames for each OSSV host. For example:options
snapvault.access host=ossv1,ossv2,ossv3Screenshot of the
svconfigurator GUI; note the QSM access list checkbox and
field.
-
QUESTION 46Which command disables client access to Snapshot
copies on a volume called flexvoll?
A. cifs shares change flxvoll nosnap
-
B. snap access flexvoll offC. vol options flexvoll nonsnapdir
onD. vol options flexvoll snapdir offE. vol options flexvoll
snapdir on
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html
vol options nosnapdir [on|off]If this option is on, it disables the
visible .snapshot directory that is normally present at client
Real 30Netapp NS0-155 Exam
mount points, and turns off access to all other .snapshot
directories in the volume. The default setting is off.
QUESTION 47When using MetroCluster in a forced takeover mode,
identify two methods for restricting access to the disaster site
node. (Choose two)
A. Use manual fencingB. Use the cf giveback f command.C. Use the
cf forcetakeover d command.D. Turn off power to the disaster site
node.E. Isolate the failed node from the surviving node.
Correct Answer: ADSection: (none)Explanation
Explanation/Reference:Explanation:http://vipulvajpayeestorage.blogspot.com/2012/01/manually-failover-activity-in-netapp.html
In order to test or effect a Disaster Recovery operation, you
must restrict access to the disaster site node to prevent the node
from resuming service. If you do not,you risk the possibility of
data corruption.
Access to the disaster site note can be restricted in the
following ways:
-
Turn off the power to the disaster site node Use "manual
fencing" (Disconnect VI interconnects and fiber channel cables;
either physically or through configurationchanges on the fabric
switches.)Isolating the failed node from the surviving node could
still lead to the possibility of a split brain, so this is not a
correct answer.
QUESTION 48The two copies SyncMirror volume are called
____________, which are physical copies of the same file system and
consist of one or more RAID groups.
A. Snapshot copiesB. AggregatesC. Plexes
Real 31Netapp NS0-155 Exam
D. Volumes
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA-
8FEE619EEF1D.html
SyncMirror is a feature of Data OnTap used to mirror data to two
separate aggregates. It allows for real-time mirroring of data to
matching aggregates physicallyconnected to the same storage
system.SyncMirror provides for synchronous mirroring of data,
implemented at the RAID level. You can use SyncMirror to create
aggregates that consist of two copies ofthe same WAFL file system.
The two copies, known as plexes, are simultaneously updated.
Therefore, the copies are always identical. The two plexes are
directlyconnected to the same system.
The following provides information about the activities of
SyncMirror:SyncMirror can be used to mirror aggregates and
traditional volumes. (A traditional volume is essentially an
aggregate with a single volume that spans the entireaggregate.)
SyncMirror cannot be used to mirror FlexVol volumes. However,
FlexVol volumes can be mirrored as part of an aggregate.SyncMirror
is different from synchronous SnapMirror.
QUESTION 49You want to create an automated test environment that
performs a single file SnapRestore time you run the procedure,
however, SnapRestore prompts you toconfirm your decision to revert
the file. How can you automate this step?
A. Use the -f option with the snap restore command.B. Enable the
options snaprestore_noprompts enable = on option.C. These prompts
are for data protection and auditing and cannot be overridden.
-
D. Enter the priv set advanced mode on the storage system and
prompt will not appear.
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snap.1.html
snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r
restore_as_path ]
Real 32Netapp NS0-155 Exam
vol_name | restore_from_pathReverts a volume to a specified
Snapshot copy, or reverts a single file to a revision from a
specified Snapshot copy.Before reverting the volume or file, the
user is requested to confirm the operation. The -f option
suppresses this confirmation step.
QUESTION 50When viewing the output of the sysstat f command,
which three fields are part of the output? (Choose three)
A. FCPB. FTPC. CIFSD. NFSE. iSCSI
Correct Answer: ACDSection: (none)Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html
sysstat [ -c count ] [ -s ] [ -u | -x | -m | -f | -i | -b ] [ -d
] [ interval ] -f For the default format display FCP statistics.The
FCP default output format is as follows:CPU NFS CIFS FCP Net kB/s
Disk kB/s FCP kB/s Cachein out read write in out age
-
###% ##### ##### ##### ##### ##### ##### ##### ##### #####
>##
QUESTION 51Five minutes ago, you performed a single file
SnapRestore on a large NFS file. 40% of your NFS users are now
complaining about getting "stale file handles" for thefile. Which
is the most likely cause of this problem, and the best procedure to
correct it?
