Pass the Netapp NCIE-Data Protection NS0-527 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

You are planning to deploy MetroCluster IP. As part of the implementation strategy, you are asked to verify that youhave the relevant hardware for the deployment.

Which two elements are required to deploy your solution? (Choose two.)

Options:

A.

storage controllers


B.

FC network switches


C.

cluster peering network


D.

iSCSI Ethernet switches


Expert Solution
Questions # 32:

You want to set up an important management solution that must comply with FIPS 140-2. The solution should support a multi-clusters environment and should provide centralized management of the encryption keys.

In this scenario, which solution accomplishes the task?

Options:

A.

NetApp Storage Encryption (NSE)with external key management using the Key Management Interoperability Protocol (KMIP)


B.

NetApp Volume Encryption (NVE) with onboard key manager using the Key Management Interoperability Protocol (KMIP)


C.

NetApp Storage Encryption (NSE) with onboard keymanager using the Key Management Interoperability Protocol (KMIP)


D.

NetApp Volume Encryption (NVE) with external key management server using the Key Management Interoperability Protocol (KMIP)


Expert Solution
Questions # 33:

Click the Exhibit button.

Question # 33

You have a SnapProtect v11 environment as shown in the exhibit. What are the two default Snapshot copies created automatically after creating a Storage Policy.

(Choose two.)

Options:

A.

Primary (Tape)


B.

Primary (Classic)


C.

Primary (NetApp)


D.

primary (Snap)


Expert Solution
Questions # 34:

You are the administrator of an ONTAP 9.7 cluster. You configured an hourly Snapshot schedule for all volumes. One of your users accidentally deleted an important spreadsheet file on an SMB share. This file must be restored within a minimum amount of time.

Which two actions satisfy this requirement? (Choose two.)

Options:

A.

On the cluster CLI, issue the volume clone restore command.


B.

On the cluster CLI, issue the volume snapshot restore-file command.


C.

In Windows Explorer, right-click on the SMB share where the file was deleted, goto "Previous Versions" and select the file, then copy it to the original location.


D.

In ONTAP System Manager, navigate to the volume where the share resides, click on "Snapshot Copies" and restore the latest Snapshot copy.


Expert Solution
Questions # 35:

A customer has a 2-node ONTAP Select HA cluster deployed on the same site. The ONTAP Deploy VM has been accidentally deleted. The 2-node ONTAP Select HA cluster is still serving data, but the storage failover capability has been disabled.

In this scenario, what would you do to reestablish the storage failover capability on your cluster?

Options:

A.

Deploy two ONTAP Deploy VMs and a new 2-node ONTAP Select cluster and then migrate the data.


B.

Deploy a secondary ONTAP Deploy VM and restore the 2-node cluster quorum.


C.

Deploy two single-nodeONTAP Select clusters and migrate all exiting data.


D.

Deploy a new 4-node ONTAP Select cluster and distribute data from the existing cluster.


Expert Solution
Questions # 36:

You have a NAS volume containing 100 GB of data and daily change rate of 10%. You want to keep seven daily Snapshot copies. What is the minimum size for the volume?

Options:

A.

170 GB


B.

100 GB


C.

110 GB


D.

220 GB


Expert Solution
Questions # 37:

You are asked to implement a DR solution to protect employee home directories on the primary cluster. The solution should provide an PRO of one hour, disaster recovery and archivingconfigured on the same destination volume of the DR cluster. Your solution should also reduce the amount of secondary storage requirements and use lower network traffic on the WAN links.

In this scenario, which NetApp replication technology satisfies these requirements?

Options:

A.

SnapMirror-Sync


B.

SyncMirror


C.

MetroCluster


D.

SnapMirror


Expert Solution
Questions # 38:

Which NetApp technology helps to protect against ransomware attacks?

Options:

A.

SnapLock


B.

SyncMirror


C.

NetApp Volume Encryption


D.

NetApp Aggregate Encryption


Expert Solution
Questions # 39:

A customer has deployed OnCommand Unified Manager and wants to use it to manage their data protection relationships within their NetApp storage infrastructure.

In this scenario, which additional component must be deployed to satisfy this requirement?

Options:

A.

OnCommandSystem Manager


B.

NetApp SnapCenter


C.

OnCommand Cloud Manager


D.

OnCommand Workflow Automation


Expert Solution
Questions # 40:

You have a SnapMirror relationship established between two sites and want to verify that the data on the DR site is usable without disturbing the source.

In this scenario, which three steps are required to accomplish this task? (Choose three.)

Options:

A.

Resynchronize the destination to the source volume, then update the source volume.


B.

Resume the SnapMirror destination, then updatethe SnapMirror destination.


C.

Quiesce the SnapMirror destination, then break the SnapMirror destination.


D.

Reverse the SnapMirror source and destination, then re-initialize SnapMirror.


E.

Configure the destination volume for data access, then access thedata volume from a client.


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions