NS0-153
Network Appliance Storage Networking
Version 3.0
QUESTION NO: 1
If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on
the storage appliance and do a restart for the changes to take effect.
A. True
B. False
Answer: A
QUESTION NO: 2
If the client is a CIFS client, locks are _______.
A. advisory
B. mandatory
C. ordered
D. optional
Answer: B
QUESTION NO: 3
To view per client NFS statistics on the storage appliance, options
nfs.per_client_stats.enable must be turned on.
A. True
B. False
Answer: A
QUESTION NO: 4
Three methods of creating a LUN are:
*lun setup
*lun map
*FilerView
A. True
B. False
Answer: A
QUESTION NO: 5
Applications, such as databases, running on NAS or iSCSI or FC SAN must be
A. prepared for snapshots by flushing buffers to disk and momentarily suspending
activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.
Answer: A
QUESTION NO: 6
To export volumes and directories automatically on reboot, include them in the
/etc/exports file.
A. True
B. False
Answer: A
QUESTION NO: 7
Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?
lun show-m
LUN pathMapped to LUN ID
-----------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0
A. These are type "Solaris" LUNs.
B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.
Answer: C
QUESTION NO: 8
Which one of the following will enable "symlink_strict_security"?
A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B
QUESTION NO: 9
To configure a storage system as a member of an active directory, the time on the
storage system must be synchronized with the time on the Domain Controller.
A. True
B. False
Answer: A
QUESTION NO: 10
The writeable snapshot that is created for a LUN clone depends on __________.
A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.
Answer: B
QUESTION NO: 11
Which command is the most appropriate for troubleshooting a multiprotocol authentication
problem?
A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1
Answer: A
QUESTION NO: 12
A quota target can be defined as_______________.
A. the maximum amount of disk space in a volume.
B. the maximum number of files in a disk.
C. a user, group, or qtree to which a quota is applied.
D. a specific disk space threshold.
Answer: C
QUESTION NO: 13
Which three are used for creating LUNs on the storage appliance? (Choose 3)
A. lun create
B. lun setup
C. FilerView
D. lun config
Answer: A, B, C
QUESTION NO: 14
What is the outcome of this command? lun create -b /vol/vol2/.snapshot/testsnap/lun0
/vol/vol2/lun0.clone
A. It creates a duplicate of the clone process of lun0.
B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.
Answer: C
QUESTION NO: 15
Which security method encrypts the data?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests
Answer: A
QUESTION NO: 16
_________ is the default cfmode for new installations of Data ONTAP 7.2.
A. single image
B. mixed
C. partner
D. dual fabric
Answer: A
QUESTION NO: 17
Which command would you use to verify that the iSCSI service is running?
A. license add iSCSI
B. iscsi service
C. iscsi status
D. iscsi protocol
Answer: C
QUESTION NO: 18
If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?
A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe
Answer: B
QUESTION NO: 19
What is the definition of the cifs setup command?
A. It displays the mount point of all shared directories.
B. It displays the names of all mounted directories on the storage system.
C. It displays the prompts for CIFS configuration information.
D. It displays a list of the users on the storage system.
Answer: C
QUESTION NO: 20
UNIX allow file access based on ___________.
A. GID or UID and UNIX permissions.
B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.
Answer: A
QUESTION NO: 21
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.
A. True
B. False
Answer: A
QUESTION NO: 22
Which command should be used for troubleshooting connectivity problems from the storage
system console?
A. ifstat, netdiag
B. sysconfig - cr, sysstat
C. scsi test, shelfchk
D. dish shm_stats, sysstat
Answer: A
QUESTION NO: 23
Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.
A. single image
B. partner
C. mixed
D. standby
Answer: A
QUESTION NO: 24
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas, but not from tree quotas.
A. True
B. False
Answer: A
QUESTION NO: 25
Which command best displays the statistics for the network interface?
A. netstat
B. ifconfig
C. sysstat
D. ifstat
Answer: D
QUESTION NO: 26
Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.
A. True
B. False
Answer: B
QUESTION NO: 27
Which two will allow you to read and analyze a packet trace file generated by the storage
appliance? (Choose 2)
A. pktt
B. Netmon
C. Eternal View
D. Ethereal
Answer: B, D
QUESTION NO: 28
Cfmode is a(n)______-specific setting.