A. This might be due to an NFS storage system and client
mismatch. Check to see that these users have the same version of
the NFS client that existed at thetime the snapshot was taken.Real
33Netapp NS0-155 Exam
B. NFS users why try to access a reverted file without first
reopening it might get a "stale file handle" error message. Have
the users try to reopen the file and see ifthe problem is
resolved.
C. After a single file SnapRestore, NFS users have to reboot
their systems. Have them reboot their systems.D. These users are on
a different subnet from the others. Start troubleshooting by
checking their subnet.
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html
Reverting a file to a selected Snapshot copyUsing snap restore
to revert a single file to a selected Snapshot copy is practical
when the file is so large that you cannot copy the previous file
version from theSnapshot copy to the active file system.Before you
begin Ensure that you notify the network users before reverting a
file so that they know that the current data in the file will be
replaced by that of theselected Snapshot copy.
Note: NFS users who try to access a reverted file without first
reopening it might get a stale file handle error message after the
volume reversion.
QUESTION 52Using the output below, a co-worker determined that
these are types "Solaris" LUNs. What would your destination be?
lun show m LUN patch mapped to LUN ID
-------------------------------------------------------
/vol/vol1/lun0 solaris igroup0 0 /vol/vol1/lun solaris-
igroup1
0 /vol/vol1/qtree1/lun2 solaris igroup2 0 /vol/vol1/qtree1/lun3
solaris igroup3 0
A. These are type "Solaris" LUNs.
-
B. Not enough information is given here. Run the lun status
command to get the information requested.C. Not enough information
is given here. Run the lun show v command to get the information
requested.D. Not enough information is given here. Run the lun map
command to get the information Real 34
Netapp NS0-155 Examrequested.
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 53Which statement is true about ASIS deduplication
license with Data ONTAP 8.1?
A. The existing 8.0 license key is used.B. A new license key is
generated.C. The license is capacity-based.D. The license no longer
exists.
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1120690/html/frameset.html
Changes to deduplication in 8.1 7-modeStarting with Data ONTAP
8.1, you can enable the deduplication feature without adding a
license.Fordeduplication, no limit is imposed on the supported
maximum volume size. The maximum volume size limit is determined by
the type of storage system regardlessof whether deduplication is
enabled.
QUESTION 54Which MetroCluster configuration procedure is
recommended for re-establishing a mirrored volume that was in a
level-0 resynchronization state when it failed?
A. Determine which volumes are at the remote and disaster
sites.
-
B. Re-create the synchronous mirror.C. Rejoin the two volumes.D.
Turn on power to the cluster node at the disaster site.
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1210206/html/GUID-A865DB95-9418-4ED2-A993-
Real 35Netapp NS0-155 Exam
74F347F674A0.html
1. Validate that you can access the remote storage by entering
the following command:aggr status -rNote: A (level-0 resync in
progress) message indicates that a plex cannot be rejoined.
2. Turn on the power to the node at the disaster site. After the
node at the disaster site boots up, it displays the
following:Waiting for giveback...(Press Ctrl-C to abort wait)
3. If the aggregates at the disaster site are online, take them
offline by entering the following command for each aggregate that
was split:aggr offline disaster_aggrdisaster_aggr is the name of
the aggregate at the disaster site. Note: An error message appears
if the aggregate is already offline.
4. Destroy every target plex that is in a level-0 resync state
by entering the following command:aggr destroy plex_name
5. Re-create the mirrored aggregates by entering the following
command for each aggregate that was split:aggr mirror aggr_name -v
disaster_aggraggr_name is the aggregate on the surviving site's
node. disaster_aggr is the aggregate on the disaster site's node.
The aggr_name aggregate rejoins thedisaster_aggr aggregate to
reestablish the MetroCluster configuration.
6. Enter the following command at the partner node:cf
givebackThe node at the disaster site reboots.
QUESTION 55
-
When running deduplication on SnapVault destinations, which
three statements are true?
A. The target SnapVault controller deduplicates inline.B. The
source SnapVault data is deduplicated inline on the target before
it is written to disk.C. Deduplication internally synchronizes with
the SnapVault schedule on the destination.D. The source (primary)
system sends duplicated data even if the source data is
deduplicated.
Real 36Netapp NS0-155 Exam
E. Deduplication with SnapVault creates a snapshot,
deduplicates, then deletes and recreates the snapshot to
effectively deduplicate savings.
Correct Answer: CDESection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-E5AD37DE-2F44-47DB-90A3-
C8E115FCBFB7.htmlSnapVault replicates at the file level not the
block level. Deduplication is always a post-processed activity for
Data OnTap, while compression is an inline process.The
deduplication schedule depends on the SnapVault update schedule on
the destination system.A new Snapshot copy replaces the archival
Snapshot copy after deduplication finishes running on the
destination system. (The name of this new Snapshot copy isthe same
as that of the archival copy, but the Snapshot copy uses a new
timestamp, which is the creation time.) The SnapVault update
recognizes the deduplicatedblocks as changed blocks. Thus, when
deduplication is run on an existing SnapVault source for the first
time, all saved space is transferred to the destinationsystem.
