You are planning to deploy MetroCluster IP. As part of the implementation strategy, you are asked to verify that youhave the relevant hardware for the deployment.
Which two elements are required to deploy your solution? (Choose two.)
You want to set up an important management solution that must comply with FIPS 140-2. The solution should support a multi-clusters environment and should provide centralized management of the encryption keys.
In this scenario, which solution accomplishes the task?
Click the Exhibit button.
You have a SnapProtect v11 environment as shown in the exhibit. What are the two default Snapshot copies created automatically after creating a Storage Policy.
(Choose two.)
You are the administrator of an ONTAP 9.7 cluster. You configured an hourly Snapshot schedule for all volumes. One of your users accidentally deleted an important spreadsheet file on an SMB share. This file must be restored within a minimum amount of time.
Which two actions satisfy this requirement? (Choose two.)
A customer has a 2-node ONTAP Select HA cluster deployed on the same site. The ONTAP Deploy VM has been accidentally deleted. The 2-node ONTAP Select HA cluster is still serving data, but the storage failover capability has been disabled.
In this scenario, what would you do to reestablish the storage failover capability on your cluster?
You have a NAS volume containing 100 GB of data and daily change rate of 10%. You want to keep seven daily Snapshot copies. What is the minimum size for the volume?
You are asked to implement a DR solution to protect employee home directories on the primary cluster. The solution should provide an PRO of one hour, disaster recovery and archivingconfigured on the same destination volume of the DR cluster. Your solution should also reduce the amount of secondary storage requirements and use lower network traffic on the WAN links.
In this scenario, which NetApp replication technology satisfies these requirements?
Which NetApp technology helps to protect against ransomware attacks?
A customer has deployed OnCommand Unified Manager and wants to use it to manage their data protection relationships within their NetApp storage infrastructure.
In this scenario, which additional component must be deployed to satisfy this requirement?
You have a SnapMirror relationship established between two sites and want to verify that the data on the DR site is usable without disturbing the source.
In this scenario, which three steps are required to accomplish this task? (Choose three.)