A. FCP
B. iSCSI
C. Active/Active
D. Active/Passive
Answer: A
QUESTION NO: 29
When viewing sysstat output, which three fields are part of the total number of operations per
second? (Choose 3)
A. CIFS
B. FTP
C. NFS
D. HTTP
Answer: A, C, D
QUESTION NO: 30
You have a 1TB volume and a 600GB LUN with 600GB of data written to the LUN. If you
take a snapshot copy, will it fail?
A. True
B. False
Answer: A
QUESTION NO: 31
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
________utility.
A. System Configuration Guide
B. NetApp Diagnostics
C. Release Comparison
D. Bugs Online
Answer: C
QUESTION NO: 32
On a newly created qtree, you notice the following:
* CIFS permissions on the qtree are everyone: full control.
* Your Windows users can access the share, and can copy, edit, and delete files without
issue.
* The super user on a Solaris workstation can mount other qtrees from the same
volume.
The super user receives an "Access Denied" message when he attempts to mount the
new qtree. Whats the most likely cause of this error?
A. NFS is turned off on the storage appliance.
B. The qtree has not been exported.
C. The qtree is set to ntfs only security style.
D. The qtree is missing from the /etc/hosts file.
Answer: B
QUESTION NO: 33
In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?
A. Minimum 11.5 MB, Maximum 2TB
B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB
Answer: C
QUESTION NO: 34
What feature guarantees that space is available for completing writes to a LUN?
A. fractional reserve
B. space reservation
C. overwrite reserve
D. snapshot reserve
Answer: B
QUESTION NO: 35
Which three statements apply to an entry in the /etc/exports file regarding exporting
directories, qtrees, and volumes? (Choose 3)
A. Export each volume separately.
B. The storage appliance must resolve host names.
C. Export ancestors and their descendants.
D. Export /vol.
Answer: A, B, C
QUESTION NO: 36
Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)
A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err
Answer: B, C, D
QUESTION NO: 37
Which two of the following are Data ONTAP commands for gathering performance information?
(Choose 2)
A. sio_ntap_soll
B. sysstat
C. perfstat
D. nfsstat
Answer: B, D
QUESTION NO: 38
An iSCSI _____ is established when the host initiator logs into the iSCSI target. Within a
_________ you can have one or more ________
A. session, session, connections
B. connection, connection, sessions.
C. connection, session, connections.
D. session, connection, sessions.
Answer: A
QUESTION NO: 39
Which three are true of the NetApp iSCSI target (ISWT)? (Choose 3.)
A. It is an iSCSI software interface
B. It is an iSCSI hardware interface.
C. It implements iSCSI protocol.
D. It supports iSCSI target operation over standard NICs.
E.It supports iSCSI target operations over standard FC.
Answer: A, C, D
QUESTION NO: 40
Which command should be used for troubleshooting connectivity problems from the storage
system console?
A. ifstat, netdiag
B. sysconfig - cr, sysstat
C. scsi test, shelfchk
D. dish shm_stats, sysstat
Answer: A
Question: 41
Which two statements about hard and soft zoning are correct? (Choose 2.)
A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.
Answer: A, B
Question: 42
Given the content of the /etc/quotas file, select the appropriate answer. What would the
default limit for the user wesson for the volume /vol/wmv be if their explicit quota of 75
MB of disk space and 75K files was removed from the /etc/quotas file?"
A. 50MB disk space, 15K files
B. 750MB disk space, 85K files
C. 100MB disk space, 75K files
D. 75MB disk space, 75K files
Answer: A
Question: 43
If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on
the storage appliance and do a restart for the changes to take effect.
A. True
B. False
Answer: A
Question: 44
What is the definition of the cifs setup command?
A. It displays the mount point of all shared directories.
B. It displays the names of all mounted directories on the storage system.
C. It displays the prompts for CIFS configuration information.
D. It displays a list of the users on the storage system.
Answer: C
Question: 45
In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?
A. Minimum 11.5 MB, Maximum 2TB
B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB
Answer: C
Question: 46
Which two of the following are Data ONTAP commands for gathering performance information?
(Choose 2)
A. sio_ntap_soll
B. sysstat
C. perfstat
D. nfsstat
Answer: B, D
Question: 47
What is the process that allows you to make LUNs available to some hosts and unavailable to
others?
A. LUN masking
B. LUN hiding
C. LUN grouping
D. LUN cloning
Answer: A
Question: 48
Which three are characteristics of an iSCSI or FCP SAN implementation? (Choose 3.)
A. iSCSI is a TCP/IP method for accessing LUNs.
B. LUNs can be accessed through FCP.
C. Block services are synonymous with an iSCSI or FCP SAN environment.
D. A LUN can be converted into a VLD.
Answer: A, B, C
Question: 49
If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:
1) Verify that the RPC is enabled.
2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.
A. True
B. False
Answer: A
Question: 50
You have a 1TB volume and a 600GB LUN with 600GB of data written to the LUN. If you
take a snapshot copy, will it fail?
A. True
B. False
Answer: A
QUESTION NO: 51
NTFS allows file access based on _______.
A. NT ACLs and UNIX permissions.
B. SID and password.
C. NT ACLs and SID.
D. UNIX permissions.
Answer: C
QUESTION NO: 52
Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)
A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN
Answer: A, C
QUESTION NO: 53
Which command is the most appropriate for troubleshooting a multiprotocol authentication
problem?
A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1
Answer: A
QUESTION NO: 54
To export volumes and directories automatically on reboot, include them in the
/etc/exports file.
A. True
B. False
Answer: A
QUESTION NO: 55
Which three are used for creating LUNs on the storage appliance? (Choose 3)
A. lun create
B. lun setup
C. FilerView
D. lun config
Answer: A, B, C
QUESTION NO: 56
This command will have what effect?
options wafl.default_security_style mixed
A. It will change the security style of all volumes to mixed.
B. It will change the security style of all qtrees to mixed.
C. It will set the security style of all files to mixed.
D. It will set the default security style for all newly created volumes.
Answer: D
QUESTION NO: 57
Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?
A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t
Answer: A
QUESTION NO: 58
Which three can coexist on a NetApp storage appliance? (Choose 3.)
A. Domain Controller
B. NFS
C. CIFS
D. SAN
E.DFS
Answer: B, C, D
QUESTION NO: 59
Which three items are resources for export? (Choose 3)
A. volume
B. subnet
C. directory
D. qtree
Answer: A, C, D
QUESTION NO: 60
Cloning a LUN from a snapshot will cause that snapshot to be ______.
A. recreated.
B. corrupted.
C. locked.
D. destroyed.
Answer: C
QUESTION NO: 61
Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.
A. True
B. False
Answer: B
QUESTION NO: 62
Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?
lun show-m
LUN pathMapped to LUN ID
-------------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0
A. These are type "Solaris" LUNs.
B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.
Answer: C
QUESTION NO: 63
Which storage appliance command returns information about host bus adapters connected to the
storage appliance from a Solaris host?
A. sysconfig-a
B. iscsi show adapter
C. fcp show initiator
D. fcp config
Answer: C
QUESTION NO: 64
CIFS clients can resolve symbolic links created by NFS clients on the storage system.
A. True
B. False
Answer: A
QUESTION NO: 65
Applications, such as databases, running on NAS or iSCSI or FC SAN must be ______.
A. prepared for snapshots by flushing buffers to disk and momentarily suspending
activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.
Answer: A
QUESTION NO: 66
Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)
A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a
Answer: C, D
QUESTION NO: 67
If the client is a CIFS client, locks are _____.
A. advisory
B. mandatory
C. ordered
D. optional
Answer: B
QUESTION NO: 68
When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. mounted on a host.
B. mapped to a Windows server.
C. exported and accessible.
D. taken offline or unmapped.
Answer: D
QUESTION NO: 69
Which three attributes would you specify when creating a LUN? (Choose 3.)
A. The path name of the LUN.
B. The operating system associated with the LUN.
C. The size of the LUN.
D. The version of Data ONTAP.
Answer: A, B, C
QUESTION NO: 70
Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)
A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err
Answer: B, C, D
QUESTION NO: 71
A quota target can be defined as_______________.
A. the maximum amount of disk space in a volume.
B. the maximum number of files in a disk.
C. a user, group, or qtree to which a quota is applied.
D. a specific disk space threshold.
Answer: C
QUESTION NO: 72
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas, but not from tree quotas.
A. True
B. False
Answer: A
QUESTION NO: 73
When viewing sysstat output, which three fields are part of the total number of operations per
second? (Choose 3)
A. CIFS
B. FTP
C. NFS
D. HTTP
Answer: A, C, D
QUESTION NO: 74
If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)
A. The storage appliance is not in the /etc/hosts file.
B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kerneI/drv/sd.conf file.
Answer: C, D
QUESTION NO: 75
To configure a storage system as a member of an active directory, the time on the
storage system must be synchronized with the time on the Domain Controller.
A. True
B. False
Answer: A
QUESTION NO: 76
Which three are true of the NetApp iSCSI target (ISWT)? (Choose 3.)
A. It is an iSCSI software interface
B. It is an iSCSI hardware interface.
C. It implements iSCSI protocol.
D. It supports iSCSI target operation over standard NICs.
E.It supports iSCSI target operations over standard FC.
Answer: A, C, D
QUESTION NO: 77
An iSCSI _____ is established when the host initiator logs into the iSCSI target. Within a
_________ you can have one or more ________.
A. session, session, connections
B. connection, connection, sessions.
C. connection, session, connections.
D. session, connection, sessions.
Answer: A
QUESTION NO: 78
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
________utility.
A. System Configuration Guide
B. NetApp Diagnostics
C. Release Comparison
D. Bugs Online
Answer: C
QUESTION NO: 79
An iSCSI or FC SAN implementation provides __________ access to LUNs.
A. file
B. block
C. VLD
D. VHP
Answer: B
QUESTION NO: 80
To determine if a problem you are experiencing is known to NetApp, use the NOW site utility.
A. System Configuration Guide
B. Bugs Online
C. Release Comparison
D. Ethereal
Answer: B
QUESTION NO: 81
Which statement best describes the output of the following command? sysstat-s 5
A. Display utilization output every five seconds and print a summary upon termination.
B. Display extended output every five seconds and print a summary upon termination.
C. Display the default output every five seconds and print a summary upon termination.
D. Display the default output every five seconds and terminate after five counts.
Answer: C
QUESTION NO: 82
NetApp recommends that Fibre Channel switches that have both disk and tape
connected to them should have separate zones created for each.
A. True
B. False
Answer: A
QUESTION NO: 83
To configure a storage system as a member of an active directory, the time on the
storage system must be synchronized with the time on the Domain Controller.
A. True
B. False
Answer: A
QUESTION NO: 84
UNIX allow file access based on _________.
A. GID or UID and UNIX permissions.
B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.
Answer: A
QUESTION NO: 85
Using the output below, a co-worker determined that these are type "Solaris" LUNs.
What would your determination be?
lun show-m
LUN pathMapped to LUN ID
----------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 solaris-igroup1 0
/vol/Vol1/qtree1/lun2 solaris-igroup2 0
/vol/vol1/qtree1/lun3 solaris-igroup3 0
A. These are type "Solaris" LUNs.
B. These are NFS LUNs, but the exact OS cannot be determined.
C. Not enough information is given here. Run the lun show-v command to get the
information requested.
D. Not enough information is given here. Run the lun map command to get the
information requested.
Answer: C
QUESTION NO: 86
Which security method encrypts the data?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests
Answer: A
QUESTION NO: 87
Which two statements about hard and soft zoning are correct? (Choose 2.)
A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.
Answer: A, B
QUESTION NO: 88
If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?
A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe
Answer: B
QUESTION NO: 89
Which command is the most appropriate for troubleshooting a multiprotocol authentication
problem?
A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1
Answer: A
QUESTION NO: 90
If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)
A. The storage appliance is not in the /etc/hosts file.
B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kernel/drv/sd.conf file.
Answer: C, D
QUESTION NO: 91
Which command adds the share "netapp" to the /vol/vol2/home directory?
A. cifs shares -add netapp /vol/vol2/home
B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp /vol/vol2
D. None of the above
Answer: A
QUESTION NO: 92
What is the difference between SAN (block) and NAS (file) backup procedures using
snapshots?
A. In the SAN (block) scenario, the file system is controlled by the host and must be
consistent when the snapshot is taken.
B. Nothing; they are the same.
C. In the NAS (file) scenario, the file system is controlled by the host and must be
consistent when the snapshot is taken.
D. None of the above.
Answer: A
QUESTION NO: 93
Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)
A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN
Answer: A, C
QUESTION NO: 94
To export volumes and directories automatically on reboot, include them in the
/etc/exports file.
A. True
B. False
Answer: A
QUESTION NO: 95
Which two conditions might cause a user to receive a message that there is no space left on a
disk? (Choose 2)
A. There is not enough space available on the disk.
B. The user has exceeded his or her quota.
C. Snap reserve is set to 10%.
D. The disk is write protected.
Answer: A, B
QUESTION NO: 96
In an iSCSI target configuration, there are two ISWT adapters. The purpose of adapter
iswta is for local traffic. What is the purpose of the iSCSI target adapter iswtb?
A. It is used for partner traffic in a clustered Windows host environment.
B. It is used for partner traffic in a clustered storage appliance environment.
C. It is used for iSCSI network traffic when iswta is exceeding thresholds.
D. It is used for iSCSI network traffic when iswta has failed.
Answer: B
QUESTION NO: 97
Which one of the following will enable "symlink_strict_security"?
A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B
QUESTION NO: 98
The writeable snapshot that is created for a LUN clone depends on __________.
A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.
Answer: B
QUESTION NO: 99
If a qtree security style is UNIX, CIFS client file access is determined by___________.
A. NT ACLs
B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C. the last client to set permissions.
D. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.
Answer: B
QUESTION NO: 100
Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)
A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a
Answer: C, D
Question No 101
What is the outcome of this command?
lun create -b /vol/vol2/.snapshot/testsnap/lun0 /vol/vol2/lun0.clone
A. It creates a duplicate of the clone process of lun0.
B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.
Answer: C
Question No 102
An iSCSI or FC SAN implementation provides __________ access to LUNs.
A. file
B. block
C. VLD
D. VHP
Answer: B
Question No 103
In a Fibre Channel configuration, the host's HBA is referred to as the _______ and the storage
system's HBA is referred to as the___________________.
A. primary, secondary.
B. initiator, target.
C. secondary, primary.
D. target, initiator.
Answer: B
Question No 104
Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?
A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t
Answer: A
Question No 105
When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. mounted on a host.
B. mapped to a Windows server.
C. exported and accessible.
D. taken offline or unmapped.
Answer: D
Question No 106
Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.
A. single image
B. partner
C. mixed
D. standby
Answer: A
Question No 107
Which three are valid LUN commands? (Choose 3.)
A. lun move
B. lun copy
C. lun clone
D. lun offline
Answer: A, C, D
Question No 108
Which command displays the credentials the storage system has stored in memory for a
particular user account?
A. cifs
B. wcc
C. showcred
D. mem_disp
Answer: B
Question No 109
Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)
A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err
Answer: B, C, D
Question No 110
If a NFS client attempts and fails to access a file opened by a CIFS application, which command
would you use to view the connection?
A. cifs audit
B. cifs sessions
C. cifs shares
D. cifs lookup
Answer: B
QUESTION NO: 111
Three methods of creating a LUN are:
*lun setup
*lun map
*FilerView
A. True
B. False
Answer: B
QUESTION NO: 112
Which command on the storage appliance allows you to collect statistics on the performance of
system resources such as CPU, NVRAM, network interfaces, and disks?
A. sysstat 1
B. netdiag-v
C. pktt
D. netstat-i
Answer: A
QUESTION NO: 113
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.
A. True
B. False
Answer: A
QUESTION NO: 114
Which command would you use to verify that the iSCSI service is running?
A. license add iSCSI
B. iscsi service
C. iscsi status
D. iscsi protocol
Answer: C
QUESTION NO: 115
Which option of the exportfs command will temporarily export a resource while ignoring the
options specified in the /etc/exports file?
A. exportfs -a
B. exportfs-u
C. exportfs-v
D. exportfs -i
Answer: D
QUESTION NO: 116
Given the content of the /etc/quotas file, select the appropriate answer. What would the
default limit for the user wesson for the volume /vol/wmv be if their explicit quota of 75
MB of disk space and 75K files was removed from the /etc/quotas file?"
A. 50MB disk space, 15K files
B. 750MB disk space, 85K files
C. 100MB disk space, 75K files
D. 75MB disk space, 75K files
Answer: A
QUESTION NO: 117
What will happen if a soft quota is exceeded?
