Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
75 views43 pages

NetApp Storage Networking Exam Guide

This document contains 41 multiple choice questions about Network Appliance storage networking. The questions cover topics such as CIFS, NFS, LUN configuration, quotas, snapshots, troubleshooting, and performance monitoring. Correct answers are provided for each question. The questions are numbered 1 through 41 and ask about commands, configuration options, protocols, and other aspects of NetApp storage.

Uploaded by

MCP Mark
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views43 pages

NetApp Storage Networking Exam Guide

This document contains 41 multiple choice questions about Network Appliance storage networking. The questions cover topics such as CIFS, NFS, LUN configuration, quotas, snapshots, troubleshooting, and performance monitoring. Correct answers are provided for each question. The questions are numbered 1 through 41 and ask about commands, configuration options, protocols, and other aspects of NetApp storage.

Uploaded by

MCP Mark
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

NS0-153

Network Appliance Storage Networking

Version 3.0
QUESTION NO: 1

If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on
the storage appliance and do a restart for the changes to take effect.

A. True
B. False

Answer: A

QUESTION NO: 2

If the client is a CIFS client, locks are _______.

A. advisory
B. mandatory
C. ordered
D. optional

Answer: B

QUESTION NO: 3

To view per client NFS statistics on the storage appliance, options


nfs.per_client_stats.enable must be turned on.

A. True
B. False

Answer: A

QUESTION NO: 4

Three methods of creating a LUN are:

*lun setup
*lun map
*FilerView

A. True
B. False

Answer: A

QUESTION NO: 5

Applications, such as databases, running on NAS or iSCSI or FC SAN must be


A. prepared for snapshots by flushing buffers to disk and momentarily suspending
activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.

Answer: A

QUESTION NO: 6

To export volumes and directories automatically on reboot, include them in the


/etc/exports file.

A. True
B. False

Answer: A

QUESTION NO: 7

Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?

lun show-m
LUN pathMapped to LUN ID
-----------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0

A. These are type "Solaris" LUNs.


B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.

Answer: C

QUESTION NO: 8

Which one of the following will enable "symlink_strict_security"?

A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B

QUESTION NO: 9

To configure a storage system as a member of an active directory, the time on the


storage system must be synchronized with the time on the Domain Controller.

A. True
B. False

Answer: A

QUESTION NO: 10

The writeable snapshot that is created for a LUN clone depends on __________.

A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.

Answer: B

QUESTION NO: 11

Which command is the most appropriate for troubleshooting a multiprotocol authentication


problem?

A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1

Answer: A

QUESTION NO: 12

A quota target can be defined as_______________.

A. the maximum amount of disk space in a volume.


B. the maximum number of files in a disk.
C. a user, group, or qtree to which a quota is applied.
D. a specific disk space threshold.

Answer: C

QUESTION NO: 13

Which three are used for creating LUNs on the storage appliance? (Choose 3)
A. lun create
B. lun setup
C. FilerView
D. lun config

Answer: A, B, C

QUESTION NO: 14

What is the outcome of this command? lun create -b /vol/vol2/.snapshot/testsnap/lun0


/vol/vol2/lun0.clone

A. It creates a duplicate of the clone process of lun0.


B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.

Answer: C

QUESTION NO: 15

Which security method encrypts the data?

A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests

Answer: A

QUESTION NO: 16

_________ is the default cfmode for new installations of Data ONTAP 7.2.

A. single image
B. mixed
C. partner
D. dual fabric

Answer: A

QUESTION NO: 17

Which command would you use to verify that the iSCSI service is running?

A. license add iSCSI


B. iscsi service
C. iscsi status
D. iscsi protocol

Answer: C

QUESTION NO: 18

If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?

A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe

Answer: B

QUESTION NO: 19

What is the definition of the cifs setup command?

A. It displays the mount point of all shared directories.


B. It displays the names of all mounted directories on the storage system.
C. It displays the prompts for CIFS configuration information.
D. It displays a list of the users on the storage system.

Answer: C

QUESTION NO: 20

UNIX allow file access based on ___________.

A. GID or UID and UNIX permissions.


B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.

Answer: A

QUESTION NO: 21

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.

A. True
B. False

Answer: A

QUESTION NO: 22
Which command should be used for troubleshooting connectivity problems from the storage
system console?

A. ifstat, netdiag
B. sysconfig - cr, sysstat
C. scsi test, shelfchk
D. dish shm_stats, sysstat

Answer: A

QUESTION NO: 23

Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.

A. single image
B. partner
C. mixed
D. standby

Answer: A

QUESTION NO: 24

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas, but not from tree quotas.

A. True
B. False

Answer: A

QUESTION NO: 25

Which command best displays the statistics for the network interface?

A. netstat
B. ifconfig
C. sysstat
D. ifstat

Answer: D

QUESTION NO: 26

Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.

A. True
B. False

Answer: B

QUESTION NO: 27

Which two will allow you to read and analyze a packet trace file generated by the storage
appliance? (Choose 2)

A. pktt
B. Netmon
C. Eternal View
D. Ethereal

Answer: B, D

QUESTION NO: 28

Cfmode is a(n)______-specific setting.

A. FCP
B. iSCSI
C. Active/Active
D. Active/Passive

Answer: A

QUESTION NO: 29

When viewing sysstat output, which three fields are part of the total number of operations per
second? (Choose 3)

A. CIFS
B. FTP
C. NFS
D. HTTP

Answer: A, C, D

QUESTION NO: 30

You have a 1TB volume and a 600GB LUN with 600GB of data written to the LUN. If you
take a snapshot copy, will it fail?

A. True
B. False

Answer: A
QUESTION NO: 31

To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
________utility.

A. System Configuration Guide


B. NetApp Diagnostics
C. Release Comparison
D. Bugs Online

Answer: C

QUESTION NO: 32

On a newly created qtree, you notice the following:

* CIFS permissions on the qtree are everyone: full control.


* Your Windows users can access the share, and can copy, edit, and delete files without
issue.
* The super user on a Solaris workstation can mount other qtrees from the same
volume.

The super user receives an "Access Denied" message when he attempts to mount the
new qtree. Whats the most likely cause of this error?

A. NFS is turned off on the storage appliance.


B. The qtree has not been exported.
C. The qtree is set to ntfs only security style.
D. The qtree is missing from the /etc/hosts file.

Answer: B

QUESTION NO: 33

In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?

A. Minimum 11.5 MB, Maximum 2TB


B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB

Answer: C

QUESTION NO: 34

What feature guarantees that space is available for completing writes to a LUN?

A. fractional reserve
B. space reservation
C. overwrite reserve
D. snapshot reserve

Answer: B

QUESTION NO: 35

Which three statements apply to an entry in the /etc/exports file regarding exporting
directories, qtrees, and volumes? (Choose 3)

A. Export each volume separately.


B. The storage appliance must resolve host names.
C. Export ancestors and their descendants.
D. Export /vol.

Answer: A, B, C

QUESTION NO: 36

Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)

A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err

Answer: B, C, D

QUESTION NO: 37

Which two of the following are Data ONTAP commands for gathering performance information?
(Choose 2)

A. sio_ntap_soll
B. sysstat
C. perfstat
D. nfsstat

Answer: B, D

QUESTION NO: 38

An iSCSI _____ is established when the host initiator logs into the iSCSI target. Within a
_________ you can have one or more ________

A. session, session, connections


B. connection, connection, sessions.
C. connection, session, connections.
D. session, connection, sessions.

Answer: A

QUESTION NO: 39

Which three are true of the NetApp iSCSI target (ISWT)? (Choose 3.)

A. It is an iSCSI software interface


B. It is an iSCSI hardware interface.
C. It implements iSCSI protocol.
D. It supports iSCSI target operation over standard NICs.
E.It supports iSCSI target operations over standard FC.

Answer: A, C, D

QUESTION NO: 40

Which command should be used for troubleshooting connectivity problems from the storage
system console?

A. ifstat, netdiag
B. sysconfig - cr, sysstat
C. scsi test, shelfchk
D. dish shm_stats, sysstat

Answer: A

Question: 41

Which two statements about hard and soft zoning are correct? (Choose 2.)

A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.

Answer: A, B

Question: 42

Given the content of the /etc/quotas file, select the appropriate answer. What would the
default limit for the user wesson for the volume /vol/wmv be if their explicit quota of 75
MB of disk space and 75K files was removed from the /etc/quotas file?"

A. 50MB disk space, 15K files


B. 750MB disk space, 85K files
C. 100MB disk space, 75K files
D. 75MB disk space, 75K files

Answer: A

Question: 43

If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on
the storage appliance and do a restart for the changes to take effect.

A. True
B. False

Answer: A

Question: 44

What is the definition of the cifs setup command?

A. It displays the mount point of all shared directories.


B. It displays the names of all mounted directories on the storage system.
C. It displays the prompts for CIFS configuration information.
D. It displays a list of the users on the storage system.

Answer: C

Question: 45

In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?

A. Minimum 11.5 MB, Maximum 2TB


B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB

Answer: C

Question: 46

Which two of the following are Data ONTAP commands for gathering performance information?
(Choose 2)

A. sio_ntap_soll
B. sysstat
C. perfstat
D. nfsstat

Answer: B, D
Question: 47

What is the process that allows you to make LUNs available to some hosts and unavailable to
others?

A. LUN masking
B. LUN hiding
C. LUN grouping
D. LUN cloning

Answer: A

Question: 48

Which three are characteristics of an iSCSI or FCP SAN implementation? (Choose 3.)

A. iSCSI is a TCP/IP method for accessing LUNs.


B. LUNs can be accessed through FCP.
C. Block services are synonymous with an iSCSI or FCP SAN environment.
D. A LUN can be converted into a VLD.

Answer: A, B, C

Question: 49

If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:

1) Verify that the RPC is enabled.


2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.

A. True
B. False

Answer: A

Question: 50

You have a 1TB volume and a 600GB LUN with 600GB of data written to the LUN. If you
take a snapshot copy, will it fail?

A. True
B. False

Answer: A

QUESTION NO: 51
NTFS allows file access based on _______.

A. NT ACLs and UNIX permissions.


B. SID and password.
C. NT ACLs and SID.
D. UNIX permissions.

Answer: C

QUESTION NO: 52

Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)

A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN

Answer: A, C

QUESTION NO: 53

Which command is the most appropriate for troubleshooting a multiprotocol authentication


problem?

A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1

Answer: A

QUESTION NO: 54

To export volumes and directories automatically on reboot, include them in the


/etc/exports file.

A. True
B. False

Answer: A

QUESTION NO: 55

Which three are used for creating LUNs on the storage appliance? (Choose 3)

A. lun create
B. lun setup
C. FilerView
D. lun config

Answer: A, B, C

QUESTION NO: 56

This command will have what effect?

options wafl.default_security_style mixed

A. It will change the security style of all volumes to mixed.


B. It will change the security style of all qtrees to mixed.
C. It will set the security style of all files to mixed.
D. It will set the default security style for all newly created volumes.

Answer: D

QUESTION NO: 57

Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?

A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t

Answer: A

QUESTION NO: 58

Which three can coexist on a NetApp storage appliance? (Choose 3.)

A. Domain Controller
B. NFS
C. CIFS
D. SAN
E.DFS

Answer: B, C, D

QUESTION NO: 59

Which three items are resources for export? (Choose 3)

A. volume
B. subnet
C. directory
D. qtree
Answer: A, C, D

QUESTION NO: 60

Cloning a LUN from a snapshot will cause that snapshot to be ______.

A. recreated.
B. corrupted.
C. locked.
D. destroyed.

Answer: C

QUESTION NO: 61

Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.

A. True
B. False

Answer: B

QUESTION NO: 62

Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?

lun show-m
LUN pathMapped to LUN ID

-------------------------------------------------

/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0

A. These are type "Solaris" LUNs.


B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.

Answer: C

QUESTION NO: 63
Which storage appliance command returns information about host bus adapters connected to the
storage appliance from a Solaris host?

A. sysconfig-a
B. iscsi show adapter
C. fcp show initiator
D. fcp config

Answer: C

QUESTION NO: 64

CIFS clients can resolve symbolic links created by NFS clients on the storage system.

A. True
B. False

Answer: A

QUESTION NO: 65

Applications, such as databases, running on NAS or iSCSI or FC SAN must be ______.

A. prepared for snapshots by flushing buffers to disk and momentarily suspending


activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.

Answer: A

QUESTION NO: 66

Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)

A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a

Answer: C, D

QUESTION NO: 67

If the client is a CIFS client, locks are _____.

A. advisory
B. mandatory
C. ordered
D. optional

Answer: B

QUESTION NO: 68

When using SnapRestore to restore a single LUN, the LUN must be ___________.

A. mounted on a host.
B. mapped to a Windows server.
C. exported and accessible.
D. taken offline or unmapped.

Answer: D

QUESTION NO: 69

Which three attributes would you specify when creating a LUN? (Choose 3.)

A. The path name of the LUN.


B. The operating system associated with the LUN.
C. The size of the LUN.
D. The version of Data ONTAP.

Answer: A, B, C

QUESTION NO: 70

Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)

A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err

Answer: B, C, D

QUESTION NO: 71

A quota target can be defined as_______________.

A. the maximum amount of disk space in a volume.


B. the maximum number of files in a disk.
C. a user, group, or qtree to which a quota is applied.
D. a specific disk space threshold.
Answer: C

QUESTION NO: 72

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas, but not from tree quotas.

A. True
B. False

Answer: A

QUESTION NO: 73

When viewing sysstat output, which three fields are part of the total number of operations per
second? (Choose 3)

A. CIFS
B. FTP
C. NFS
D. HTTP

Answer: A, C, D

QUESTION NO: 74

If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)

A. The storage appliance is not in the /etc/hosts file.


B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kerneI/drv/sd.conf file.

Answer: C, D

QUESTION NO: 75

To configure a storage system as a member of an active directory, the time on the


storage system must be synchronized with the time on the Domain Controller.

A. True
B. False

Answer: A

QUESTION NO: 76

Which three are true of the NetApp iSCSI target (ISWT)? (Choose 3.)
A. It is an iSCSI software interface
B. It is an iSCSI hardware interface.
C. It implements iSCSI protocol.
D. It supports iSCSI target operation over standard NICs.
E.It supports iSCSI target operations over standard FC.

Answer: A, C, D

QUESTION NO: 77

An iSCSI _____ is established when the host initiator logs into the iSCSI target. Within a
_________ you can have one or more ________.

A. session, session, connections


B. connection, connection, sessions.
C. connection, session, connections.
D. session, connection, sessions.

Answer: A

QUESTION NO: 78

To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
________utility.

A. System Configuration Guide


B. NetApp Diagnostics
C. Release Comparison
D. Bugs Online

Answer: C

QUESTION NO: 79

An iSCSI or FC SAN implementation provides __________ access to LUNs.

A. file
B. block
C. VLD
D. VHP

Answer: B

QUESTION NO: 80

To determine if a problem you are experiencing is known to NetApp, use the NOW site utility.

A. System Configuration Guide


B. Bugs Online
C. Release Comparison
D. Ethereal

Answer: B

QUESTION NO: 81

Which statement best describes the output of the following command? sysstat-s 5

A. Display utilization output every five seconds and print a summary upon termination.
B. Display extended output every five seconds and print a summary upon termination.
C. Display the default output every five seconds and print a summary upon termination.
D. Display the default output every five seconds and terminate after five counts.

Answer: C

QUESTION NO: 82

NetApp recommends that Fibre Channel switches that have both disk and tape
connected to them should have separate zones created for each.

A. True
B. False

Answer: A

QUESTION NO: 83

To configure a storage system as a member of an active directory, the time on the


storage system must be synchronized with the time on the Domain Controller.

A. True
B. False

Answer: A

QUESTION NO: 84

UNIX allow file access based on _________.

A. GID or UID and UNIX permissions.


B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.

Answer: A

QUESTION NO: 85
Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?

lun show-m
LUN pathMapped to LUN ID

----------------------------------------------

/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0

A. These are type "Solaris" LUNs.


B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.

Answer: C

QUESTION NO: 86

Which security method encrypts the data?

A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests

Answer: A

QUESTION NO: 87

Which two statements about hard and soft zoning are correct? (Choose 2.)

A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.

Answer: A, B

QUESTION NO: 88

If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?
A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe

Answer: B

QUESTION NO: 89

Which command is the most appropriate for troubleshooting a multiprotocol authentication


problem?

A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1

Answer: A

QUESTION NO: 90

If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)

A. The storage appliance is not in the /etc/hosts file.


B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kernel/drv/sd.conf file.

Answer: C, D

QUESTION NO: 91

Which command adds the share "netapp" to the /vol/vol2/home directory?

A. cifs shares -add netapp /vol/vol2/home


B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp /vol/vol2
D. None of the above

Answer: A

QUESTION NO: 92

What is the difference between SAN (block) and NAS (file) backup procedures using
snapshots?

A. In the SAN (block) scenario, the file system is controlled by the host and must be
consistent when the snapshot is taken.
B. Nothing; they are the same.
C. In the NAS (file) scenario, the file system is controlled by the host and must be
consistent when the snapshot is taken.
D. None of the above.

Answer: A

QUESTION NO: 93

Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)

A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN

Answer: A, C

QUESTION NO: 94

To export volumes and directories automatically on reboot, include them in the


/etc/exports file.

A. True
B. False

Answer: A

QUESTION NO: 95

Which two conditions might cause a user to receive a message that there is no space left on a
disk? (Choose 2)

A. There is not enough space available on the disk.


B. The user has exceeded his or her quota.
C. Snap reserve is set to 10%.
D. The disk is write protected.

Answer: A, B

QUESTION NO: 96

In an iSCSI target configuration, there are two ISWT adapters. The purpose of adapter
iswta is for local traffic. What is the purpose of the iSCSI target adapter iswtb?

A. It is used for partner traffic in a clustered Windows host environment.


B. It is used for partner traffic in a clustered storage appliance environment.
C. It is used for iSCSI network traffic when iswta is exceeding thresholds.
D. It is used for iSCSI network traffic when iswta has failed.
Answer: B

QUESTION NO: 97

Which one of the following will enable "symlink_strict_security"?

A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on

Answer: B

QUESTION NO: 98

The writeable snapshot that is created for a LUN clone depends on __________.

A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.

Answer: B

QUESTION NO: 99

If a qtree security style is UNIX, CIFS client file access is determined by___________.

A. NT ACLs
B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C. the last client to set permissions.
D. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.

Answer: B

QUESTION NO: 100

Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)

A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a

Answer: C, D

Question No 101
What is the outcome of this command?

lun create -b /vol/vol2/.snapshot/testsnap/lun0 /vol/vol2/lun0.clone

A. It creates a duplicate of the clone process of lun0.


B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.

Answer: C

Question No 102

An iSCSI or FC SAN implementation provides __________ access to LUNs.

A. file
B. block
C. VLD
D. VHP

Answer: B

Question No 103

In a Fibre Channel configuration, the host's HBA is referred to as the _______ and the storage
system's HBA is referred to as the___________________.

A. primary, secondary.
B. initiator, target.
C. secondary, primary.
D. target, initiator.

Answer: B

Question No 104

Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?

A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t

Answer: A

Question No 105

When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. mounted on a host.
B. mapped to a Windows server.
C. exported and accessible.
D. taken offline or unmapped.

Answer: D

Question No 106

Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.

A. single image
B. partner
C. mixed
D. standby

Answer: A

Question No 107

Which three are valid LUN commands? (Choose 3.)

A. lun move
B. lun copy
C. lun clone
D. lun offline

Answer: A, C, D

Question No 108

Which command displays the credentials the storage system has stored in memory for a
particular user account?

A. cifs
B. wcc
C. showcred
D. mem_disp

Answer: B

Question No 109

Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)

A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err

Answer: B, C, D

Question No 110

If a NFS client attempts and fails to access a file opened by a CIFS application, which command
would you use to view the connection?

A. cifs audit
B. cifs sessions
C. cifs shares
D. cifs lookup

Answer: B

QUESTION NO: 111

Three methods of creating a LUN are:

*lun setup
*lun map
*FilerView

A. True
B. False

Answer: B

QUESTION NO: 112

Which command on the storage appliance allows you to collect statistics on the performance of
system resources such as CPU, NVRAM, network interfaces, and disks?

A. sysstat 1
B. netdiag-v
C. pktt
D. netstat-i

Answer: A

QUESTION NO: 113

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.

A. True
B. False
Answer: A

QUESTION NO: 114

Which command would you use to verify that the iSCSI service is running?

A. license add iSCSI


B. iscsi service
C. iscsi status
D. iscsi protocol

Answer: C

QUESTION NO: 115

Which option of the exportfs command will temporarily export a resource while ignoring the
options specified in the /etc/exports file?

A. exportfs -a
B. exportfs-u
C. exportfs-v
D. exportfs -i

Answer: D

QUESTION NO: 116

Given the content of the /etc/quotas file, select the appropriate answer. What would the
default limit for the user wesson for the volume /vol/wmv be if their explicit quota of 75
MB of disk space and 75K files was removed from the /etc/quotas file?"

A. 50MB disk space, 15K files


B. 750MB disk space, 85K files
C. 100MB disk space, 75K files
D. 75MB disk space, 75K files

Answer: A

QUESTION NO: 117

What will happen if a soft quota is exceeded?

A. All write operations will fail.


B. An autosupport message will be sent.
C. An SNMP warning message will be generated.
D. A spare disk will be added to the volume.

Answer: C
QUESTION NO: 118

Cfmode is a(n)______ -specific setting.

A. FCP
B. iSCSI
C. Active/Active
D. Active/Passive

Answer: A

QUESTION NO: 119

If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:

1) Verify that the RPC is enabled.


2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.

A. True
B. False

Answer: A

QUESTION NO: 120

Which command on the storage appliance allows you to collect statistics on the performance of
system resources such as CPU, NVRAM, network interfaces, and disks?

A. sysstat 1
B. netdiag-v
C. pktt
D. netstat-i

Answer: A

QUESTION NO: 121

To configure a storage system as a member of an active directory, the time on the


storage system must be synchronized with the time on the Domain Controller.

A. True
B. False

Answer: A

QUESTION NO: 122


Cloning a LUN from a snapshot will cause that snapshot to be ______.

A. recreated.
B. corrupted.
C. locked.
D. destroyed.

Answer: C

QUESTION NO: 123

Which command is the most appropriate for troubleshooting a multiprotocol authentication


problem?

A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1

Answer: A

QUESTION NO: 124

What feature guarantees that space is available for completing writes to a LUN?

A. fractional reserve
B. space reservation
C. overwrite reserve
D. snapshot reserve

Answer: B

QUESTION NO: 125

Which command would you use to verify that the iSCSI service is running?

A. license add iSCSI


B. iscsi service
C. iscsi status
D. iscsi protocol

Answer: C

QUESTION NO: 126

Which two will allow you to read and analyze a packet trace file generated by the storage
appliance? (Choose 2)

A. pktt
B. Netmon
C. Eternal View
D. Ethereal

Answer: B, D

QUESTION NO: 127

The writeable snapshot that is created for a LUN clone depends on __________.

A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.

Answer: B

QUESTION NO: 128

To view per client NFS statistics on the storage appliance, options


nfs.per_client_stats.enable must be turned on.

A. True
B. False

Answer: A

QUESTION NO: 129

To export volumes and directories automatically on reboot, include them in the


/etc/exports file.

A. True
B. False

Answer: A

QUESTION NO: 130

Three methods of creating a LUN are:

*lun setup
*lun map
*FilerView

A. True
B. False

Answer: B
QUESTION NO: 131

If a qtree security style is UNIX, CIFS client file access is determined by__________.

A. NT ACLs
B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C. the last client to set permissions.
D. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.

