Download as pdf or txt
Download as pdf or txt
You are on page 1of 81

Netapp.Actualtests.NS0-155.v2014-03-03.by.brown.

189q
Number: NS0-155
Passing Score: 700
Time Limit: 120 min
File Version: 16.5
Exam Code: NS0-155
Exam Name: NetApp Certified 7-Mode Data Administrator
Exam A
QUESTION 1
How can you "throttle" SnapValue updates and baseline transfers so that the primary or secondary is not
transmitting data as it can?
A. Use the -k option in the snapvault start or snapshot modify commands.
B. SnapVault does not support throttling of network throughout.
C. Use the snapvault throttle command.
D. Use the -k option in the snapvault initialize command.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_snapvault.1.html The snapvault subcommands are:
start [ -r ] [ -k n ] [ -t n ] [ -w ] [-p {inet | inet6 unspec}] [ -o options ] [ -S [primary_filer:]primary_path ]
secondary_qtree
modify [ -k n ] [ -t n ] [-p {inet | inet6 | unspec}] [ -o options ] [ -S primary_filer:primary_path ]
sec_ondary_qtree
The -k option sets the maximum speed at which data is transferred in kilobytes per second. It is used
tothrottle disk, CPU, and network usage. If this option is not set, the filer transmits data as fast as it can.
Thesetting applies to the initial transfer as well as subsequent update transfers from the primary.
QUESTION 2
Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up,
but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1's
disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes
by default, and then forcibly take over Node 1 if the error condition persists?
A. Auto enable of giveback
B. Negotiated Fail Over
C. Takeover on panic
D. Cf.quickloop.enable
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.wafl.co.uk/cf/
http://wafl.co.uk/options/
Negotiated failover is a general facility which supports negotiated failover on the basis of decisionsmade by
various modules.
cf.takeover.on_disk_shelf_miscompare
This option allows negotiated takeover to be enabledwhen the cluster nodes detect a mismatch in disk
shelfcount. By default, this option is set to off.
This option is available only when cluster is licensedand changing the value on one filer
automaticallychanges the value on the partner filer.
QUESTION 3
In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)
A. User quotas
B. Tree quotas
C. Root quotas
D. Group quotas
E. File quotas
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas,however, do apply even to root and the Windows Administrator account.
QUESTION 4
Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)
A. Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bit
B. Data ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bit
C. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.1 64-bit
D. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.0.2 64-bit
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation: Volume SnapMirror Interoperability Matrix.
Reference: SnappMirror Async Overview and Best Practices guide.
QUESTION 5
An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are
available. Data ONTAP will then perform what action.
A. Chooses a 72-Gigabyte disk and use it as is.
B. Chooses a 72-Gigabyte disk and right-size it.
C. Halts after 24 hour of running in degraded mode.
D. Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-8A91F6A2-61B8-42C3- Network Appliance
NS0-155 Exam
AEAB7D5AA9BBE9CF.html
If a disk fails and no hot spare disk that exactly matches the failed disk is available, Data ONTAP uses the
bestavailable spare. Understanding how Data ONTAP chooses an appropriate spare when there is no
matchingspare enables you to optimize your spare allocation for your environment.
Data ONTAP picks a non-matching hot spare based on the following criteria (and more; in the link above):
If the available hot spares are not the correct size, Data ONTAP uses one that is the next size up, ifthere is
one.
The replacement disk is downsized (aka right sized) to match the size of the disk it is replacing; theextra
capacity is not available.
QUESTION 6
Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?
A. All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.
B. The expansion is triggered by an aggr convert command.
C. The expansion is triggered by adding disks to exceed 16 TB.
D. The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with
Data ONTAP 8.1 upgrade.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html To upgrade an aggregate in-place,
the only available method is to add disks to expand the aggregate to>16TB.
QUESTION 7
What utility on the storage system will allow you to capture network packet information?
A. Snoop
B. Netstats
C. Pktt
D. Traceroute
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The pktt command controls a simple on-filer packet tracing facility. Packets can be captured into a
tracebuffer then dumped to a file, or the captured data can be logged to a file. The data is stored in
"tcpdump"format, and can be directly viewed with tcpdump, ethereal, and perhaps other viewers. The
output can also beconverted using the editcap(1) program to a variety of other formats, including Sniffer,
NetMon, and snoop.
QUESTION 8
The root admin on the UNIX box receives an "Access Denied" message when he attempts to access a
newly mounted qtree. What's the most likely cause of this error?
A. The qtree is missing from the /etc/hosts file.
B. NFS is turned off on the storage system.
C. The qtree is set to ntfs security style.
D. The qtree has not been exported.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-F6304830-B124-40A5-95D6-
C646AA85E9E0.html
Only hostnames and IPs are referenced in /etc/hosts, so A is incorrect. Thequestionstates that the qtree
wasmounted, and B and D would preclude this so they are incorrect. You need to set a qtree to mixed or
unix security style to support UNIX users.
QUESTION 9
Which two modes support using SnapMirror over multiple network paths?
A. Standalone
B. Partner
C. Multi
D. Failover
E. Give back
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-75BD4540-A103-4E2B-8B0A-
E6BBC0D3F43F.html
http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html
Two multipath methods are supported:
The multiplexing mode causes snapmirror to use both paths at the same time. If one should fail, it will
switchto use the remaining path only and use both again should the failing path be repaired. Failover mode
causes snapmirror to use the first path as the desired path and only use the second pathshould problems
arise with the first path.
QUESTION 10
Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two)
A. Options snapmirror.access on
B. Options snapmirror.resync on
C. Snapmirror initialize
D. Snap mirror resync
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html snapmirror initialize [ -
S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destinationStarts an initial transfer
over the network. An initial transfer is required before update transfers can take place.
The initialize command must be issued on the destination node. If the destination is a volume, it must
berestricted (see na_vol(1) for information on how to examine and restrict volumes). If the destination is a
qtree, itmust not already exist (see na_qtree(1) for information on how to list qtrees). If a qtree already
exists, it mustbe renamed or removed (using an NFS or CIFS client), or snapmirror initialize to that qtree
will not work.
snapmirror resync [ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ]
destinationResynchronizes a broken-off destination to its former source, putting the destination in the
snapmirrored stateand making it ready for update transfers. The resync command must be issued on the
destination node.
QUESTION 11
Which two operations can be performed with the SnapDrive for windows graphical user interface?
A. Create volume
B. Create Snapshot copies
C. Create File
D. Create Disk
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278920
What SnapDrive does
SnapDrive software integrates with the Windows Volume Manager so that NetApp filers can serve as
virtualstorage devices for application data in Windows 2000 Server and Windows Server 2003
environments.
SnapDrive is dependent on the virtual disk service. The virtual disk service must be started on the host prior
toinstalling SnapDrive. SnapDrive manages virtual disks (LUNs) on a NetApp filer, making these virtual
disksavailable as local disks on Windows hosts. This allows Windows hosts tointeract with the virtual disks
just as if they belonged to a directly attached redundant array of independentdisks (RAID).
SnapDrive provides the following additional features:
It enables online storage configuration, virtual disk expansion, and streamlined management. It integrates
NetApp Snapshot technology, which creates point-in-time images of data stored on virtualdisks.
It works in conjunction with SnapMirror software to facilitate disaster recovery from either
asynchronouslyor synchronously mirrored destination volumes.
QUESTION 12
Which storage system command would display the WWPNs of hosts that have logged into storage system
using a Fibre Channel connection?
A. fcp config
B. fcp initiator show
C. fcp show i
D. fcp show initiator
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html
fcp show initiator [ -v ] [ adapter ]
If no adapter name is given, information about all initiators connected to all adapters are shown. The
command displays the portname of initiators that are currently logged in with the Fibre Channel
targetadapters. If the portname is in an initiator group setup through the igroup command, then the group
name isalso displayed. Similarly, all aliases set with the fcp wwpn-alias command for the portname are
displayed aswell.
If the -v flag is given, the command displays the Fibre Channel host address and the nodename/portname
ofthe initiators as well.
QUESTION 13
In a Fiber Channel configuration, the host's HBA is referred to as the ___________, and the storage
system's HBA to as the _____________.
A. Target, initiator
B. Primary, secondary
C. Initiator, target
D. Secondary, primary
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 14
Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?
A. Running snapmirroe update on the source storage system.
B. Running snapmirror release on the source storage system.
C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html https://
library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html snapmirror update [ -S
source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination
For asynchronous mirrors, an update is immediately started from the source to the destination to update
themirror with the contents of the source.
For synchronous mirrors, a snapshot is created on the source volume which becomes visible to clients of
thedestination volume.
The snapmirror update command must be issued on the destination filer. snapmirror release source
{ filer:volume | filer:qtree } Tell SnapMirror that a certain direct mirror is no longer going to request updates.
If a certain destination is no longer going to request updates, you must tell SnapMirror so that it will no
longerretain a snapshot for that destination. This command will remove snapshots that are no longer
needed forreplication to that destination, and can be used to clean up SnapMirror- created snapshots after
snapmirrorbreak is issued on the destination side.
The source argument is the source volume or qtree that the destination is to be released from. The
destinationargument should be either the destination filer and destination volume name or the destination
filer anddestination qtree path. You can use a line from the output of the snapmirror destinations command
as the setof arguments to this command.The /etc/snapmirror.conf file exists on the node containing the
mirror used for SnapMirror.
QUESTION 15
You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the
directory structure no longer exists. Which is the most likely explanation?
A. Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore.
You must now SnapRestore the volume.
B. Snapshot copies have been created since the original directory structure was deleted.
C. You must recreate the directory structure before trying to restore the file.
D. You cannot restore a file to an alternate location.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html
You can restore a file only to the volume where it was originally located. The directory structure to which a
fileis to be restored must be the same as that specified in the path. If this directory structure does not exist,
youmust create it before restoring the file.
QUESTION 16
Which mechanism allows you to make LUNs available to some initiators and unavailable to others?
A. LUN masking
B. LUN grouping
C. LUN cloning
D. LUN hiding
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/Logical_Unit_Number_masking Logical Unit Number Masking or LUN masking
is an authorization process that makes a Logical Unit Numberavailable to some hosts and unavailable to
other hosts.
QUESTION 17
An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a
______________ you can have one or more ____________.
A. session, session, connections
B. connection, session, connections
C. connection, connection, sessions
D. session, connection, sessions
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://scst.sourceforge.net/mc_s.html
http://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf
Meme: Remember the acronym: MCS or MC/S - Multiple Connections per Session. Microsoft Windows
2008'sMPIO driver supports MC/S.
