Pass the Netapp NetApp Certified Data Administrator NS0-155 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster site node. (Choose two)

Options:

A.

Use manual fencing


B.

Use the cf giveback –f command.


C.

Use the cf forcetakeover –d command.


D.

Turn off power to the disaster site node.


E.

Isolate the failed node from the surviving node.


Expert Solution
Questions # 22:

Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)

Options:

A.

A LUN can be converted into a VLD.


B.

LUNs can be accessed using the FCP protocol.


C.

LUNs can be accessed using the iSCSI protocol.


D.

Block services are associated with an iSCSI or FCP SAN environment.


Expert Solution
Questions # 23:

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 resynchronization state when it failed?

Options:

A.

Determine which volumes are at the remote and disaster sites.


B.

Re-create the synchronous mirror.


C.

Rejoin the two volumes.


D.

Turn on power to the cluster node at the disaster site.


Expert Solution
Questions # 24:

What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)

Options:

A.

Snap Autodelete


B.

iGroup throttle


C.

LUN reset


D.

Volume AutoSize


Expert Solution
Questions # 25:

An iSCSI or FC SAN implementation provides ____________ access to LUNs.

Options:

A.

VLD


B.

VIIP


C.

File


D.

Block


Expert Solution
Questions # 26:

When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?

Options:

A.

When the 64-bit volumes has Volume Guarantee disabled


B.

When the 64-bit volume has compression enabled


C.

When the 64-bit volume has FlexShare enabled


D.

When the 64-bit volume has ASIS enabled


Expert Solution
Questions # 27:

What is the correct format for the scheduling component of a SnapVault schedule?

Options:

A.

cnt[@day_list][@hour_list]


B.

YYYY-MM-DD


C.

Crontable format


D.

List of dates in ISO Date format


Expert Solution
Questions # 28:

When running deduplication on SnapVault destinations, which three statements are true?

Options:

A.

The target SnapVault controller deduplicates inline.


B.

The source SnapVault data is deduplicated inline on the target before it is written to disk.


C.

Deduplication internally synchronizes with the SnapVault schedule on the destination.


D.

The source (primary) system sends duplicated data even if the source data is deduplicated.


E.

Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the snapshot to effectively deduplicate savings.


Expert Solution
Questions # 29:

Which command will show the FCP target(s) on a storage system?

Options:

A.

fcp show adapter


B.

fcp show all


C.

fcp show -t


D.

fcp status


Expert Solution
Questions # 30:

Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)

Options:

A.

The default interval value is five minutes.


B.

The smallest interval value supported is 30 seconds.


C.

This variable controls the view of the data on the destination system.


D.

By setting a value, you specify the amount of time before an automatic snapshot is created on the source volume that is synchronously mirrored.


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions