1.If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on the
storage appliance and do a restart for the changes to take effect.
A.True
B.False
Correct:A
2.If the client is a CIFS client, locks are __________.
A.advisory
B.mandatory
C.ordered
D.optional
Correct:B
3.To view per client NFS statistics on the storage appliance, options nfs.per_client_stats.enable
must be turned on.
A.True
B.False
Correct:A
4.Three methods of creating a LUN are: *lun setup *lun map *FilerView
A.True
B.False
Correct:A
5.Applications, such as databases, running on NAS or iSCSI or FC SAN must be
__________________. A.prepared for snapshots by flushing buffers to disk and momentarily suspending activity.
B.disconnected from their storage resources during the snapshot.
C.using dynamic multipathing during a backup.
D.mirrored with a host-based volume manager to be backed-up.
Correct:A
6.To export volumes and directories automatically on reboot, include them in the /etc/exports file.
A.True
B.False
Correct:A
7.Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would
your determination be? lun show -m LUN pathMapped to LUN ID
--------------------------------------------------- /vol/vol1/lun0 solaris-igroup0 0 /vol/vol1/lun1 solaris-igroup1
0 /vol/vol1/qtree1/lun2 solaris-igroup2 0 /vol/vol1/qtree1/lun3 solaris-igroup3 0
A.These are type "Solaris" LUNs.
B.These are NFS LUNs, but the exact OS cannot be determined.
C.Not enough information is given here. Run the lun show -v command to get the information requested.
D.Not enough information is given here. Run the lun map command to get the information requested.
Correct:C
8.Which one of the following will enable "symlink_strict_security"?
A.options cifs.symlink_strict_security on
B.cifs shares -change -symlink_strict_security
C.options symlink_strict_security=true 2 / 4
D.options symlink_strict_security=on
Correct:B
9.To configure a storage system as a member of an active directory, the time on the storage system must be synchronized with the time on the Domain Controller.
A.True
B.False
Correct:A
10.The writeable snapshot that is created for a LUN clone depends on ___________.
A.mirroring.
B.the snapshot taken at the time the clone was created.
C.exclusive access to the volume.
D.the data in the original LUN not changing.
Correct:B
11.Which command is the most appropriate for troubleshooting a multiprotocol authentication problem?
A.wcc
B.rdfile /etc/rc
C.priv set advanced
D.sysstat 1
Correct:A
12.A quota target can be defined as _______________.
A.the maximum amount of disk space in a volume.
B.the maximum number of files in a disk.
C.a user, group, or qtree to which a quota is applied.
D.a specific disk space threshold.
Correct:C
13.Which three are used for creating LUNs on the storage appliance? (Choose 3)
A.lun create
B.lun setup
C.FilerView
D.lun config
Correct:A B C
14.What is the outcome of this command? lun create -b /vol/vol2/.snapshot/testsnap/lun0
/vol/vol2/lun0.clone
A.It creates a duplicate of the clone process of lun0.
B.It creates a clone of the writeable snapshot of lun0.
C.It creates a writeable snapshot of lun0.
D.It creates a snapshot "testsnap" of vol2.
Correct:C
15.Which security method encrypts the data?
A.IPSec
B.CHAP
C.LUN masking
D.Header and Data Digests 3 / 4
Correct:A
16.____________ is the default cfmode for new installations of Data ONTAP 7.2.
A.single image
B.mixed
C.partner
D.dual fabric
Correct:A
17.Which command would you use to verify that the iSCSI service is running?
A.license add iSCSI
B.iscsi service
C.iscsi status
D.iscsi protocol
Correct:C
18.If you believe you have a FC SAN performance problem, which NetApp utility or command would gather both your Solaris host and storage appliance data for analysis?
A.poststat
B.perfstat
C.prestat
D.sio_ntap.exe
Correct:B
19.What is the definition of the cifs setup command?
A.It displays the mount point of all shared directories.
B.It displays the names of all mounted directories on the storage system.
C.It displays the prompts for CIFS configuration information.
D.It displays a list of the users on the storage system.
Correct:C
20.UNIX allow file access based on __________.
A.GID or UID and UNIX permissions.
B.NT ACLs and UNIX permissions.
C.NT ACLs and SID.
D.GID or UID and ACLs.
Correct:A
nice
ReplyDelete