Answer: B

QUESTION NO: 132

Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)

A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN

Answer: A, C

QUESTION NO: 133

Given the content of the /etc/quotas file, fill in the blank. "The following user name(s)
__________is given an explicit quota of 100 MB of disk space and 75K files in the
/vol/wmv/proj1 qtree. This user is also restricted to the default limit of 50 MB of disk
space and 15K files."

A. wesson
B. All users
C. Imoe
D. None of the above

Answer: C

QUESTION NO: 134

Which three can coexist on a NetApp storage appliance? (Choose 3.)

A. Domain Controller
B. NFS
C. CIFS
D. SAN
E.DFS

Answer: B, C, D
QUESTION NO: 135

Which three statements apply to an entry in the /etc/exports file regarding exporting
directories, qtrees, and volumes? (Choose 3)

A. Export each volume separately.


B. The storage appliance must resolve host names.
C. Export ancestors and their descendants.
D. Export /vol.

Answer: A, B, C

QUESTION NO: 136

Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.

A. True
B. False

Answer: B

QUESTION NO: 137

NetApp recommends that Fibre Channel switches that have both disk and tape
connected to them should have separate zones created for each.

A. True
B. False

Answer: A

QUESTION NO: 138

If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?

A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe

Answer: B

QUESTION NO: 139

Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)

A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err

Answer: B, C, D

QUESTION NO: 140

Which one of the following will enable "symlink_strict_security"?

A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on

Answer: B

QUESTION NO: 141

As a best practice for long-term use, a writeable snapshot of a LUN should be turned
into a LUN clone.

A. True
B. False

Answer: A

QUESTION NO: 142

On a newly created qtree, you notice the following:

* CIFS permissions on the qtree are everyone: full control.


* Your Windows users can access the share, and can copy, edit, and delete files without
issue.
* The super user on a Solaris workstation can mount other qtrees from the same
volume.

The super user receives an "Access Denied" message when he attempts to mount the
new qtree. Whats the most likely cause of this error?

A. NFS is turned off on the storage appliance.


B. The qtree has not been exported.
C. The qtree is set to ntfs only security style.
D. The qtree is missing from the /etc/hosts file.

Answer: B

QUESTION NO: 143


If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)

A. The storage appliance is not in the /etc/hosts file.


B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kernel/drv/sd.conf file.

Answer: C, D

QUESTION NO: 144

What is the outcome of this command?

lun create -b /vol/vol2/.snapshot/testsnap/lun0 /vol/vol2/lun0.clone

A. It creates a duplicate of the clone process of lun0.


B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.

Answer: C

QUESTION NO: 145

What will happen if a soft quota is exceeded?

A. All write operations will fail.


B. An autosupport message will be sent.
C. An SNMP warning message will be generated.
D. A spare disk will be added to the volume.

Answer: C

QUESTION NO: 146

UNIX allow file access based on___________.

A. GID or UID and UNIX permissions.


B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.

Answer: A

QUESTION NO: 147


Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.

A. single image
B. partner
C. mixed
D. standby

Answer: A

QUESTION NO: 148

In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?

A. Minimum 11.5 MB, Maximum 2TB


B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB

Answer: C

QUESTION NO: 149

Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)

A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a

Answer: C, D

QUESTION NO: 150

Which command adds the share "netapp" to the /vol/vol2/home directory?

A. cifs shares -add netapp /vol/vol2/home


B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp /vol/vol2
D. None of the above

Answer: A

QUESTION NO: 151

Which three are characteristics of an iSCSI or FCP SAN implementation? (Choose 3.)

A. iSCSI is a TCP/IP method for accessing LUNs.


B. LUNs can be accessed through FCP.
C. Block services are synonymous with an iSCSI or FCP SAN environment.
D. A LUN can be converted into a VLD.

Answer: A, B, C

QUESTION NO: 152

Applications, such as databases, running on NAS or iSCSI or FC SAN must be


_________.

A. prepared for snapshots by flushing buffers to disk and momentarily suspending


activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.

Answer: A

QUESTION NO: 153

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.

A. True
B. False

Answer: A

QUESTION NO: 154

Which command best displays the statistics for the network interface?