QUESTION 18
Which NetApp Virtual Storage Tier component works at the host level?
A. Flash Pool
B. Flash Disk
C. Flash Accel
D. Flash Cache
E. Flash IO
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3366.pdf&cc=us Flash Accel utilizes server-
based flash storage as cache for the host.
QUESTION 19
When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX server,
which three valid objects to include in the data set? (Choose three)
A. The entire client
B. A directory
C. A file
D. A qtree
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 20
What does it signify if the disks are "not owned" in a FAS2020 system?
A. The disks are mailbox disks.
B. The disks are spare disks.
C. The disks are data disks.
D. The disks are not used.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Disks must be assigned to an aggregate to be used as raid group members or spares.
Unassigned disks aredisplayed as "not owned".
QUESTION 21
For each Open Systems platform directory to be backed up to the SnapVault secondary storage
system you must execute _____________.
A. An initial baseline copy
B. A temporary copy
C. An incremental copy
D. A scheduled update copy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-EEBC8B52-BEA9-4B49-874F-
7EC78D3F602E.html
Each open systems platform, when prompted by the secondary system, transfers initial base images
ofspecified directories to qtree locations on the secondary system. Note: There are no primary-side
Snapshot copies in Open Systems SnapVault.
QUESTION 22
What is the maximum distance between a standard clustered pair at 2Bbps?
A. 100 meters
B. 10 meters
C. 50 meters
D. 500 meters
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 23
Which exportfs command will temporally export the resource while ignoring the options specified in the /etc/
exports file?
A. exportfs v <path>
B. exportfs u <path>
C. exportfs a <path>
D. exportfs i <path>
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_exportfs.1.html exportfs [ -v ] [ -io options
] path-i Ignores the options specified for a file system path in the /etc/exports file. If you do not specify the-
Ioption with the -o option, Data ONTAP uses the options specified for the file system path in the /etc/exports
file instead of the options you specify on the command line.
QUESTION 24
Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?
A. No, but you can file a PVR to request support.
B. No. it is targeted for a future release of Data ONATP.
C. Yes, only with a special license installed.
D. Yes, it has been supported since 8.0.1.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/03/netapp-storage-encryption-available.html March, 2011: "With the recent
release of Data ONTAP 8.0.1, NetApp now offers full disk encryption to preventunauthorized access to data
at rest."
QUESTION 25
Which two cp types would indicate a busy storage system? (Choose two).
A. cp_from_log_full
B. cp_from_busy
C. cp_from_cp
D. cp_from_timer
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html http://redhunter.com/blog/2010/02/11/netapp-
consistency-points-in-cacti/ cp_from_log_full (log full) - the current NVRAM bank is full and the system
switches to the other one andstarts writing this to disk. Very heavy write activity.
cp_from_cp (aka Back to Back) - filer is overloaded. The write traffic is coming in faster than it can be
writtenand the filer is running out of NVRAM capacity in one bank before the data in the other bank can be
written.
cp_from_busy is not a real cp type
cp_from_timer - 10 seconds since the last CP it means the system is pretty idle write-wise.
QUESTION 26
There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct sequence of
these phases?
A. Setup Phase, Mirror Phase, Cutover Phase
B. Initialization phase, Copy Phase, Migrate Phase
C. Begin Phase, Move Phase, Complete Phase
D. Setup Phase, Data Copy Phase, Cutover Phase
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1- 17848/
PDF_Tips_Data_Motion_0211.pdf
Non-disruptive Volume Movement is called DataMotion. DataMotion uses SnapMirror for volume migration.
A DataMotion migration occurs in three phases:
1. Setup
2. Data copy
3. Cutover
QUESTION 27
Which statement describes the results of the SnapMirror resynce command?
A. Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and
removes all newer information on the storage system on which the command is run.
B. Resynchronization will cause the loss of all data written to the destination after the original base
snapshot was made.
C. Resynchronization will update the snapshot on the destination filer.
D. Resynchronization will update the snapshot on the source filer.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
snapmirror resync
[ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination
Resynchronizes a broken-off destination to its former source, putting the destination in the snapmirrored
stateand making it ready for update transfers. The resync command must be issued on the destination
node.
The resync command can cause data loss on the destination. Because it is effectively makingdestination a
replica of the source, any edits made to the destination after the break will be undone.
For formerly mirrored volumes, the resync command effectively performs a SnapRestore (see na_vol
(1)) on the destination to the newest snapshot which is common to both the source and thedestination. In
most cases, this is the last snapshot transferred from the source to the destination, butit can be any
snapshot which is on both the source and destination due to SnapMirror replication. Ifnew data has been
written to the destination since the newest common snapshot was created, thatdata will be lost during the
resync operation.
QUESTION 28
If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to these files?
A. /vol/vol0/etc/log/snaplog/
B. /vol/vol0/etc/snapmirror/
C. /vol/vol0/etc/snaplog/
D. /vol/vol0/etc/log/
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
The root volume is always vol0 and etc is contained therein. When exporting the root volume via NFS,
thepath is/vol/vol0; so the full path to snapmirror log files is /vol/vol0/etc/log.
/etc/log/snapmirror.
This file logs SnapMirror activity. Log file for current week. /etc/log/snapmirror.[0-5]SnapMirror log files for
previous weeks.
QUESTION 29
Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths
to a LUN.
A. Token ring, physical
B. FC SAN, virtual
C. FC or IP SAN, virtual
D. FC or IP SAN, Physical
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/Multipath_I/O
Fiber Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI further encapsulate the
transportwithin IP; hence the term IP SAN.
In computer storage, multipath I/O is a fault-tolerance and performance enhancement technique whereby
thereis more than one physical path between the CPU in a computer system and its mass storage devices
throughthe buses, controllers, switches, and bridge devices connecting them.
A simple example would be a SCSI disk connected to two SCSI controllers on the same computer or a
diskconnected to two Fibre Channel ports. Should one controller, port or switch fail, the operating system
can routeI/O through the remaining controller transparently to the application, with no changes visible to the
applications,other than perhaps incremental latency.
QUESTION 30
Which two will allow you to read and analyze a packet trace file generated by the storage system? (Choose
two)
A. WireShark
B. Pktt
C. Netmon
D. Eternal View
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
pktt is part of the Data OnTap command set.
The output of pktt is not very human-readable, but it utilizes the tcpdump format which many traffic
analyzerscan read or import. Only two such analyzers have been offered here.
Wireshark is the successor of Etherreal, and available for several platforms. Netmon is a Microsoft
project,available for Windows, soon to be deprecated by the Microsoft Message Analyzer project.
QUESTION 31
How does the NetApp Remote Agent (RSA) connect to NetApp Support?
A. NetApp Support initiates a non-secure connection to the RSA.
B. NetApp Support initiates a secure connection to the RSA.
C. The RSA initiates a secure connection to NetApp Support.
D. The RSA initiates a non-secure connection to NetApp support.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMP1200040
Remote Support Agent is the facility to provide NetApp Support Engineers with the ability to remotely
triggerAutoSupport.
Remote Support Agent uses HTTP or HTTPS to communicate with the storage controller to initiate
commandsand to collect files. It uses HTTPS to send system logs and core files from the Data ONTAP root
volumeto Remote Support Enterprise on the NetApp Support side. NetApp RSA is not related to the RSA
public key encryption algorithm.
QUESTION 32
Which two commands can be used to enable LUN reservations? (Choose two)
A. lun set reservation
B. lun reservation set
C. lun map
D. lun create
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun set reservation lun_path [ enable | disable ]
Enables or disables the space reservation on the LUN. If no arguments are supplied after the lun_path,
thenthe space reservation status of the given lun_path is displayed. lun create -s size -t ostype [ -o
noreserve ] [ -e space_alloc ] lun_path This usage of the lun create command should be employed to
create a new LUN of given size, with initiallyzero contents. The LUN is created at the lun_path given. No file
should already exist at the given lun_path. Thedirectory specified in the lun_path must be a qtree root
directory.
The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be
used: c(1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m).
The size of the created LUN could be larger than the size specified, in order to get an integral number
ofcylinders while reporting the geometry using SAN protocols.
The size of the LUN actually created is reported if it is different from that specified in the command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a
singleslicepartition), windows (the LUN will be used to store a raw disk device in a single- partition Windows
diskusing the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX
data), aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the
LUN will beused to store a Linux raw disk without any partition table), netware (the LUN will be used to store
NetWaredata), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to
storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be
used tostore Windows data for Windows 2008 systems), openvms (the LUN will be used to store Open-
VMS data),xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V
data), solaris_efi
By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.
"Pass Any Exam. Any Time." - www.actualtests.com 21
Network Appliance NS0-155 Exam
Using this option will create a LUN without any space being reserved. Provisioning threshold events can
beenabled by specifying -e space_alloc option. This option has to be used in conjunction with -o noreserve.
lun map [ -f ] lun_path initiator_group [ lun_id ]
Maps a LUN to all the initiators in the supplied group. If a LUN ID is not specified, the smallest number that
canbe used for the various initiators in the group is automatically picked. Note that this command can be
usedmultiple times to configure multiple maps for a LUN, or for an initiator group. Once created, you can
use lunshow -m to list all the LUN mappings. The optional -f argument disables checking with the HA
partner for LUN mapping conflicts.
QUESTION 33
Which Data ONTAP option sets system-wide for all transfers?
A. Options transfers.wide.enable
B. Options transfer.throttle.enable.
C. Option replication.wide.enable
D. Options replication.throttle.enable
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
replication.throttle.enableEnables global network throttling of SnapMirror and SnapVault transfers.
The default value for this option isoff.
replication.throttle.incoming.max_kbs
This option specifies the maximum total bandwidth used by all the incoming (applied at destination)
SnapMirrorand SnapVault transfers, specified in kilobytes/sec. The default value for this option is unlimited,
which meansthere is no limit on total bandwidth used. This option is valid only when the option
replication.throttle.enable ison.
replication.throttle.outgoing.max_kbs
This option specifies the maximum total bandwidth used by all the outgoing (applied at source) SnapMirror
andSnapVault transfers specified in kilobytes/sec. The default value for this option is unlimited, which
means thereis no limit on total bandwidth used. This option is valid only when the option
replication.throttle.enable is on.
QUESTION 34
What is the correct format for the scheduling component of a SnapVault schedule?