A. All write operations will fail.
B. An autosupport message will be sent.
C. An SNMP warning message will be generated.
D. A spare disk will be added to the volume.
Answer: C
QUESTION NO: 118
Cfmode is a(n)______ -specific setting.
A. FCP
B. iSCSI
C. Active/Active
D. Active/Passive
Answer: A
QUESTION NO: 119
If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:
1) Verify that the RPC is enabled.
2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.
A. True
B. False
Answer: A
QUESTION NO: 120
Which command on the storage appliance allows you to collect statistics on the performance of
system resources such as CPU, NVRAM, network interfaces, and disks?
A. sysstat 1
B. netdiag-v
C. pktt
D. netstat-i
Answer: A
QUESTION NO: 121
To configure a storage system as a member of an active directory, the time on the
storage system must be synchronized with the time on the Domain Controller.
A. True
B. False
Answer: A
QUESTION NO: 122
Cloning a LUN from a snapshot will cause that snapshot to be ______.
A. recreated.
B. corrupted.
C. locked.
D. destroyed.
Answer: C
QUESTION NO: 123
Which command is the most appropriate for troubleshooting a multiprotocol authentication
problem?
A. wcc
B. rdfile /etc/rc
C. priv set advanced
D. sysstat 1
Answer: A
QUESTION NO: 124
What feature guarantees that space is available for completing writes to a LUN?
A. fractional reserve
B. space reservation
C. overwrite reserve
D. snapshot reserve
Answer: B
QUESTION NO: 125
Which command would you use to verify that the iSCSI service is running?
A. license add iSCSI
B. iscsi service
C. iscsi status
D. iscsi protocol
Answer: C
QUESTION NO: 126
Which two will allow you to read and analyze a packet trace file generated by the storage
appliance? (Choose 2)
A. pktt
B. Netmon
C. Eternal View
D. Ethereal
Answer: B, D
QUESTION NO: 127
The writeable snapshot that is created for a LUN clone depends on __________.
A. mirroring.
B. the snapshot taken at the time the clone was created.
C. exclusive access to the volume.
D. the data in the original LUN not changing.
Answer: B
QUESTION NO: 128
To view per client NFS statistics on the storage appliance, options
nfs.per_client_stats.enable must be turned on.
A. True
B. False
Answer: A
QUESTION NO: 129
To export volumes and directories automatically on reboot, include them in the
/etc/exports file.
A. True
B. False
Answer: A
QUESTION NO: 130
Three methods of creating a LUN are:
*lun setup
*lun map
*FilerView
A. True
B. False
Answer: B
QUESTION NO: 131
If a qtree security style is UNIX, CIFS client file access is determined by__________.
A. NT ACLs
B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C. the last client to set permissions.
D. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.
Answer: B
QUESTION NO: 132
Which two commands can be performed with the SnapDrive for Windows graphical user
interface? (Choose 2.)
A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN
Answer: A, C
QUESTION NO: 133
Given the content of the /etc/quotas file, fill in the blank. "The following user name(s)
__________is given an explicit quota of 100 MB of disk space and 75K files in the
/vol/wmv/proj1 qtree. This user is also restricted to the default limit of 50 MB of disk
space and 15K files."
A. wesson
B. All users
C. Imoe
D. None of the above
Answer: C
QUESTION NO: 134
Which three can coexist on a NetApp storage appliance? (Choose 3.)
A. Domain Controller
B. NFS
C. CIFS
D. SAN
E.DFS
Answer: B, C, D
QUESTION NO: 135
Which three statements apply to an entry in the /etc/exports file regarding exporting
directories, qtrees, and volumes? (Choose 3)
A. Export each volume separately.
B. The storage appliance must resolve host names.
C. Export ancestors and their descendants.
D. Export /vol.
Answer: A, B, C
QUESTION NO: 136
Before running lun setup on the storage appliance, you must pre-create the igroup to
which the initiator will be attached.
A. True
B. False
Answer: B
QUESTION NO: 137
NetApp recommends that Fibre Channel switches that have both disk and tape
connected to them should have separate zones created for each.
A. True
B. False
Answer: A
QUESTION NO: 138
If you believe you have a FC SAN performance problem, which NetApp utility or command would
gather both your Solaris host and storage appliance data for analysis?
A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe
Answer: B
QUESTION NO: 139
Which three commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose 3.)
A. fcp wwpn
B. igroup show
C. lun map-v
D. fcp show initiator
E.lun show-err
Answer: B, C, D
QUESTION NO: 140
Which one of the following will enable "symlink_strict_security"?
A. options cifs.symIink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B
QUESTION NO: 141
As a best practice for long-term use, a writeable snapshot of a LUN should be turned
into a LUN clone.
A. True
B. False
Answer: A
QUESTION NO: 142
On a newly created qtree, you notice the following:
* CIFS permissions on the qtree are everyone: full control.
* Your Windows users can access the share, and can copy, edit, and delete files without
issue.
* The super user on a Solaris workstation can mount other qtrees from the same
volume.
The super user receives an "Access Denied" message when he attempts to mount the
new qtree. Whats the most likely cause of this error?
A. NFS is turned off on the storage appliance.
B. The qtree has not been exported.
C. The qtree is set to ntfs only security style.
D. The qtree is missing from the /etc/hosts file.
Answer: B
QUESTION NO: 143
If you cannot access a LUN that has been created and mapped to an initiator from a
Solaris host, which are two possible problems? (Choose 2.)
A. The storage appliance is not in the /etc/hosts file.
B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kernel/drv/sd.conf file.
Answer: C, D
QUESTION NO: 144
What is the outcome of this command?
lun create -b /vol/vol2/.snapshot/testsnap/lun0 /vol/vol2/lun0.clone
A. It creates a duplicate of the clone process of lun0.
B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.
Answer: C
QUESTION NO: 145
What will happen if a soft quota is exceeded?
A. All write operations will fail.
B. An autosupport message will be sent.
C. An SNMP warning message will be generated.
D. A spare disk will be added to the volume.
Answer: C
QUESTION NO: 146
UNIX allow file access based on___________.
A. GID or UID and UNIX permissions.
B. NT ACLs and UNIX permissions.
C. NT ACLs and SID.
D. GID or UID and ACLs.
Answer: A
QUESTION NO: 147
Which cfmode is described by the following scenario? All LUNs in the cluster are avilable on al
ports in thecluster. Any port on each node can provide access to both local and partner LUNs.
A. single image
B. partner
C. mixed
D. standby
Answer: A
QUESTION NO: 148
In Data OnTap 7.2, what are the minimum and maximum LUN sizes on a NetApp
storage system using iSCSI and a Microsoft Windows 2003 server, SP1 or later?
A. Minimum 11.5 MB, Maximum 2TB
B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 12TB
D. Minimum 41.5 MB, Maximum 2.5TB
Answer: C
QUESTION NO: 149
Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose 2.)
A. sysstat 1
B. netdiag-n
C. netstat -i
D. ifstat -a
Answer: C, D
QUESTION NO: 150
Which command adds the share "netapp" to the /vol/vol2/home directory?
A. cifs shares -add netapp /vol/vol2/home
B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp /vol/vol2
D. None of the above
Answer: A
QUESTION NO: 151
Which three are characteristics of an iSCSI or FCP SAN implementation? (Choose 3.)
A. iSCSI is a TCP/IP method for accessing LUNs.
B. LUNs can be accessed through FCP.
C. Block services are synonymous with an iSCSI or FCP SAN environment.
D. A LUN can be converted into a VLD.
Answer: A, B, C
QUESTION NO: 152
Applications, such as databases, running on NAS or iSCSI or FC SAN must be
_________.
A. prepared for snapshots by flushing buffers to disk and momentarily suspending
activity.
B. disconnected from their storage resources during the snapshot.
C. using dynamic multipathing during a backup.
D. mirrored with a host-based volume manager to be backed-up.
Answer: A
QUESTION NO: 153
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from
user and group quotas.
A. True
B. False
Answer: A
QUESTION NO: 154
Which command best displays the statistics for the network interface?
A. netstat
B. ifconfig
C. sysstat
D. ifstat
Answer: D
QUESTION NO: 155
You are having problems accessing three recently-created LUNs. Given the output
below, the reason is because all of the LUNs are using the same LUN ID of 0.
lun show-m
LUN pathMapped to LUN ID
----------------------------------------------
/vol/Vol1/lun0 solaris-igroup0 0
/vol/Vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0
A. True
B. False
Answer: B
QUESTION NO: 156
Which option should be used with the nfsstat command to assist in decoding export and mountd
errors?