A. netstat
B. ifconfig
C. sysstat
D. ifstat

Answer: D

QUESTION NO: 155

You are having problems accessing three recently-created LUNs. Given the output
below, the reason is because all of the LUNs are using the same LUN ID of 0.

lun show-m
LUN pathMapped to LUN ID
----------------------------------------------
/vol/Vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0

A. True
B. False

Answer: B

QUESTION NO: 156

Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?

A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t

Answer: A

QUESTION NO: 157

If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:

1) Verify that the RPC is enabled.


2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.

A. True
B. False

Answer: A

QUESTION NO: 158

Which two statements about hard and soft zoning are correct? (Choose 2.)

A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.

Answer: A, B

QUESTION NO: 159


Which two conditions might cause a user to receive a message that there is no space left on a
disk? (Choose 2)

A. There is not enough space available on the disk.


B. The user has exceeded his or her quota.
C. Snap reserve is set to 10%.
D. The disk is write protected.

Answer: A, B

QUESTION NO: 160

Three methods of creating a LUN are:

* lun setup
* lun map
* FilerView

A. True
B. False

Answer: B

QUESTION NO: 161

Which methods analyze the performance output of an NFS client to the storage
appliance?

1) Time the mkfile command for a write test.


2) Time the dd command for a read test.
3) Time the cp command for a read and write test.
4) Verify your results with the nfsstat-c command.

A. 1 and 4
B. 2 and 4
C. 3 and 4
D. All four methods

Answer: D

QUESTION NO: 162

What utility on the storage appliance will allow you to capture network packet
information?

A. netstat
B. snoop
C. pktt
D. traceroute
Answer: C

QUESTION NO: 163

For automatic user name mapping to occur for a CIFS and UNIX user name that are the
same, you must do which of the following?

A. Enter the user names in the /etc/hosts.equiv file.


B. Use both an NIS server and a Domain Controller in the network.
C. Enter the CIFS user in the NIS database.
D. Do nothing; the mapping will occur

Answer: D

QUESTION NO: 164

Multipathing describes a_____ solution that has at least two distinct_______ path to a LUN.

A. FIC or IP SAN, logical


B. FC or IP SAN, physical
C. FC SAN, logical
D. controller, physical

Answer: B

QUESTION NO: 165

Which two commands can be used to enable space reservations for a LUN? (Choose 2.)

A. lun create
B. lun set reservation
C. fcp-r <lun_path>
D. iscsi-r <lun_path>

Answer: A, B

QUESTION NO: 166

Which command allows you to display quota usage?

A. quota on
B. quota report
C. quota run
D. quota setup

Answer: B

QUESTION NO: 167


Which four steps should be taken when troubleshooting a "stale nfs file handle"
response to a mount request?(Choose 4)

A. Check the client's fstab.


B. Check for connectivity to the storage appliance from the client.
C. Check show mount -e to the storage appliance from the client.
D. Check the /etc/exports file on the storage appliance.
E.Check the /etc/sd.conf file on the client.

Answer: A, B, C, D

QUESTION NO: 168

Which two cp types would indicate a busy storage appliance? (Choose 2)

A. cp_from_timer
B. cp_from_log_full
C. cp_from_cp
D. cp_from_busy

Answer: B, C

QUESTION NO: 169

Which set of protocols provide block-level access to Network Appliance storage?

A. CIFS and NFS


B. iSCSI and FCP
C. HTTP and FTP
D. SNA and RPC

Answer: B

QUESTION NO: 170

In the Windows environment, the storage appliance supports the use of local groups in
managing users and groups.

A. True
B. False

Answer: A

QUESTION NO: 171

Which command would you use to set up the network interface?

A. ifstat
B. sysconfig - v
C. ifconfig
D. netstat - i

Answer: C

QUESTION NO: 172

You receive the following error message:

ISCSI: iswta Authentication failed for initiator xyz;

Which command would you use to troubleshoot the failure?

A. iscsi security delete


B. iscsi security generate
C. iscsi show adapter
D. ISCSI security show

Answer: D

QUESTION NO: 173

The quota resize command only affects existing/etc/quotas file target entries, not new
target entries.

A. True
B. False

Answer: A

You might also like