A. cnt[@day_list][@hour_list]
B. YYYY-MM-DD
C. Crontable format
D. List of dates in ISO Date format
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html http://
www.geekyfacts.com/index.php?option=com_content&view=article&id=64:snapvault snapvault snap sched
[ -f ] [ -x ] [ -o options ] [ volname [ snapname [ schedule]]] schedule is cnt[@day_list][@hour_list] or cnt
[@hour_list][@day_list] In the schedule, cnt tells SnapVault how many of the snapshots to keep for
primaries and for non- SnapLocksecondary volumes. The snapshots will be numbered newest to oldest
from 0 to cnt-1. When creating a newsnapshot, SnapVault will delete the oldest snapshots, increment by
one the number on the remainingsnapshots and then create a new number 0 snapshot. If a snapshot is
missing from the sequence (e.g. sv.0,sv.1, and sv.3 exist but sv.2 does not), only snapshots that need to be
renumbered to make room for the newsv.0 snapshot will be renumbered. In the example, sv.0 and sv.1
would be renamed to sv.1 and sv.2, but sv.3would remain unchanged.
The cnt in the schedule is interpreted differently for SnapVault secondary SnapLock volumes. For
SnapLocksecondary volumes, snapshots are created with a name that includes an encoded date and time
of when thesnapshot is created. These snapshots are never renamed and they are never automatically
deleted. Thesesnapshots may be deleted using snap delete after the retention period of the snapshot has
expired. If cnt is 0,no snapshots will be taken. If cnt is any non-zero value, snapshots will be taken and no
snapshots will beautomatically deleted.
If specified, the day_list specifies which days of the week the snapshot should be created. The day_list is
acomma-separated list of the first three letters of the day: mon, tue, wed, thu, fri, sat, sun. The names are
notcase sensitive. Day ranges such as mon-fri can also be given. The default day_list is mon-sun, i.e. every
day.
If specified, the hour_list specifies which hours of the day the snapshot should be created, on each
scheduledday. The hour_list is a comma-separated list of the hours during the day, where hours are
integers from 0 to23. Hour ranges such as 8-17 are allowed. Also, step values are allowed in conjuction
with ranges. Forexample, 0-23/2 means "every two hours". The default hour_list is 0, i.e. midnight on the
morning of eachscheduled day.
QUESTION 35
When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?
A. When the 64-bit volumes has Volume Guarantee disabled
B. When the 64-bit volume has compression enabled
C. When the 64-bit volume has FlexShare enabled
D. When the 64-bit volume has ASIS enabled
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-87340429-8F4A-4AA6-B081-
0F5040089C78.html
Data compression requires 64-bit aggregates.
QUESTION 36
UNIX allows file access based on___________.
A. NT ACLs and UNIX permissions.
B. NT ACLs and SID.
C. GID or UID and UNIX permissions.
D. GID or UID and ACLs.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
In OnTap 8.0, when UNIX security style is selected, only UNIX security objects can be used. The
correctanswer is GID, UID and UNIX permissions.
Basic UNIX permissions are organized into three classes: user, group, and others. UNIX operating systems
identify users with a numerical value: a user identifier, also known as a UID or UserID. Each user is a
member of a group of the same name as the user. Like UIDs, groups (GIDs) are alsospecified using a
numerical value.
QUESTION 37
Which NetApp Storage Tier component works controller-wide on a FAS controller?
A. Flash Pool
B. Flash Disk
C. Flash Accel
D. Flash Cache
E. Flash IO
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us http://www.netapp.com/us/
products/storage-systems/flash- cache/index.aspx?ref_source=ntp141p359372brg-c-26967a63-442e-c7e9-
6a73- 00002efa4dd6&gclid=CLLdsqWKrbkCFS4aOgodb1AAuA
Flash Cache is a controller-attached PCIe intelligent caching solution.
Flash Accel is a host-attached caching solution.
Flash Pool utilizes SSDs to enhance performance of disk aggregates (implicitly not controller- wide).
Flash Disk and Flash IO are ambiguous terms.
QUESTION 38
Which NetApp Storage Tier component works aggregate-wide on a FAS controller?
A. Flash Pool
B. Flash Disk
C. Flash Cache
D. Flash Accel
E. Flash IO
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us
http://www.netapp.com/us/products/platform-os/flashpool.aspx Flash Pool utilizes SSDs to enhance
performance of disk aggregates. Flash Cache is a controller-attached PCIe intelligent caching solution.
Flash Accel is a host-attached caching solution.
Flash Disk and Flash IO are ambiguous terms.
QUESTION 39
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional
reserve set to 0%? (Choose two)
A. Snap Autodelete
B. iGroup throttle
C. LUN reset
D. Volume AutoSize
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional- reservation--
lunoverwrite
From the article:
"If you reduce the Fractional Reservation to 0, you need to make sure the rate of change is within the
volumesize, or you need to make sure the volume can auto-grow when required or even snap auto-delete
to reducethe reserved blocks and free up space (although I am not a huge fan of snap auto-delete for
various reasons)."
QUESTION 40
Which set of protocols provide block-level access to NetApp storage?
A. SNA and RPC
B. iSCSI and FCP
C. HTTP and FTP
D. CIFS and NFS
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonlyreferred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP
and FTP provide file access not block access.
QUESTION 41
An iSCSI or FC SAN implementation provides ____________ access to LUNs.
A. VLD
B. VIIP
C. File
D. Block
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonlyreferred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP
and FTP provide file access not block access.
QUESTION 42
Which command on the storage system allows you to display statistics on the performance of system
resource such as CPU, NVRAM, network interfaces, and disks?
A. netstat
B. netdiag
C. pktt
D. sysstat
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html sysstat reports
aggregated filer performance statistics such as the current CPU utilization, the amount ofnetwork I/O, the
amount of disk I/O, and the amount of tape I/O.
QUESTION 43
Which three protocols can coexist on a NetApp storage system? (Choose three)
A. DAFS
B. CIFS
C. DFS
D. FCP
E. NFS
Correct Answer: BDE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Data OnTap can simultaneously serve NAS and SAN protocols. CIFS, NFS, and FC protocol are examples
ofNAS and SAN protocols respectively.
Data OnTap 7.1 or later does not support DAFS.
DFS provides location transparency and redundancy by allowing shares in multiple different locations to
belogically grouped under one folder, or DFS root. While practically a CIFS server shared by a Data OnTap
filercan be a DFS target, DFS namespaces can only be hosted on Windows systems.
QUESTION 44
Which three tools present statistics from the Data ONTAP counter manager? (Choose three)
A. Operations manager
B. Window perfmon
C. Sysstat
D. Stats
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
Explanation: Section: OnTap Administration
Explanation
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html https://
communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5- 34635/
TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf https://communities.netapp.com/groups/chris-
kranz-hardware-pro/blog/2009/04/01/performance-
stats-withoutperfstat-or-ops-mgr
Note in the diagram below how the performance tools integration with Data OnTap. statit and
sysstatinterface directly with the performance counters while the other tools - including stats, a command
line tool -integrate with the Counter Manager.
QUESTION 45
What security mechanism can an administrator use on an OSSV client to use permissions allowing backup
to a SnapVault secondary system?
A. MD5 authentication between SnapVault primary and secondary, with changeable password
B. Contents inside file called access and located in OSSV /snapvault/etc
C. QSM access list modifiable via svconfigurator
D. Via /etc/hosts.equiv file
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf In order to
restrict the NetApp secondary systems that are allowed to initiate backups from an OSSV host, theQSM
Access List field can be populated with the hostname of the secondary using the OSSVConfigurator utility.
When using this option, make sure the "Check QSM Access List" box is enabled.
The snapvault.access option on the NetApp secondary can be used to restrict the OSSV hosts that
areallowed to initiate restores from that secondary system. This option can be populated with a list of
hostnamesfor each OSSV host. For example:
options snapvault.access host=ossv1,ossv2,ossv3
Screenshot of the svconfigurator GUI; note the QSM access list checkbox and field.
QUESTION 46
Which command disables client access to Snapshot copies on a volume called flexvoll?
A. cifs shares change flxvoll nosnap
B. snap access flexvoll off
C. vol options flexvoll nonsnapdir on
D. vol options flexvoll snapdir off
E. vol options flexvoll snapdir on
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html vol options nosnapdir [on|off]
If this option is on, it disables the visible .snapshot directory that is normally present at client
mount points, andturns off access to all other .snapshot directories in the volume. The default setting is off.
QUESTION 47
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the
disaster site node. (Choose two)
A. Use manual fencing
B. Use the cf giveback f command.
C. Use the cf forcetakeover d command.
D. Turn off power to the disaster site node.
E. Isolate the failed node from the surviving node.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://vipulvajpayeestorage.blogspot.com/2012/01/manually-failover-activity-in-netapp.html
In order to test or effect a Disaster Recovery operation, you must restrict access to the disaster site nodeto
prevent the node from resuming service. If you do not, you risk the possibility of data corruption.
Access to the disaster site note can be restricted in the following ways:
Turn off the power to the disaster site nodeUse "manual fencing" (Disconnect VI interconnects and fiber
channel cables; either physically or throughconfiguration changes on the fabric switches.) Isolating the
failed node from the surviving node could still lead to the possibility of a split brain, so this is not acorrect
answer.
QUESTION 48
The two copies SyncMirror volume are called ____________, which are physical copies of the same file
system and consist of one or more RAID groups.
A. Snapshot copies
B. Aggregates
C. Plexes
D. Volumes
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA-
8FEE619EEF1D.html
SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for real-
timemirroring of data to matching aggregates physically connected to the same storage system.
SyncMirror provides for synchronous mirroring of data, implemented at the RAID level. You can use
SyncMirrorto create aggregates that consist of two copies of the same WAFL file system. The twocopies,
known asplexes, are simultaneously updated. Therefore, the copies are always identical. The two plexes
are directlyconnected to the same system.
The following provides information about the activities of SyncMirror:
SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume isessentially an
aggregate with a single volume that spans the entire aggregate.) SyncMirror cannot be used to mirror
FlexVol volumes. However, FlexVol volumes can be mirrored as part ofan aggregate.
SyncMirror is different from synchronous SnapMirror.
QUESTION 49
You want to create an automated test environment that performs a single file SnapRestore time you run the
procedure, however, SnapRestore prompts you to confirm your decision to revert the file. How can you
automate this step?
A. Use the -f option with the snap restore command.
B. Enable the options snaprestore_noprompts enable = on option.
C. These prompts are for data protection and auditing and cannot be overridden.
D. Enter the priv set advanced mode on the storage system and prompt will not appear.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snap.1.html
snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name | restore_from_path
Reverts a volume to a specified Snapshot copy, or reverts a single file to a revision from a specified
Snapshotcopy.
Before reverting the volume or file, the user is requested to confirm the operation. The -f optionsuppresses
this confirmation step.
QUESTION 50
When viewing the output of the sysstat f command, which three fields are part of the output? (Choose
three)
A. FCP
B. FTP
C. CIFS
D. NFS
E. iSCSI
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html
sysstat [ -c count ] [ -s ] [ -u | -x | -m | -f | -i | -b ] [ -d ] [ interval ] -f For the default format display FCP
statistics.
The FCP default output format is as follows:
CPU NFS CIFS FCP Net kB/s Disk kB/s FCP kB/s Cache
in out read write in out age
###% ##### ##### ##### ##### ##### ##### ##### ##### ##### >##
QUESTION 51
Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS users are
now complaining about getting "stale file handles" for the file. Which is the most likely cause of this
problem, and the best procedure to correct it?
A. This might be due to an NFS storage system and client mismatch. Check to see that these users have
the same version of the NFS client that existed at the time the snapshot was taken.
B. NFS users why try to access a reverted file without first reopening it might get a
handle" error message. Have the users try to reopen the file and see if the problem is resolved.
C. After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their
systems.
D. These users are on a different subnet from the others. Start troubleshooting by checking their subnet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html
Reverting a file to a selected Snapshot copy
Using snap restore to revert a single file to a selected Snapshot copy is practical when the file is so large
thatyou cannot copy the previous file version from the Snapshot copy to the active file system.
Before you beginEnsure that you notify the network users before reverting a file so that they know that the
current data in the filewill be replaced by that of the selected Snapshot copy.
Note: NFS users who try to access a reverted file without first reopening it might get a stale filehandle error
message after the volume reversion.
QUESTION 52
Using the output below, a co-worker determined that these are types "Solaris" LUNs. What would your
destination be?
lun show m LUN patch mapped to LUN ID -------------------------------------------------------
/vol/vol1/lun0 solaris igroup0 0 /vol/vol1/lun solaris- igroup1
0 /vol/vol1/qtree1/lun2 solaris igroup2 0 /vol/vol1/qtree1/lun3 solaris igroup3 0
A. These are type "Solaris" LUNs.
B. Not enough information is given here. Run the lun status command to get the information requested.
C. Not enough information is given here. Run the lun show v command to get the information requested.
D. Not enough information is given here. Run the lun map command to get the information requested.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
Which statement is true about ASIS deduplication license with Data ONTAP 8.1?
A. The existing 8.0 license key is used.
B. A new license key is generated.
C. The license is capacity-based.
D. The license no longer exists.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1120690/html/frameset.html
Changes to deduplication in 8.1 7-mode
Starting with Data ONTAP 8.1, you can enable the deduplication feature without adding a license.
For
deduplication, no limit is imposed on the supported maximum volume size. The maximum volume sizelimit
isdetermined by the type of storage system regardless of whether deduplication is enabled.
QUESTION 54
Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that
was in a level-0 resynchronization state when it failed?
A. Determine which volumes are at the remote and disaster sites.
B. Re-create the synchronous mirror.
C. Rejoin the two volumes.
D. Turn on power to the cluster node at the disaster site.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1210206/html/GUID-A865DB95-9418-4ED2-A993-
74F347F674A0.html
1. Validate that you can access the remote storage by entering the following command:
aggr status -r
Note: A (level-0 resync in progress) message indicates that a plex cannot be rejoined.
2. Turn on the power to the node at the disaster site. After the node at the disaster site boots up, it displays
thefollowing:
Waiting for giveback...(Press Ctrl-C to abort wait)
3. If the aggregates at the disaster site are online, take them offline by entering the following command for
eachaggregate that was split:
aggr offline disaster_aggr
disaster_aggr is the name of the aggregate at the disaster site. Note: An error message appears if the
aggregate is already offline.
4. Destroy every target plex that is in a level-0 resync state by entering the following command:
aggr destroy plex_name
5. Re-create the mirrored aggregates by entering the following command for each aggregate that was split:
aggr mirror aggr_name -v disaster_aggr
aggr_name is the aggregate on the surviving site's node. disaster_aggr is the aggregate on the disaster
site's node. The aggr_name aggregate rejoins the disaster_aggr aggregate to reestablish the
MetroClusterconfiguration.
6. Enter the following command at the partner node:
cf giveback
The node at the disaster site reboots.
QUESTION 55
When running deduplication on SnapVault destinations, which three statements are true?
A. The target SnapVault controller deduplicates inline.
B. The source SnapVault data is deduplicated inline on the target before it is written to disk.
C. Deduplication internally synchronizes with the SnapVault schedule on the destination.
D. The source (primary) system sends duplicated data even if the source data is deduplicated.
E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the
snapshot toeffectively deduplicate savings.
"Pass Any Exam. Any Time." - www.actualtests.com 36
Network Appliance NS0-155 Exam
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-E5AD37DE-2F44-47DB-90A3-
C8E115FCBFB7.html
SnapVault replicates at the file level not the block level. Deduplication is always a post-processed activity
for Data OnTap, while compression is an inline process.
The deduplication schedule depends on the SnapVault update schedule on the destination system.
A new Snapshot copy replaces the archival Snapshot copy after deduplication finishes running on
thedestination system. (The name of this new Snapshot copy is the same as that of the archival copy, but
theSnapshot copy uses a new timestamp, which is the creation time.) The SnapVault update recognizes the
deduplicated blocks as changed blocks. Thus, when deduplication is runon an existing SnapVault source
for the first time, all saved space is transferred to the destination system.
QUESTION 56
If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solaris
host and storage system data for analysis?
A. sio_ntap.exe
B. prestart
C. poststat
D. perfstat
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/docs/DOC-1059
Performance and Statistics Collector (perfstat) is a data collection tool with several key properties:
Perfstat comes in exactly two flavors:
Supported platforms:
QUESTION 57
Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?
A. FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 syns
B. FilerA:source_vol FilerB:destination_vol 0-55/5 * * *
C. FilerA:source_vol FilerB:destination_vol sync
D. FilerA:source_vol FilerB:destination_vol outstanding=3s sync
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html Each relationship
entry of the /etc/snapmirror.conf file is a single line containing space-separated fields.
The entry has this format:
Source destination arguments scheduleschedule
This is the schedule used by the destination node for updating the mirror. It informs the SnapMirror
schedulerwhen transfers will be initiated. The schedule field can contain the word sync to specify fully
synchronousmirroring, semi-sync to specify semi-synchronous mirroring, or a cron-style specification of
when to update themirror.
visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h
(hours). If a suffix is not specified, value is interpreted as seconds. This argument controls the amount of
timebefore an automatic snapshot is created on the source volume that is synchronously mirrored. The
value is thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A
small numberhere can negatively affect the performance of the mirror. This argument is ignored for
asynchronous mirrors.
Outstanding (deprecated)
This argument controls the performance versus synchronicity trade-off for synchronous mirrors. The value
forthis argument is a number followed by the suffixes: ops (operations), ms (milliseconds) or s (seconds).
Settinga value less than 10s configures the mirror to run in fully synchronous mode. Setting a value greater
than orequal to 10s configures the mirror to run in semi-synchronous mode. This argument is ignored
forasynchronous mirrors. Please note that this is a deprecated option. Use the schedule field to specify
thesynchronous mode for the mirror.
cksum
This controls which checksum algorithm is used to protect the data transmitted by SnapMirror.
Currentlysupported values are "none", "crc32c", and "crc32c_header_only". The value
"crc32c_header_only" has beenadded only for volume SnapMirror and is not supported for synchronous
SnapMirror and qtree SnapMirror.
QUESTION 58
Which three are valid LUN commands? (Choose three)
A. lun clone
B. lun copy
C. lun move
D. lun rename
E. lun snap
Correct Answer: ACE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:
QUESTION 59
Which three attributes would you specify when creating a LUN? (Choose three)
A. The host operating system of the system attached to LUN.
B. The version of Data ONTAP
C. The size of the LUN.
D. The path to the LUN.
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The usage for lun create is shown below. Options not in brackets are mandatory. lun create -s size -t ostype
[ -o noreserve ] [ -e space_alloc ] lun_path This usage of the lun create command should be employed to
create a new LUN of given size, with initiallyzero contents. The LUN is created at the lun_path given. No file
should already exist at the given lun_path. Thedirectory specified in the lun_path must be a qtree root
directory.
The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be
used: c(1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m). The size of the created LUN could be larger
than the size specified, in order to get an integral number ofcylinders while reporting the geometry using
SAN protocols.
The size of the LUN actually created is reported if it is different from that specified in the command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a
singleslicepartition), windows (the LUN will be used to store a raw disk device in a single- partition Windows
diskusing the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX
data), aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the
LUN will beused to store a Linux raw disk without any partition table), netware (the LUN will be used to store
NetWaredata), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to
storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be
used tostore Windows data for Windows 2008 systems), openvms (the LUN will be used to store Open-
VMS data),xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V
data), solaris_efi(the LUN will be used to store Solaris_EFI data).
By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.
Using this option will create a LUN without any space being reserved. Provisioning threshold events can
beenabled by specifying -e space_alloc option. This option has to be used in conjunction with -o noreserve.
Exam B
QUESTION 1
Which three items are NFS resources for export? (Choose three.)
A. aggregate
B. directory/qtree
C. file
D. subnet
E. volume
Correct Answer: BCE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can export any file path. Implicitly file paths are filesystem objects. You can export a directory, a qtree,
avolume or even a file.
QUESTION 2
Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3740.pdf&cc=us
SMB 2.0 support was included in Data OnTap 8.1.
QUESTION 3
In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore
operations on the file or volume cannot rely on the timestamps to determine what data needs to be backed
up or restored. Which course of action ensures correct incremental backups?
A. Perform a base-level backup of the volume after you restore it.
B. Reboot the storage system to reset timestamps back to their original times before the reversion.
C. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.
D. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup,
and then perform a base-level backup of the volume after you restore it.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A baseline (aka "full") backup is always required before valid incremental backups can be made.
QUESTION 4
Which changes the NDMP password on the Open System SnapVault agent?
A. password
B. password <new_password>
C. svpasswd <new_password>
D. svpassword <new_password>
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://kb.netapp.com/support/index?
Page=content&id=2010134&actp=LIST_RECENT&viewlocale=en_US&searchid=1296570465177 The
svpassword command is available on the OSSV host as part of the agent binaries in the path
<INSTALL_PATH>\netapp\snapvault\bin.