QUESTION 56If you believe you create FC SAN performance problem,
which NatApp utility would gather both your Solaris host and
storage system data for analysis?
A. sio_ntap.exeB. prestartC. poststatD. perfstat
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://communities.netapp.com/docs/DOC-1059
-
Performance and Statistics Collector (perfstat) is a data
collection tool with several key properties:
Perfstat comes in exactly two flavors:
Supported platforms:
Real 37Netapp NS0-155 Exam
QUESTION 57Which three /etc/snapmirror.conf entries will support
synchronous or semi-synchronous SnapMirror?
A. FilerA:source_vol FilerB:destination_vol visibility_interval
= lhr, outstanding = 3ms, cksum=crc32 synsB. FilerA:source_vol
FilerB:destination_vol 0-55/5 * * *C. FilerA:source_vol
FilerB:destination_vol syncD. FilerA:source_vol
FilerB:destination_vol outstanding=3s sync
Correct Answer: ACDSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html
Each relationship entry of the /etc/snapmirror.conf file is a
single linecontaining space-separated fields.The entry has this
format:Source destination arguments schedule scheduleThis is the
schedule used by the destination node for updating the mirror. It
informs the SnapMirror scheduler when transfers will be initiated.
The schedule field cancontain the word sync to specify fully
synchronous mirroring, semi-sync to specify semi-synchronous
mirroring, or a cron-style specification of when to update
themirror.
visibility_intervalThe value for this argument is a number
optionally followed by the suffixes: s (seconds), m (minutes) or h
(hours). If a suffix is not specified, value is interpreted
asseconds. This argument controls the amount of time before an
automatic snapshot is created on the source volume that is
synchronously mirrored. The value is thenumber of seconds between
automatically created snapshots. The default value is 3 minutes. A
small number here can negatively affect the performance of
themirror. This argument is ignored for asynchronous mirrors.
Outstanding (deprecated)This argument controls the performance
versus synchronicity trade-off for synchronous mirrors. The value
for this argument is a number followed by the suffixes:ops
(operations), ms (milliseconds) or s (seconds). Setting a value
less than 10s configures the mirror to run in fully synchronous
mode. Setting a value greater than
-
or equal to 10s configures the mirror to run in semi-synchronous
mode. This argument is ignored for asynchronous mirrors. Please
note that this is a deprecatedoption. Use the schedule field to
specify the synchronous mode for the mirror.
cksum
Real 38Netapp NS0-155 Exam
This controls which checksum algorithm is used to protect the
data transmitted by SnapMirror. Currently supported values are
"none", "crc32c", and"crc32c_header_only". The value
"crc32c_header_only" has been added only for volume SnapMirror and
is not supported for synchronous SnapMirror and
qtreeSnapMirror.
QUESTION 58Which three are valid LUN commands? (Choose
three)
A. lun cloneB. lun copyC. lun moveD. lun renameE. lun snap
Correct Answer: ACESection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:
-
QUESTION 59Which three attributes would you specify when
creating a LUN? (Choose three)
http://www.gratisexam.com/
A. The host operating system of the system attached to LUN.B.
The version of Data ONTAPC. The size of the LUN.D. The path to the
LUN.
Correct Answer: ACDSection: (none)Explanation
Explanation/Reference:Real 39Netapp NS0-155 Exam
Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The usage for lun create is shown below. Options not in brackets
are mandatory. lun create -s size -t ostype [ -o noreserve ] [ -e
space_alloc ] lun_path This usageof the lun create command should
be employed to create a new LUN of given size, with initially zero
contents. The LUN is created at the lun_path given. No fileshould
already exist at the given lun_path. The directory specified in the
lun_path must be a qtree root directory.
The size is specified in bytes. Optionally, a number followed by
a one-character multiplier suffix can be used: c (1), w (2), b
(512), k (1024), m (k*k), g (k*m), t(m*m). The size of the created
LUN could be larger than the size specified, in order to get an
integral number of cylinders while reporting the geometry using
SANprotocols.