A. nfsstat-d
B. nfsstat-z
C. nfsstat-c
D. nfsstat-t
Answer: A
QUESTION NO: 157
If you are receiving RPC timeouts, the following troubleshooting steps would be
appropriate:
1) Verify that the RPC is enabled.
2) Verify that the NFS daemons are running.
3) Verify that the correct mount points have been created.
A. True
B. False
Answer: A
QUESTION NO: 158
Which two statements about hard and soft zoning are correct? (Choose 2.)
A. Soft zones separate devices at the name service level, but do not restrict access to
devices outside of the zone.
B. Hard zoning physically restricts access to members of the zone.
C. Soft zones are used for Loop devices, hard zones are used for Fabric devices.
D. Soft zones are dynamic zones and are created by the host during device discovery.
Answer: A, B
QUESTION NO: 159
Which two conditions might cause a user to receive a message that there is no space left on a
disk? (Choose 2)
A. There is not enough space available on the disk.
B. The user has exceeded his or her quota.
C. Snap reserve is set to 10%.
D. The disk is write protected.
Answer: A, B
QUESTION NO: 160
Three methods of creating a LUN are:
* lun setup
* lun map
* FilerView
A. True
B. False
Answer: B
QUESTION NO: 161
Which methods analyze the performance output of an NFS client to the storage
appliance?
1) Time the mkfile command for a write test.
2) Time the dd command for a read test.
3) Time the cp command for a read and write test.
4) Verify your results with the nfsstat-c command.
A. 1 and 4
B. 2 and 4
C. 3 and 4
D. All four methods
Answer: D
QUESTION NO: 162
What utility on the storage appliance will allow you to capture network packet
information?
A. netstat
B. snoop
C. pktt
D. traceroute
Answer: C
QUESTION NO: 163
For automatic user name mapping to occur for a CIFS and UNIX user name that are the
same, you must do which of the following?
A. Enter the user names in the /etc/hosts.equiv file.
B. Use both an NIS server and a Domain Controller in the network.
C. Enter the CIFS user in the NIS database.
D. Do nothing; the mapping will occur
Answer: D
QUESTION NO: 164
Multipathing describes a_____ solution that has at least two distinct_______ path to a LUN.
A. FIC or IP SAN, logical
B. FC or IP SAN, physical
C. FC SAN, logical
D. controller, physical
Answer: B
QUESTION NO: 165
Which two commands can be used to enable space reservations for a LUN? (Choose 2.)
A. lun create
B. lun set reservation
C. fcp-r <lun_path>
D. iscsi-r <lun_path>
Answer: A, B
QUESTION NO: 166
Which command allows you to display quota usage?
A. quota on
B. quota report
C. quota run
D. quota setup
Answer: B
QUESTION NO: 167
Which four steps should be taken when troubleshooting a "stale nfs file handle"
response to a mount request?(Choose 4)
A. Check the client's fstab.
B. Check for connectivity to the storage appliance from the client.
C. Check show mount -e to the storage appliance from the client.
D. Check the /etc/exports file on the storage appliance.
E.Check the /etc/sd.conf file on the client.
Answer: A, B, C, D
QUESTION NO: 168
Which two cp types would indicate a busy storage appliance? (Choose 2)
A. cp_from_timer
B. cp_from_log_full
C. cp_from_cp
D. cp_from_busy
Answer: B, C
QUESTION NO: 169
Which set of protocols provide block-level access to Network Appliance storage?
A. CIFS and NFS
B. iSCSI and FCP
C. HTTP and FTP
D. SNA and RPC
Answer: B
QUESTION NO: 170
In the Windows environment, the storage appliance supports the use of local groups in
managing users and groups.
A. True
B. False
Answer: A
QUESTION NO: 171
Which command would you use to set up the network interface?
A. ifstat
B. sysconfig - v
C. ifconfig
D. netstat - i
Answer: C
QUESTION NO: 172
You receive the following error message:
ISCSI: iswta Authentication failed for initiator xyz;
Which command would you use to troubleshoot the failure?
A. iscsi security delete
B. iscsi security generate
C. iscsi show adapter
D. ISCSI security show
Answer: D
QUESTION NO: 173
The quota resize command only affects existing/etc/quotas file target entries, not new
target entries.
A. True
B. False
Answer: A