QUESTION 5
Which three licenses are required for fabric-attached MetroCluster? (Choose three.)
A. Cluster
B. Cluster_remote
C. Syncmirror_local
D. Syncmirror_fabric
E. Syncmirror_remote
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf http://
backdrift.org/man/netapp/man1/na_license.1.html In preparation for a fabric attached metrocluster
configuration, the following licenses must be installed:
Clustersyncmirror _local
cluster_remote
syncmirror_fabric and syncmirror_remote are not valid license types.
QUESTION 6
Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)
A. A LUN can be converted into a VLD.
B. LUNs can be accessed using the FCP protocol.
C. LUNs can be accessed using the iSCSI protocol.
D. Block services are associated with an iSCSI or FCP SAN environment.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Sadly, you cannot convert a LUN into a Vulcan Language Dictionary.
QUESTION 7
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utility.
(Choose two.)
A. AutoSupport
B. Bugs Online
C. NetApp Diagnostics
D. Release Comparison
E. System Configuration Guide
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Thisquestionis out of date, but its still on the exam as of Sept2013! NOW has been replaced with
support.netapp.com.
You should be very familiar with what AutoSupport does. Also if you have done any research, you know
thatthe System Configuration Guide is an invaluable tool that you will use regularly. Neither of those are
related tobugs.
Bugs Online (BOL) is located at http://support.netapp.com/NOW/cgi-bin/bol/ Bugs Online provides a suite
oftools to help manage and resolve your bug issues.
The Release Bug Advisor is located at
http://support.netapp.com/NOW/cgi-bin/relrec
There is also a Version Comparison tool available at
https://communities.netapp.com/docs/DOC-8168/diff?secondVersionNumber=8
QUESTION 8
Which two commands on the storage system allow you to gather detailed statistics about network
interfaces, including basic information about network connections? (Choose two.)
A. ifstat -a
B. netdiag -n
C. netstat -i
D. sysstat 1
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ifstat -a provides detailed statistics (multiple pages) about all network interfaces. netstat -i provides a list of
connections and open network sockets (listeners). netdiag -n will perform a diagnostic but does not provide
detailed statistics about networking. sysstat 1 will provide performance statistics but not detailed statistics
about networking.
QUESTION 9
To configure a storage system as a member of a Windows active directory domain, the time on the storage
system must be set to be within plus or minus five minutes of the time on the domain controller.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 10
For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must
do what?
A. Enter the CIFS user in the NIS database.
B. Enter the user names in the /etc/hosts.equiv file.
C. Use both a NIS server and a Domain Controller in the network.
D. Nothing: mapping will occur if user name authentication is available.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html
If the user names in the UNIX password database are identical to the Windows names, you need not
providethe mapping information in the /etc/usermap.cfg file.
QUESTION 11
If the security style is set to UNIX, CIFS client file access is determined by ___________.
A. NT ACLs
B. the last client to set permissions
C. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
D. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html
For Data ONTAP to obtain the UID and GIDs for a CIFS user, it must first determine the user's UNIX-
stylename. It does this through user mapping.
QUESTION 12
NTFS allows file access based on ___________.
A. NT ACLs and SID.
B. NT ACLs and UNIX permissions.
C. SID and password.
D. UNIX permissions.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html
In OnTap 8.0, when NTFS security style is used, only Windows style security objects are used. For CIFS
clients, security is handled using Windows NTFS ACLs. For NFS clients, the NFS UID (user id) is mapped
to a Windows SID (security identifier) and its associatedgroups. Those mapped credentials are used to
determine file access, based on the NFTS ACL.
QUESTION 13
UNIX allows file access based on __________.
A. GID or UID and ACLs.
B. GID or UID and UNIX permissions.
C. NT ACLs and SID.
D. NT ACLs and UNIX permissions.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* Unix-like operating systems identify users within the kernel by an unsigned integer value called a user
identifier, often abbreviated to UID or User ID. The range of UID values varies amongst different systems;
at the very least, a UID represents a 15-bit integer, ranging between 0 and
The UID value references users in the /etc/passwd file. Shadow password files and Network Information
Service also refer to numeric UIDs. The user identifier has become a necessary component of Unix file
systems and processes.
* In POSIX-compliant environments the command-line command id gives the user's user identifier number
as well as more information on the user account like the user name, primary user group and group identifier
(GID).
* Files and directories are owned by a user. The owner determines the file's owner class. Distinct
permissions apply to the owner.
Files and directories are assigned a group, which define the file's group class. Distinct permissions apply to
members of the file's group members. The owner may be a member of the file's group. Users who are not
the owner, nor a member of the group, comprise a file's others class. Distinct permissions apply to others.
The effective permissions are determined based on the user's class. For example, the user who is the
owner of the file will have the permissions given to the owner class regardless of the permissions assigned
to the group class or others class.
QUESTION 14
Executing this command will have what effect?
Options wafl.default_security_style ntfs
A. It will set the security style of all files to be ntfs.
B. It will change the security style of all qtrees to be ntfs.
C. It will change the security style of all existing volumes to be ntfs.
D. It will set the security style of all newly created volumes to ntfs.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
wafl.default_security_style
Specifies the default security style assigned to a new volume. All qtrees created on the volume get this as
theirsecurity style. Legal values for this option are `unix', `ntfs', or `mixed'. The default value for this option is
`unix',unless the node is an NTFS-only node, in which case the default is `ntfs'. Note: if cifs setup is run
after setting wafl.default_security_style, the filer will become an NTFS security stylefiler.
QUESTION 15
Which two statements apply to an entry in the /etc/exports file regarding exporting directories/qtrees and
volumes? (Choose two.)
A. Each volume must be exported separately.
B. Exports are accessible only to hosts with names.
C. User names used in an export must be resolvable.
D. Exports can access multiple paths on the same volume.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html
IP addresses and wildcards can be used when specifying host targets in exports. User names are not valid
exports options, save for the anon option which utilizes a local system UID or username (i.e. no user name
mapping or resolution is performed.) The highest level in the filesystem that can be specified for an export
is the volume level. Implicitly this meansthat each volume must be exported separately. An export provides
access to paths below the export, implying that multiple paths on the same volume can beexported from an
export.
QUESTION 16
To automatically export volumes and directories on storage system reboot, include them in the /etc/exports
file.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html
The /etc/exports file contains a list of export entries for all file system paths that Data ONTAP
exportsautomatically when NFS starts up.
QUESTION 17
Which exportfs command will temporarily export the resource while ignoring the options specified in the /
etc/exports file?
A. exportfs -a
B. exportfs -i
C. exportfs -u
D. exportfs -v
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 18
Which two are Data ONTAP commands for displaying performance information? (Choose two.)
A. nfsstat
B. perfstat
C. sio_ntap_soll
D. sysstat
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html https://library.netapp.com/
ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html
nfsstat and sysstat are OnTap commands used for performance information.
sio_ntap_soll is not an OnTap command.
Perfstat is a GUI performance tool, not an OnTap command. Think of PerfMon for Windows to remind you
thatPerfStat is a Windows tool. Note how many of the ONTAP performance commands end in stat.
QUESTION 19
Which statement best describes the output of this command? sysstat -s 5
A. Display the default output every five seconds and terminate after five counts.
B. Display extended output every five seconds and print a summary after five counts.
C. Display extended output every five seconds and print a summary upon termination.
D. Display the default output every five seconds and print a summary upon termination.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html -s
Display a summary of the output columns upon termination, descriptive columns such as `CP ty' will
nothave summaries printed. Note that, with the exception of `Cache hit', the `Avg' summary for percentage
valuesis an average of percentages, not a true mean of the underlying data. The `Avg' is only intended as a
grossindicator of performance. For more detailed information use tools such as na_nfsstat, na_netstat, or
statit.
QUESTION 20
To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set
on.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
nfs.per_client_stats.enable
Enables/disables the collection and display of perclient NFS statistics, as described in na_nfsstat(1).
Validvalues for this option are on or off. The default value for this option is off.
QUESTION 21
Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)
A. lun create
B. lun config
C. lun make
D. lun setup
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:
Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
QUESTION 22
In a Fibre Channel configuration, the host's HBA is referred to as the ___________, and the storage
system's HBA is referred to as the __________ .
A. initiator, target
B. primary, secondary
C. secondary, primary
D. target, initiator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/SCSI_initiator_and_target
QUESTION 23
Before running lun setup on the storage system, you must first create the igroup to which the initiator will be
attached.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun setup
Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
QUESTION 24
These are three methods of creating a LUN:
* lun create
* lun map
* lun setup
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html The following commands are
available in the lun suite:
Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
lun map [ -f ] lun_path initiator_group [ lun_id ]
Maps a LUN to all the initiators in the supplied group
"Pass Any Exam. Any Time." - www.actualtests.com 52
Network Appliance NS0-155 Exam
QUESTION 25
Which set of commands should be used for troubleshooting Ethernet connectivity problems from the
storage system console?
A. ifstat, netdiag
B. perfstat, tracert
C. sysconfig - cr, sysstat
D. dish shm_stats, sysstat
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html http://backdrift.org/man/
netapp/man1/na_netdiag.1.html
ifstat - display device-level statistics for network interfaces netdiag - perform network diagnostics
QUESTION 26
Which command displays the statistics for Ethernet network interfaces?
A. ifconfig
B. ifstat
C. sysconfig
D. sysstat
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html ifstat - display device-level
statistics for network interfaces
QUESTION 27
Which command is used to set the configuration of an Ethernet network interface?
A. ifconfig
B. ifstat
C. netstat - i
D. sysconfig - v
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_ifconfig.1.html
ifconfig - Configures network interface parameters.
QUESTION 28
What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose three.)
A. Use reallocate -p pathname to run the physical reallocate.
B. Use aggr reallocate -p pathname to run the physical reallocate.
C. Reinitialize any SnapMirror relationship for the new physical geometry.
D. Volume Snapshots do not need to be deleted for the reallocate to run effectively.
E. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier
than 7.2.
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html
The -p option requests that reallocation of user data take place on the physical blocks in the aggregate, but
thelogical block locations within a flexible volume are preserved. Aggregate reallocation is not supported on
aggregates created prior to Data ONTAP 7.2. Using the -p option may reduce the extra storage
requirements in a flexible volume when reallocation is run ona volume with snapshots. It may also reduce
the amount of data that needs to be transmitted by SnapMirror onits next update after reallocation is
performed on a SnapMirror source volume.