The size of the LUN actually created is reported if it is
different from that specified in the command.The mandatory ostype
argument is one of: solaris (the LUN will be used to store a
Solaris raw disk in a singleslice partition), windows (the LUN will
be used to storea raw disk device in a single- partition Windows
disk using the MBR (Master Boot Record) partitioning style), hpux
(the LUN will be used to store HP-UX data), aix(the LUN will be
used to store AIX data), vld (the LUN contains a SnapManager VLD),
linux (the LUN will be used to store a Linux raw disk without any
partitiontable), netware (the LUN will be used to store NetWare
data), vmware (the LUN will be used to store VMware data),
windows_gpt (the LUN will be used to store
-
Windows data using the GPT (GUID Partition Type) partitioning
style), windows_2008 (the LUN will be used to store Windows data
for Windows 2008 systems),openvms (the LUN will be used to store
Open-VMS data), xen (the LUN will be used to store Xen data),
hyper_v (the LUN will be used to store Hyper-V data),solaris_efi
(the LUN will be used to store Solaris_EFI data).
By default, the LUN is space-reserved. To manage space usage
manually, -o noreserve can be specified.Using this option will
create a LUN without any space being reserved. Provisioning
threshold events can be enabled by specifying -e space_alloc
option. This optionhas to be used in conjunction with -o
noreserve.
QUESTION 60Which three items are NFS resources for export?
(Choose three.)
A. aggregateReal 40Netapp NS0-155 Exam
B. directory/qtreeC. fileD. subnetE. volume
Correct Answer: BCESection: (none)Explanation
Explanation/Reference:Explanation:You can export any file path.
Implicitly file paths are filesystem objects. You can export a
directory, a qtree, a volume or even a file.
QUESTION 61Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows
Vista and Windows Server 2008.
A. TrueB. False
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3740.pdf&cc=us
-
SMB 2.0 support was included in Data OnTap 8.1.
QUESTION 62In a tape environment after a SnapRestore reversion
of a volume, incremental backup and restore operations on the file
or volume cannot rely on the timestamps todetermine what data needs
to be backed up or restored. Which course of action ensures correct
incremental backups?
A. Perform a base-level backup of the volume after you restore
it.B. Reboot the storage system to reset timestamps back to their
original times before the reversion.C. Take a new snapshot of the
volume to create new base-level timestamps for the incremental
backup.D. Take a new snapshot of the volume to create new
base-level timestamps for the incremental backup, and then perform
a base-level backup of the volume after
you restore it.
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:
Real 41Netapp NS0-155 Exam
A baseline (aka "full") backup is always required before valid
incremental backups can be made.
QUESTION 63Which changes the NDMP password on the Open System
SnapVault agent?
A. passwordB. password C. svpasswd D. svpassword
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://kb.netapp.com/support/index?
-
Page=content&id=2010134&actp=LIST_RECENT&viewlocale=en_US&searchid=1296570465177
The svpassword command is available on the OSSV host as partof the
agent binaries in the path \netapp\snapvault\bin.
QUESTION 64Which three licenses are required for fabric-attached
MetroCluster? (Choose three.)
A. ClusterB. Cluster_remoteC. Syncmirror_localD.
Syncmirror_fabricE. Syncmirror_remote
Correct Answer: ABCSection: (none)Explanation
Explanation/Reference:Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
http://backdrift.org/man/netapp/man1/na_license.1.html
Inpreparation for a fabric attached metrocluster configuration, the
following licenses must be installed:Cluster syncmirror
_localcluster_remotesyncmirror_fabric and syncmirror_remote are not
valid license types.
Real 42Netapp NS0-155 Exam
QUESTION 65Which are three characteristics of an iSCSI or FCP
SAN implementation? (Choose three.)
A. A LUN can be converted into a VLD.B. LUNs can be accessed
using the FCP protocol.C. LUNs can be accessed using the iSCSI
protocol.D. Block services are associated with an iSCSI or FCP SAN
environment.
Correct Answer: BCDSection: (none)Explanation
-
Explanation/Reference:Explanation:Sadly, you cannot convert a
LUN into a Vulcan Language Dictionary.
QUESTION 66To determine the version of Data ONTAP in which a bug
has been fixed, use the NOW site _______ utility. (Choose two.)
A. AutoSupportB. Bugs OnlineC. NetApp DiagnosticsD. Release
ComparisonE. System Configuration Guide
Correct Answer: BDSection: (none)Explanation
Explanation/Reference:Explanation:This question is out of date,
but its still on the exam as of Sept2013! NOW has been replaced
with support.netapp.com.
You should be very familiar with what AutoSupport does. Also if
you have done any research, you know that the System Configuration
Guide is an invaluable toolthat you will use regularly. Neither of
those are related to bugs.
Bugs Online (BOL) is located at
http://support.netapp.com/NOW/cgi-bin/bol/ Bugs Online provides a
suite of tools to help manage and resolve your bug issues.
Real 43Netapp NS0-155 Exam
The Release Bug Advisor is located
athttp://support.netapp.com/NOW/cgi-bin/relrec
There is also a Version Comparison tool available
athttps://communities.netapp.com/docs/DOC-8168/diff?secondVersionNumber=8
QUESTION 67Which two commands on the storage system allow you to
gather detailed statistics about network interfaces, including
basic information about networkconnections? (Choose two.)
A. ifstat -a
-
B. netdiag -nC. netstat -iD. sysstat 1
Correct Answer: ACSection: (none)Explanation
Explanation/Reference:Explanation:ifstat -a provides detailed
statistics (multiple pages) about all network interfaces. netstat
-i provides a list of connections and open network sockets
(listeners).netdiag -n will perform a diagnostic but does not
provide detailed statistics about networking. sysstat 1 will
provide performance statistics but not detailed statisticsabout
networking.
QUESTION 68To configure a storage system as a member of a
Windows active directory domain, the time on the storage system
must be set to be within plus or minus fiveminutes of the time on
the domain controller.
A. TrueB. False
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:
Real 44Netapp NS0-155 Exam
QUESTION 69For automatic user name mapping to occur for a CIFS
and UNIX user name that are the same, you must do what?
A. Enter the CIFS user in the NIS database.B. Enter the user
names in the /etc/hosts.equiv file.C. Use both a NIS server and a
Domain Controller in the network.D. Nothing: mapping will occur if
user name authentication is available.
-
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html
If the user names in the UNIX password database are identical to
the Windows names, you need not provide the mapping information in
the /etc/usermap.cfg file.
QUESTION 70If the security style is set to UNIX, CIFS client
file access is determined by ___________.
A. NT ACLsB. the last client to set permissionsC. the mapped
UNIX UID/GID of the CIFS client and the UNIX file permissionsD.
This is not allowed: A CIFS client cannot access files in a path
set to a security style of UNIX
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html
For Data ONTAP to obtain the UID and GIDs for a CIFS user, it
must first determine the user's UNIX-style name. It does this
through user mapping.
QUESTION 71NTFS allows file access based on ___________.
Real 45Netapp NS0-155 Exam
A. NT ACLs and SID.B. NT ACLs and UNIX permissions.C. SID and
password.D. UNIX permissions.
Correct Answer: A
-
Section: (none)Explanation
Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
In OnTap 8.0, when NTFS security style is used, only Windows
style security objects are used. For CIFS clients, security is
handled using Windows NTFS ACLs.For NFS clients, the NFS UID (user
id) is mapped to a Windows SID (security identifier) and its
associated groups. Those mapped credentials are used todetermine
file access, based on the NFTS ACL.
QUESTION 72UNIX allows file access based on __________.
A. GID or UID and ACLs.B. GID or UID and UNIX permissions.C. NT
ACLs and SID.D. NT ACLs and UNIX permissions.
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:
* Unix-like operating systems identify users within the kernel
by an unsigned integer value called a user identifier, often
abbreviated to UID or User ID. The range ofUID values varies
amongst different systems; at the very least, a UID represents a
15-bit integer, ranging between 0 and
The UID value references users in the /etc/passwd file. Shadow
password files and Network Information Service also refer to
numeric UIDs. The user identifier hasbecome a necessary component
of Unix file systems and processes.
* In POSIX-compliant environments the command-line command id
gives the user's user identifier number as well as more information
on the user account like theuser name, primary user group and group
identifier (GID).
Real 46Netapp NS0-155 Exam
* Files and directories are owned by a user. The owner
determines the file's owner class. Distinct permissions apply to
the owner.Files and directories are assigned a group, which define
the file's group class. Distinct permissions apply to members of
the file's group members. The owner maybe a member of the file's
group. Users who are not the owner, nor a member of the group,
comprise a file's others class. Distinct permissions apply to
others.
-
The effective permissions are determined based on the user's
class. For example, the user who is the owner of the file will have
the permissions given to the ownerclass regardless of the
permissions assigned to the group class or others class.
QUESTION 73Executing this command will have what effect?
Options wafl.default_security_style ntfs
A. It will set the security style of all files to be ntfs.B. It
will change the security style of all qtrees to be ntfs.C. It will
change the security style of all existing volumes to be ntfs.D. It
will set the security style of all newly created volumes to
ntfs.
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
wafl.default_security_styleSpecifies the default security style
assigned to a new volume. All qtrees created on the volume get this
as their security style. Legal values for this option are
`unix',`ntfs', or `mixed'. The default value for this option is
`unix', unless the node is an NTFS-only node, in which case the
default is `ntfs'.Note: if cifs setup is run after setting
wafl.default_security_style, the filer will become an NTFS security
style filer.
QUESTION 74Which two statements apply to an entry in the
/etc/exports file regarding exporting
Real 47Netapp NS0-155 Examdirectories/qtrees and volumes?
(Choose two.)
A. Each volume must be exported separately.B. Exports are
accessible only to hosts with names.C. User names used in an export
must be resolvable.D. Exports can access multiple paths on the same
volume.
Correct Answer: ADSection: (none)
-
Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html
IP addresses and wildcards can be used when specifying host
targets in exports. User names are not valid exports options, save
for the anon option which utilizes alocal system UID or user name
(i.e. no user name mapping or resolution is performed.) The highest
level in the filesystem that can be specified for an export is
thevolume level. Implicitly this means that each volume must be
exported separately. An export provides access to paths below the
export, implying that multiple pathson the same volume can be
exported from an export.
QUESTION 75To automatically export volumes and directories on
storage system reboot, include them in the /etc/exports file.
A. TrueB. False
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html
The /etc/exports file contains a list of export entries for all
file system paths that Data ONTAP exports automatically when NFS
starts up.
QUESTION 76Which exportfs command will temporarily export the
resource while ignoring the options specified
Real 48Netapp NS0-155 Examin the /etc/exports file?
A. exportfs -aB. exportfs -iC. exportfs -uD. exportfs -v
Correct Answer: B
-
Section: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 77Which two are Data ONTAP commands for displaying
performance information? (Choose two.)
A. nfsstatB. perfstatC. sio_ntap_sollD. sysstat
Correct Answer: ADSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html
nfsstat and sysstat are OnTap commands used for performance
information.sio_ntap_soll is not an OnTap command.
Perfstat is a GUI performance tool, not an OnTap command. Think
of PerfMon for Windows to remind you that PerfStat is a Windows
tool. Note how many of theONTAP performance commands end in
stat.
QUESTION 78Which statement best describes the output of this
command? sysstat -s 5
A. Display the default output every five seconds and terminate
after five counts.B. Display extended output every five seconds and
print a summary after five counts.C. Display extended output every
five seconds and print a summary upon termination.
Real 49Netapp NS0-155 Exam
D. Display the default output every five seconds and print a
summary upon termination.
Correct Answer: DSection: (none)
-
Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html
-sDisplay a summary of the output columns upon termination,
descriptive columns such as `CP ty' will not have summaries
printed. Note that, with the exception of`Cache hit', the `Avg'
summary for percentage values is an average of percentages, not a
true mean of the underlying data. The `Avg' is only intended as a
grossindicator of performance. For more detailed information use
tools such as na_nfsstat, na_netstat, or statit.
QUESTION 79To collect per client NFS statistics on a storage
system, the option nfs.per_client_stats.enable must be set on.
A. TrueB. False
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
nfs.per_client_stats.enableEnables/disables the collection and
display of perclient NFS statistics, as described in na_nfsstat(1).
Valid values for this option are on or off. The default value
forthis option is off.
QUESTION 80Which two are Data ONTAP commands for creating LUNs
on a storage system? (Choose two.)
A. lun createB. lun configC. lun makeD. lun setup
Real 50Netapp NS0-155 Exam
Correct Answer: ADSection: (none)Explanation
-
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:
Easy to use interactive mechanism for setting up initiator
groups, LUNs, and mapping configuration.
QUESTION 81In a Fibre Channel configuration, the host's HBA is
referred to as the ___________, and the storage system's HBA is
referred to as the __________ .
A. initiator, targetB. primary, secondaryC. secondary, primaryD.
target, initiator
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/SCSI_initiator_and_target
QUESTION 82Before running lun setup on the storage system, you
must first create the igroup to which the initiator will be
attached.
-
A. TrueB. False
Real 51Netapp NS0-155 Exam
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun setupEasy to use interactive mechanism for setting up
initiator groups, LUNs, and mapping configuration.
QUESTION 83These are three methods of creating a LUN:
* lun create
* lun map
* lun setup
A. TrueB. False
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:
-
Easy to use interactive mechanism for setting up initiator
groups, LUNs, and mapping configuration.
lun map [ -f ] lun_path initiator_group [ lun_id ]
Maps a LUN to all the initiators in the supplied group
Real 52Netapp NS0-155 Exam
QUESTION 84Which set of commands should be used for
troubleshooting Ethernet connectivity problems from the storage
system console?
A. ifstat, netdiagB. perfstat, tracertC. sysconfig - cr,
sysstatD. dish shm_stats, sysstat
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html
http://backdrift.org/man/netapp/man1/na_netdiag.1.html
ifstat - display device-level statistics for network interfaces
netdiag - perform network diagnostics
-
QUESTION 85Which command displays the statistics for Ethernet
network interfaces?
A. ifconfigB. ifstatC. sysconfigD. sysstat
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html
ifstat - display device-level statistics for network interfaces
QUESTION 86Real 53Netapp NS0-155 ExamWhich command is used to
set the configuration of an Ethernet network interface?
A. ifconfigB. ifstatC. netstat - iD. sysconfig - v
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_ifconfig.1.html
ifconfig - Configures network interface parameters.
QUESTION 87What are three true statements about physical
reallocation of data added in ONTAP 7.3? (Choose three.)
-
http://www.gratisexam.com/
A. Use reallocate -p pathname to run the physical reallocate.B.
Use aggr reallocate -p pathname to run the physical reallocate.C.
Reinitialize any SnapMirror relationship for the new physical
geometry.D. Volume Snapshots do not need to be deleted for the
reallocate to run effectively.E. Dont run it on files, volumes, and
LUNs that are in an aggregate created by a version of ONTAP earlier
than 7.2.
Correct Answer: ADESection: (none)Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html
The -p option requests that reallocation of user data take place
on the physical blocks in the aggregate, but the logical block
locations within a flexible volume arepreserved. Aggregate
reallocation is not supported on aggregates created prior to Data
ONTAP 7.2. Using the -p option may reduce the extra storage
requirementsin a flexible volume when reallocation is run on a
volume with snapshots. It may also reduce the amount of data that
needs to be transmitted by SnapMirror on itsnext update after
reallocation is performed on a SnapMirror source volume.
Real 54Netapp NS0-155 Exam
QUESTION 88Physical Reallocation of a SnapMirror source volume
increases the amount of data to transfer for the next SnapMirror
update.
A. TrueB. False
Correct Answer: BSection: (none)
-
Explanation
Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html
Using the -p option may reduce the extra storage requirements in a
flexiblevolume when reallocation is run on a volume with snapshots.
It may also reduce the amount of data that needs to be transmitted
by SnapMirror on its next updateafter reallocation is performed on
a SnapMirror source volume.
QUESTION 89A snapshot is a frozen, read-only image of the entire
Data ONTAP active file system that reflects the state of the
____________ at the time the snapshot wascreated.
A. qtreesB. volumeC. directoryD. storage system
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_snap.1.html
Snapshots can be made of volumes or aggregates; most commonly
the former. The question refers to a file system, or more
specifically a volume.You cannot snapshot directories or qtrees
alone.
QUESTION 90Data ONTAP uses inodes in an active file system to
reference ___________.
Real 55Netapp NS0-155 Exam
A. qtreesB. disk blocksC. file segmentsD. Snapshot copies
Correct Answer: B
-
Section: (none)Explanation
Explanation/Reference:Explanation:All data, whether file or
block-based, resides in 4KB blocks on disk. A group of related
blocks make up a file. To accommodate different file sizes, the
WAFLfilesystem describes each file with reference pointers called
inodes.
https://communities.netapp.com/servlet/JiveServlet/previewBody/5027-102-1-
6953/PS%20Tech%20Note%20018%20-%20maxfiles.pdf
Topic 2, Volume B
QUESTION 91Which command disables client access to Snapshot
copies on a volume called flexvol1?
A. cifs shares -change flexvol1 -nosnapB. snap access flexvol1
offC. vol options flexvol1 nosnapdir onD. vol options flexvol1
snapdir offE. vol options flexvol1 snapdir on
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 92When Data ONTAP creates a weekly, nightly, or hourly
snapshot, the value of n (as shown by the snap list command) is
adjusted for all the weekly.n, nightly.n, orhourly.n Snapshot
copies. The higher the value of n, the _________ the snapshot.
A. olderB. newerC. more important
Real 56Netapp NS0-155 Exam
D. least important
-
Correct Answer: ASection: (none)Explanation
Explanation/Reference:Explanation:where n is an integer. The
most recent weekly Snapshot copy is weekly.0, weekly.1 is the next
most recent weekly Snapshot copy, and so on.
https://library.netapp.com/ecmdocs/ECMP1113957/html/GUID-1D3B0C7D-D94E-43A3-9091-
5E76003E16EB.html
QUESTION 93A SnapVault secondary volume can contain up to ___
Snapshot copies for data protection.
A. 125B. 251C. 255D. Depends on capacity and number of disk
drives
Correct Answer: BSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 94Which three are pre-requisites for using SnapRestore?
(Choose three.)
A. The volume to be reverted must be offline.B. The volume to be
reverted must not be a SnapMirror destination.C. You must enter the
SnapRestore license code before you can use it.D. Snapshot copies
must exist on the storage system so that you can select a snapshot
for the reversion.
Correct Answer: BCDSection: (none)Explanation
Explanation/Reference:Explanation:
-
You must meet certain prerequisites before using SnapRestore:-
SnapRestore must be licensed on your storage system.- There must be
at least one Snapshot copy on the system that you can select to
revert.- The volume to be reverted must be online.
Real 57Netapp NS0-155 Exam
- The volume to be reverted must not be in use for data
replication.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-A14081A3-9270-47EE-A1C1-EC52D3ABDBD0.html
QUESTION 95Which command or procedure would you use to undo a
volume SnapRestore operation?
A. snap restore -r volB. snap revert -s volC. snap restore undo
volD. You cannot undo a SnapRestore operation at the volume
level.
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:SnapRestore overwrites all
data in the file or volume. After you use SnapRestore to revert to
a selectedSnapshot copy, you cannot undo the reversion.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-80FEDAF8-75FA-4E43-
B683-58C1F66B61E2.html
QUESTION 96What happens after you use SnapRestore to revert a
volume to a specific snapshot?
A. You must bring the volume back online.B. The storage system
automatically performs a snapshot for that volume.C. The Snapshot
copies that are older than the snapshot you used are deleted.D. The
Snapshot copies that are more recent than the snapshot you used are
deleted.
Correct Answer: DSection: (none)
-
Explanation
Explanation/Reference:Explanation:After you revert a volume to a
selected Snapshot copy, you lose all the Snapshot copies that were
taken after the selected Snapshot copy.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-80FEDAF8-75FA-4E43-B683-
Real 58Netapp NS0-155 Exam
58C1F66B61E2.html
QUESTION 97Which three statements are true when using
SnapRestore? (Choose three.)
A. The volume must be online.B. SnapRestore must be licensed
before you can use it.C. The snap restore enable on option must be
enabled.D. The volume to be reverted must not be a SnapMirror
destination mirror.
Correct Answer: ABDSection: (none)Explanation
Explanation/Reference:Explanation:
QUESTION 98Which objects can be restored by a single SnapRestore
command? (Choose three)
A. fileB. LUNC. qtreeD. volumeE. directory
Correct Answer: ABDSection: (none)
-
Explanation
Explanation/Reference:Explanation:SnapRestore on a file and
volume:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-1E99ACB2-5C69-4FFC-B115-
9D2951D109E9.html
SnapRestore on a
LUN:https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04-
55E736962FD1.html
Hint: snaprestore at the volume level or at the file level. LUNs
are effectively files.
Real 59Netapp NS0-155 Exam
QUESTION 99Which option of the snap restore command allows you
to specify a different directory, as long as the directory already
exists?
A. snap restore -cB. snap restore -dC. snap restore -rD. snap
restore s
Correct Answer: CSection: (none)Explanation
Explanation/Reference:Explanation:snap restore [ -A | -V ] [ -f
] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ]
vol_name | restore_from_pathSee more at:
http://wafl.co.uk/snap/#sthash.nJiEwxGV.dpuf
QUESTION 100A volume is SnapMirrored hourly. You revert the
volume using a snapshot that was created two days ago. Which
command continues the relationship?
A. SnapMirror initializeB. SnapMirror quiesceC. SnapMirror
resumeD. SnapMirror resyncE. SnapMirror update
-
Correct Answer: DSection: (none)Explanation
Explanation/Reference:Explanation:You can use the snapmirror
resync command to reestablish the connection between the source and
the destination. This command is applied after the
SnapMirrorrelationship between the source and destination is
broken.https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-5D846D24-0903-4982-A429-
71AE5C0F9033.html
QUESTION 101When you are setting up SnapMirror, which three are
replication pre-requisites? (Choose three.)
Real 60Netapp NS0-155 Exam
A. The source volume must be offline.B. SnapMirror must be
licensed for each storage system.C. If you are replicating a
volume, you must create a restricted volume to be used as the
SnapMirror.D. The capacity of the SnapMirror destination must be
greater than or equal to the capacity of the source destination
volume.
Correct Answer: BCDSection: (none)Explanation
Explanation/Reference:Explanation:You need to fulfill a set of
prerequisites before you can use SnapMirror:- You must purchase and
enable the SnapMirror license. If the SnapMirror source and
destination are on different systems, you must enable the
SnapMirror licenseon each system.- For SnapMirror volume
replication, you must create a restricted volume to be used as the
destination volume.
SnapMirror does not automatically create a volume. For
information about how to create volumes, see the section on
organizing data using volumes and qtrees inthe Data ONT