QUESTION 29
Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the next
SnapMirror update.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html Using the -p option
may reduce the extra storage requirements in a flexible volume when reallocation is run ona volume with
snapshots. It may also reduce the amount of data that needs to be transmitted by SnapMirror onits next
update after reallocation is performed on a SnapMirror source volume.
QUESTION 30
A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state
of the ____________ at the time the snapshot was created.
A. qtrees
B. volume
C. directory
D. storage system
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_snap.1.html
Snapshots can be made of volumes or aggregates; most commonly the former. Thequestionrefers to a
filesystem, or more specifically a volume.
You cannot snapshot directories or qtrees alone.
QUESTION 31
Data ONTAP uses inodes in an active file system to reference ___________.
A. qtrees
B. disk blocks
C. file segments
D. Snapshot copies
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
All data, whether file or block-based, resides in 4KB blocks on disk. A group of related blocks make up a
file.To accommodate different file sizes, the WAFL filesystem describes each file with reference pointers
calledinodes.
https://communities.netapp.com/servlet/JiveServlet/previewBody/5027-102-1- 6953/PS%20Tech%20Note%
20018%20-%20maxfiles.pdf
Topic 2, Volume B
QUESTION 32
Which command disables client access to Snapshot copies on a volume called flexvol1?
A. cifs shares -change flexvol1 -nosnap
B. snap access flexvol1 off
C. vol options flexvol1 nosnapdir on
D. vol options flexvol1 snapdir off
E. vol options flexvol1 snapdir on
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 33
When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list
command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n,
the _________ the snapshot.
A. older
B. newer
C. more important
D. least important
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
where n is an integer. The most recent weekly Snapshot copy is weekly.0, weekly.1 is the next most
recentweekly Snapshot copy, and so on.
https://library.netapp.com/ecmdocs/ECMP1113957/html/GUID-1D3B0C7D-D94E-43A3-9091-
5E76003E16EB.html
QUESTION 34
A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.
A. 125
B. 251
C. 255
D. Depends on capacity and number of disk drives
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 35
Which three are pre-requisites for using SnapRestore? (Choose three.)
A. The volume to be reverted must be offline.
B. The volume to be reverted must not be a SnapMirror destination.
C. You must enter the SnapRestore license code before you can use it.
D. Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You must meet certain prerequisites before using SnapRestore:
- SnapRestore must be licensed on your storage system.
- There must be at least one Snapshot copy on the system that you can select to revert.
- The volume to be reverted must be online.
- The volume to be reverted must not be in use for data replication. http://hd.kvsconsulting.us/
netappdoc/733docs/html/ontap/onlinebk/GUID-A14081A3-9270-47EE- A1C1-EC52D3ABDBD0.html
QUESTION 36
Which command or procedure would you use to undo a volume SnapRestore operation?
A. snap restore -r vol
B. snap revert -s vol
C. snap restore undo vol
D. You cannot undo a SnapRestore operation at the volume level.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SnapRestore overwrites all data in the file or volume. After you use SnapRestore to revert to a selected
Snapshot copy, you cannot undo the reversion.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-80FEDAF8-75FA-4E43- B683-
58C1F66B61E2.html
QUESTION 37
What happens after you use SnapRestore to revert a volume to a specific snapshot?
A. You must bring the volume back online.
B. The storage system automatically performs a snapshot for that volume.
C. The Snapshot copies that are older than the snapshot you used are deleted.
D. The Snapshot copies that are more recent than the snapshot you used are deleted.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
After you revert a volume to a selected Snapshot copy, you lose all the Snapshot copies that were taken
afterthe selected Snapshot copy.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-80FEDAF8-75FA-4E43-B683-
58C1F66B61E2.html
QUESTION 38
Which three statements are true when using SnapRestore? (Choose three.)
A. The volume must be online.
B. SnapRestore must be licensed before you can use it.
C. The snap restore enable on option must be enabled.
D. The volume to be reverted must not be a SnapMirror destination mirror.
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 39
Which objects can be restored by a single SnapRestore command? (Choose three)
A. file
B. LUN
C. qtree
D. volume
E. directory
Correct Answer: ABD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SnapRestore on a file and volume:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-1E99ACB2-5C69-4FFC-B115-
9D2951D109E9.html
SnapRestore on a LUN:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04-
55E736962FD1.html
Hint: snaprestore at the volume level or at the file level. LUNs are effectively files.
QUESTION 40
Which option of the snap restore command allows you to specify a different directory, as long as the
directory already exists?
A. snap restore -c
B. snap restore -d
C. snap restore -r
D. snap restore s
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
snap restore [ -A | -V ] [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name |
restore_from_path
See more at:http://wafl.co.uk/snap/#sthash.nJiEwxGV.dpuf
QUESTION 41
A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago.
Which command continues the relationship?
A. SnapMirror initialize
B. SnapMirror quiesce
C. SnapMirror resume
D. SnapMirror resync
E. SnapMirror update
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can use the snapmirror resync command to reestablish the connection between the source and
thedestination. This command is applied after the SnapMirror relationship between the source and
destination isbroken.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-5D846D24-0903-4982-A429-
71AE5C0F9033.html
QUESTION 42
When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)
A. The source volume must be offline.
B. SnapMirror must be licensed for each storage system.
C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.
"Pass Any Exam. Any Time." - www.actualtests.com 60
Network Appliance NS0-155 Exam
D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source
destination volume.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You need to fulfill a set of prerequisites before you can use SnapMirror:
- You must purchase and enable the SnapMirror license. If the SnapMirror source and destination are
ondifferent systems, you must enable the SnapMirror license on each system.
- For SnapMirror volume replication, you must create a restricted volume to be used as the destination
volume.
SnapMirror does not automatically create a volume. For information about how to create volumes, see
thesection on organizing data using volumes and qtrees in the Data ONTAP Storage Management Guidefor
7-Mode.
- For SnapMirror volume replication, the destination system must use a version of Data ONTAP that is
thesame as or later than that of the SnapMirror source system.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-ED9C09EF-3F61-41FE-B8F1-
36356C5FEC5F.html
QUESTION 43
Which command would you use to verify that the iSCSI service is running?
A. iscsi protocol
B. iscsi service
C. iscsi show
D. iscsi status
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iscsi status - displays current status of the iSCSI service.
http://wafl.co.uk/iscsi/#sthash.GzOHA2Tj.dpuf
QUESTION 44
Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two.)
A. snapmirror resync
B. snapmirror release
C. snapmirror initialize
D. options snapmirror.access on
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 45
You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?
A. snapmirror restart
B. snapmirror resume
C. snapmirror resync
D. snapmirror update
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
snapmirror resume destination
Resumes transfers to destination. The snapmirror resume command can be used either to abort a
snapmirror quiesce in progress or undo a previously completed snapmirror quiesce. The command
restoresthe state of the destination from quiescing or quiesced to whatever it was prior to the quiesce
operation.
http://wafl.co.uk/snapmirror/#sthash.5u3eilbK.dpuf
QUESTION 46
In a volume SnapMirror relationship, the source and destination volumes must be the same size.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In an active volume SnapMirror relationship, the size of the source and destination file systems is identical.
However, the size of the destination volume can be larger than or equal to the size of the source volume.
Thesize of the file systems must be identical to allow the source to be restored from the destination.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE5EE692-81CF-4569-A703-
00B4E283CE99.html
QUESTION 47
Which two statements apply to the fs_size_fixed volume option? (Choose two.)
A. The default setting is on.
B. This option is automatically set to be on when a volume becomes a SnapMirrored volume.
C. This option turns to off after the snapmirror break command is issued for the relationship.
D. This option causes the SnapMirror destination volume to remain the same size and not grow or shrink
when a SnapMirrored volume relationship is broken.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
This option causes the file system to remain the same size and not grow or shrink when a
SnapMirroredvolume relationship is broken, or when a vol add is performed on it. This option is
automatically set to be onwhen a volume becomes a SnapMirrored volume. It will remain on after the
snapmirror break command isissued for the volume. This allows a volume to be SnapMirrored back to the
source without needing to adddisks to the source volume. If the volume size is larger than the file system
size, turning off this option will forcethe file system to grow to the size of the volume. The default setting is
off.
http://wafl.co.uk/vol-2/#sthash.DbEHR4YS.dpuf
QUESTION 48
Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)
A. The default interval value is five minutes.
B. The smallest interval value supported is 30 seconds.
C. This variable controls the view of the data on the destination system.
D. By setting a value, you specify the amount of time before an automatic snapshot is created on the
source volume that is synchronously mirrored.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/media/tr-3326.pdf
http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html http://hd.kvsconsulting.us/
netappdoc/733docs/html/ontap/onlinebk/GUID-47724B21-7C7E-4AC9- A497-9505B42C27AF.html
With SnapMirror Sync and SnapMirror Semi-Sync, changes to the source volume do not show
upimmediately on the destination volume, even though the changes have been replicated. The changesare
first shown after the source system creates an automatic Snapshot copy of the source volume.
Snapshot copies created on the source volume are immediately propagated to the destination volume.
Theautomatic Snapshot copies are created every three minutes by default.
To change the interval for automatic Snapshot copies, change the visibility_interval in the snapmirror.conf
file; however, performance can degrade if set to a smaller interval because frequent
Snapshot copies cause additional processing such as cache consistency checking on the destination
system.
There is also a disadvantage in setting this to a large value. When the connection between the systems has
anoutage and SnapMirror goes into asynchronous mode, SnapMirror uses the last common Snapshot copy
totransition into synchronous mode. This means that all data from the last valid common Snapshot copy will
needto be replicated from the source to the destination storage system. If the visibility_interval is set to
alarge value, a large amount of data might have to be transferred and itmight take longer time for
SnapMirror totransition into synchronous mode. For these reasons, keep the default value of three minutes.
visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h
(hours). If a suffix is not specified, value is interpreted as seconds. This argument controls the amount of
timebefore an automatic snapshot is created on the source volume that is synchronously mirrored. The
value is thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A
small numberhere can negatively affect the performance of the mirror. This argument is ignored for
asynchronous mirrors.
"Pass Any Exam. Any Time." - www.actualtests.com 64
Network Appliance NS0-155 Exam
visibility_interval={xs | xm | xh}
Determines the amount of time before an automatic Snapshot copy is created on the source volume that
isbeing replicated using synchronous or semi-synchronous SnapMirror. When replicating synchronously or
semisynchronously,using SnapMirror, changes to the source volume do not show immediately on the
destinationvolume, even though the changes have been replicated. The changes are shown only after the
source systemtakes an automatic Snapshot copy of the source volume. This event occurs every three
minutes by default.
You can change the interval for automatic Snapshot copies, but performance can degrade if you set
smallerintervals because Snapshot copies are taken more often. The smallest interval you can set is 30
seconds.
Note: The s, m, and h suffixes specify seconds, minutes, and hours, respectively.
QUESTION 49
SnapMirror will automatically try to restart a transfer after ___________.
A. an initial transfer is interrupted
B. a manual update is interrupted
C. a transfer interrupted by reboot
D. a scheduled incremental update is interrupted
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If a scheduled transfer fails (for example, due to network failure), SnapMirror automatically retries the
transferthe next minute.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-511EAA86-069A-42E8- B62E-
3168C7F0A83D.html
QUESTION 50
Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a synchronous
SnapMirror relationship?
A. sync
B. cksum
C. src_con
D. outstanding
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To convert an asynchronous SnapMirror relationship to a synchronousSnapMirror relationship, on
theadministration host, edit the snapmirror.conf file on the destination system to change the schedule to
sync.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-A78BDBC9-610B-4555-A2DE-
CE6861D92614.html
QUESTION 51
Which option will allow a storage system to SnapMirror from this source system?
A. snapmirror.access
B. snapmirror.destination
C. options snapmirror.allow host =
D. options snapmirror.access host =
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The snapmirror.access option is the preferred method for controlling snapmirror access on a
snapmirrorsource filer.
http://www.wafl.co.uk/snapmirrorallow/#sthash.4Cb8IqqN.dpuf
QUESTION 52
Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?
A. Running snapmirror update on the source storage system
B. Running snapmirror release on the source storage system
C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)
A. throttle
B. visibility interval
C. outstanding=3s in DOT 7.2
D. using option semi-sync in DOT 7.3 and higher
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 54
A NearStore license increases the amount of concurrent replication streams.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 55
Which is true of the SnapVault backup of a NetApp storage system?
A. The file is the basic unit for SnapVault backup destination.
B. The qtree is the basic unit for SnapVault backup destination.
C. The volume is the basic unit of SnapVault backup destination.
D. The directory is the basic unit for SnapVault backup destination.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140-
EB147B941BDA.html
The data structures that are backed up and restored through SnapVault depend on the primary system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore. SnapVault
backs up specified qtrees on the primary system to associated qtrees on the SnapVaultsecondary system.
If necessary, data is restored from the secondary qtrees back to their associated primaryqtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup. SnapVault backs
upspecified directories from the native system to specified qtrees in the SnapVault secondary system.
If necessary SnapVault can restore an entire directory or a specified file to the open systems platform.
The destination system uses a slightly more disk space and directories than the source system.
QUESTION 56
Which system is recommended as a secondary system for SnapVault?
A. IS1200
B. DataFort
C. NearStore VTL
D. FAS with NearStore license
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 57
Which statement applies to the Open Systems SnapVault Free Space Estimator utility?
A. This utility runs automatically after each transfer.
B. This utility must be enabled on the secondary storage system.
C. This utility determines if there is sufficient disk space available on the primary to perform an OSSV
transfer.
D. This utility determines if there is sufficient disk space available on the secondary to perform an OSSV
transfer.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 58
The snapvault snap sched -x command is used to ____________.
A. schedule full backups
B. cancel scheduled backups
C. schedule baseline transfer
D. schedule incremental backups
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 59
The snapvault snap create volume snapname command can be executed on the ___________.
A. open systems
B. primary system only
C. secondary system only
D. secondary or primary systems
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 60
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your
primary system.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 61
Which three statements apply to NearStore Personality license? (Choose three.)
A. It increases the storage capacity.
B. It converts the destination storage system to a NearStore system.
C. It requires the nearstore_option license on the destination storage system.
D. It provides increased concurrent streams when the storage systems are used as destinations for
SnapMirror and SnapVault transfers.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Exam C
QUESTION 1
Which Data ONTAP option sets system-wide throttling for all transfers?
A. options transfer.wide.enable
B. options transfer.throttle.enable
C. options replication.wide.enable
D. options replication.throttle.enable
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 2
The qtree specified for ____ must not exist on the secondary system before you run the ____ command.
A. pri_qtree_path, snapvault start
B. sec_qtree_path, snapvault start
C. pri_qtree_path, snapvault initialize
D. sec_qtree_path, snapvault initialize
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
snapvault initialize is not a valid command
http://backdrift.org/man/netapp/man1/na_snapvault.1.html snapvault start -r [options] -S [prim_system:]
prim_qtree_path [sec_system:] sec_qtree_path
pri_qtree_path is not a valid command
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-DB31E1F4-60A8-4F34- A1C4-
8F79754E4DE2.html
QUESTION 3
The snapvault restore command is run on the _________.
A. secondary system to push data to the primary system
B. primary system to pull data from the secondary system
C. secondary system to pull data from the primary system
D. secondary system to push data to the primary storage system
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html
The snapvault command has a number of subcommands. The set of subcommands differs on the
primaryand secondary.
On the primary, the subcommands allow users to configure and manage a set of snapshots for
potentialreplication to the secondary, to abort replication transfers to the secondary, to check status, to
restore datafrom the secondary, and to release resources when a primary qtree will no longer be replicated
to asecondary.
On the secondary, the subcommands allow users to configure and manage the replication of primary paths
tosecondary qtrees, to configure and manage the snapshot schedules which control when all the qtrees in
asecondary volume are updated from their respective primary paths and how many snapshots to save, to
aborttransfers, to check status, and to release resources preserved to restart backups from a restored
qtree.
QUESTION 4
To restore a qtree protected with SnapVault from the secondary storage system to the primary
storage system, you can ______________. (Choose two.)
A. restore to a non existing qtree with DOT 7. 2
B. add the new qtree to the primary storage system with DOT 7.2
C. overwrite the existing qtree on the primary storage system with DOT 7.3
D. delete the existing qtree from the secondary storage system with DOT 7.3
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DB31E1F4-60A8-4F34-A1C4-
8F79754E4DE2.html
You use the snapvault restore command to restore a backed-up qtree saved to the secondary system.
Startingwith Data ONTAP 7.3, you can restore the data to an existing qtree on the primary system using
baselinerestore or incremental restore.
QUESTION 5
The snapvault update command is only available on the secondary system.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html snapvault update [ -k
n ] [ -s snapname ] [ -w ] sec_ondary_qtree Available on the secondary only. Immediately starts an update
of the specified qtree on the secondary.
QUESTION 6
The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf
Pg 17
OSSV hosts listen for communications from NDMP manager applications on port 10000 by default.
QUESTION 7
What security mechanism can an administrator use on an OSSV client to set permissions allowing backups
to a SnapVault secondary system?
A. Via /etc/hosts.equiv file
B. QSM access list modifiable via svconfigurator
C. Contents inside a file called access and located in OSSV /snapvault/etc
D. MD5 based authentication between SnapVault primary and secondary, with changeable password
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 8
Which tool is available on an OSSV client to assist in starting or stopping the OSSV service, modifying
NDMP settings, enabling debugging, and capturing trace files?
A. Operations Manager
B. Protection Manager
C. Svconfigurator GUI
D. svdebug.exe
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://synergy-ds.com/netapp/tr-3466.pdf
QUESTION 9
Which three statements are true about SnapLock volumes? (Choose three.)
A. SnapMirror supports SnapLock volumes.
B. There are two types of SnapLock volumes.
C. SnapLock volumes support per-file retention periods.
D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V- Series
controller with NetApp Storage.
Correct Answer: ABC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-8ACE3CAB-D338-4AFC-A530-
0D0FEC3B9F94.html
The snaplock command manages compliance related functionality on the system. A volume created using
thevol command (see na_vol(1)) is a snaplock volume when either the enterprise or compliance option is
chosen.
Enterprise and compliance SnapLock volumes allow different levels of security assurance. https://
library.netapp.com/ecmdocs/ECMP1196889/html/GUID-D4533C47-441D-41AB-A8A2-
272A2BFC431C.html
SnapLock operates fundamentally at the file level.
QUESTION 10
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the
Snapshot schedule.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-83A15F85-92A1-4EA8-A9EC-
B9E0E2269E37.html
QUESTION 11
A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination
volume has unexpired WORM files.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-4B97B80F-D208-4154-95BF-
D7FF9F5BEE11.html
A volume SnapMirror relationship is not allowed between two SnapLock Compliance volumes if
the destinationvolume has unexpired files.
QUESTION 12
What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
A. 1
B. 2
C. 4
D. 6
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can cable a maximum of two disk shelves on each loop https://library.netapp.com/ecm/
ecm_download_file/ECMP1210206
QUESTION 13
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
A. disk own -s
B. disk show -v
C. vol status -r
D. disk display r
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
disk show [ -o <ownername> | -s <sysid> | -n | -v | -a]
Used to display information about the ownership of the disks. Available only on systems with software-
baseddisk ownership. -o lists all disks owned by the filer with the name <ownername> -s lists all disks
owned bythe filer with the serial number <sysid> -n lists all unassigned disks. -v lists all disks. -a lists all
assigneddisks.
QUESTION 14
To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For a detailed breakdown of the procedure see the following KB https://kb.netapp.com/support/index?
page=content&id=1011576
QUESTION 15
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both
storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a
file on the NFS mount point for the inaccessible system, but you get the following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the error. You
perform a "cf giveback" and you can now create a file over NFS on both systems. What should you do first
to resolve this issue?
A. Replace the NIC adapter.
B. Submit a new bug report.
C. Use the cluster-config-checker.cgi to identify the problem and corrective action.
D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Thisquestionimplies that there is an issue with the clustering of the two controllers. Since this is the case
youwill want to run the cluster configuration checker to identify and resolve any issues.
https://library.netapp.com/ecmdocs/ECMM1278349/html/upgrade/upgrading/concept/c_oc_upg_b
4_active2.html
QUESTION 16
Each storage system in a cluster must have network access to the __________.
A. Internet
B. cluster partner
C. same administration
D. host same collection of subnets
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
All the network ports should be assigned correct port roles, and all the network ports should be in the
samesubnet.
https://library.netapp.com/ecm/ecm_download_file/ECMP1196907
QUESTION 17
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the
command line. To make this configuration persistent across reboots, you must enter this information in the
_____ file for each system.
A. /etc/rc
B. /etc/hosts
C. /vol/vol0/home
D. /vol/vol0/mount
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Startup commands for your storage system are stored in the /etc/rc file. The /etc/rc file
containscommands that the storage system executes at boot time to configure the system.
Commands in the /etc/rc file configure the storage system to:
Communicate on your network
Use the NIS and DNS services
Save the core dump that might exist if the storage system panicked before it was booted
https://library.netapp.com/ecmdocs/ECMM1278265/html/sysadmin/accessing/concept/c_oc_accs_
systemstartup-etc-rc-file.html#c_oc_accs_system-startup-etc-rc-file
QUESTION 18
What is the maximum distance between a standard clustered pair at 2Gbps?
A. 10 meters
B. 50 meters
C. 100 meters
D. 500 meters
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
The maximum cable length supported for 2Gbps is 500m, the same as the max cable length between a
NetAppstorage system and a FC switch.
Stretch MetroCluster(sometimes referred to as nonswitched) is simply an active-active configuration that
can extend up to 500mdepending on speed and cable type. It also includes synchronous mirroring
(SyncMirror) and the ability to doa site failover with a single command. See Figure 2. Additional resiliency
can be provided through the use ofmultipathing.
QUESTION 19
In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity
of the ________.
A. local interfaces only
B. failed partner interfaces only
C. local and failed partner interfaces
D. interfaces as defined in the /etc/rc file
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In takeover mode, this network interface assumes the identity of the network interface on the partner
http://www.wafl.co.uk/tag/ifconfig/#sthash.3rsjaDZD.dpuf
For the partner interface configuration to be persistent across reboots, you must include the ifconfig
commandin the /etc/rc file
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/nag/GUID-525FCF4E-109D-4E6F-9256-
C6E56438CA9A.html
QUESTION 20
When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. exported and accessible
B. mapped to a Windows server
C. mounted on a host
D. taken offline or unmapped
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04-
55E736962FD1.html
Always unmount the LUN before you run the snap restore command on a volume containing the LUN or
beforeyou run a single file SnapRestore of the LUN. For a single file SnapRestore, you must also take the
LUNoffline.
QUESTION 21
For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex should be
identical with regard to ____________.
A. NVRAM
B. Mirrored Snapshot copies
C. RAID groups and disk sizes
D. NDMP and Snapshot copies
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SyncMirror is essentially a RAID-1 mirror; hence the name. The best practice is to mirror storage of
equalperformance; i.e. identical RAID groups and disk sizes (number of spindles, IOPS). If you were to
mirror twostorage devices of different performance, the slower device would be the limiting factor.
QUESTION 22
What happens when two aggregates are rejoined?
A. It is not possible to rejoin aggregates.
B. Data ONTAP will always retain data from the newest aggregate.
C. Both aggregates revert to the last common snapshot before the split.
D. You will have a large new aggregate containing all volumes from both aggregates.
E. One of the aggregates will be overwritten and you will lose any data changed on it after the split.
Correct Answer: E
Section: (none)
Explanation
Explanation/Reference:
Explanation:
When you rejoin split aggregates, Data ONTAP mirrors the data from one aggregate to the other and
destroysdata that existed on that aggregate before the rejoin.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-B9CB3DA8-E1AF-4BAC-A85B-
64C009010F4A.html
QUESTION 23
You cannot remove the SyncMirror license if one or more mirrored volumes exist.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You cannot disable the SyncMirror license if mirrored aggregates exist and are online.
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-5058FDA7-68AE-4693- B343-
0E9FFEDFC86C.html
QUESTION 24
A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded
plex was built. Data ONTAP will __________.
A. halt all operations to volumes in that pool
B. choose spare disks to reconstruct from the opposite pool
C. warn you that there are no available spares from the proper pool
D. "halt" after 24 hours if spare disks are not added to the proper pool
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Both `warn you that there are no available spares from the proper pool' and `halt after 24 hours if spare disk
arenot added to the proper pool' are correct answers. However, since Data ONTAP alerts you first, 'warn
you thatthere are no available spares' is the best answer. https://library.netapp.com/ecm/
ecm_download_file/ECMP1196912
QUESTION 25
The required hardware to add SyncMirror to an existing system would be ____________.
A. disk shelves and cluster interconnect
B. disk shelves and termination switches
C. disk shelves, Ethernet adapters, and cabling
D. disk shelves, Fibre Channel adapters, and cabling
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 26
Which two are true when creating a SyncMirror volume? (Choose two.)
A. The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.
B. The disks selected for Plex 0 and Plex 1 must come from the same disk pools.
C. The number of disks added must be an even number and equally divided between the two plexes.
D. The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of
the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger capacity disk and
right-sizes it.
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The rules for the selection of disks or array LUNs, for using as mirrored aggregates, are as follows:
Disks or array LUNs selected for each plex must be in different pools. The same number of disks or array
LUNs must be in both the plexes. Disks are selected first on the basis of equivalent bytes per sector (bps)
size, then on the basis of the size ofthe disk.
If there is no equivalent-sized disk, Data ONTAP uses a larger-capacity disk, and limits the size to make
itidentically sized.
Data ONTAP names the plexes of the mirrored aggregate.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-F5F241AF-50C0-4FF3-8C01-
96958581C4D9.html
QUESTION 27
After issuing the aggr split aggr0/plex0 aggrNew command ____________.
A. there is a new plex called aggrNew
B. there are two new plexes, plex0 and plexNew
C. there is a new mirrored aggregate called aggrNew
D. there are two unmirrored aggregates, aggr0 and aggrNew
E. flexible volumes are evenly split between aggr0 and aggrNew
Network Appliance NS0-155 Exam
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html aggr split aggrname/
plexname new_aggrname
Removes plexname from a mirrored aggregate and creates a new unmirrored aggregate named
new_aggrname that contains the plex. The original mirrored aggregate becomes unmirrored. The plex to
besplit from the original aggregate must be functional (not partial), but it could be inactive, resyncing, or out-
ofdate.
Aggr split can therefore be used to gain access to a plex that is not up to date with respect to its partner
plex, if its partner plex is currently failed.
If the aggregate in which plexname resides is embedded in a traditional volume, aggr split behaves
identicallyto vol split. The new aggregate is embedded in a new traditional volume of the same name.
The aggregate in which plexname resides must contain exactly one flexible volume, aggr split will by
defaultrename the flexible volume image in the split-off plex to be the same as the new aggregate.
If the original aggregate is restricted at the time of the split, the resulting aggregate will also be restricted. If
therestricted aggregate is hosting flexible volumes, they are not renamed at the time of the split. Flexible
volumeswill be renamed later, when the name conflict is detected while bringing an aggregate online.
Flexible volumesin the aggregate that is brought online first keep their names. That aggregate can be either
the originalaggregate, or the aggregate resulting from the split. When the other aggregate is brought online
later, flexiblevolumes in that aggregate will be renamed.
If the plex of an aggregate embedded within a traditional volume is offline at the time of the split, the
resultingaggregate will be offline. When splitting a plex from an aggregate that hosts flexible volumes, if that
plex isoffline, but the aggregate is online, the resulting aggregate will come online, and its flexible volumes
will berenamed. It is not allowed to split a plex from an offline aggregate. A split mirror can be joined back
together via the -v option to aggr mirror.
QUESTION 28
Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and _______.
A. offline, quiesced
B. online, consistent
C. online, normal
D. restricted, offline
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Ensure that both plexes of the mirrored aggregate you are splitting are online and operational.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE08C404-6E9C-47F6-A72E-
CDEE2043408C.html
QUESTION 29
You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is
________.
A. in a giveback mode
B. fenced off manually
C. powered on and accessible
D. powered off and inaccessible
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 30
You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which command would
verify that disks are connected and have dual paths?
A. disk show
B. sysconfig -p
C. vol status -r
D. storage show disk -p
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The operator must ensure that the partner filer does not become operational at any time while a filer is in
atakeover mode initiated by the use of this command http://backdrift.org/man/netapp/man1/na_cf.1.html
QUESTION 31
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the
disaster site node. (Choose two.)
A. Use manual fencing.
B. Use the cf giveback -f command.
C. Use the cf forcetakeover -d command.
D. Turn off power to the disaster site node.
E. Isolate the failed node from the surviving node.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 32
In a fabric-attached MetroCluster, a "site failure" is described as a __________.
A. failure of the Inter-Switch-Links (ISL)
B. failure of the interconnect cable
C. complete failure of the primary controller and disk shelves
D. malfunction of the Fibre Channel adapter on the cluster node
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://argoat.net/Blog/?p=1466
QUESTION 33
Which two statements are true of the cf forcetakeover -d command? (Choose two.)
A. Mirrored volumes are implicitly split.
B. Partner mailboxes must be available.
C. The failed cluster node is powered off automatically.
D. The surviving cluster node takes over the functions of the failed partner.
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
It is important to remember that this is the case only when a complete site is lost. In the case of a
failedcontroller at one of the sites, a normal cluster failover occurs. Due to the operation of SyncMirror,
there is alsoadded protection from multidrive or complete shelf failures. When a storage controller fails in
an active-activeconfiguration, the partner detects the failure and automatically (if enabled) performs a
takeover of the dataservingresponsibilities from the failed controller. Part of this process relies on the
surviving controller beingable to read information from the disks on the failed controller. If this quorum of
disks is not available, thenautomatic takeover won't be performed. In a MetroCluster configuration,
manually executing a single commandwill allow a takeover to occur in spite of the lack of a quorum of disks.
This "forced takeover" process breaksthe mirrored relationships in order to bring the failed controller's
volumes on line.
forcetakeover -d is very dangerous. Not only can it cause data corruption, if not used carefully, it can
alsolead to a situation where both the node and its partner are operational (split brain). As such, it should
only beused as a means of last resort when the takeover and forcetakeover commands are unsuccessful
inachieving a takeover. The operator must ensure that the partner node does not become operational at
any timewhile a node is in a takeover mode initiated by the use of this command. In conjunction with RAID
mirroring, itcan allow recovery from a disaster when the two nodes in the HA pair are located at two distant
sites.
QUESTION 34
Protection Manager is an optional component of the Operations Manager that can be licensed and
accessed from the NetApp Management Console (NMC).
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Operations Manager, Protection Manager and Provisioning Manager are all core products of the
UnifiedManager Platform suite.
QUESTION 35
Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp Host Agent
installed.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278642 If no Host Agent is installed, how can
the management tool query the host?
QUESTION 36
Which are three valid data protection solutions? (Choose three.)
A. SnapVault toVolume SnapMirror
B. SnapVault toVolume SnapMirror to SnapVault
C. SnapVault toVolume SnapMirror toVolume SnapMirror
D. Volume SnapMirror to SnapVault
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.redbooks.ibm.com/redpapers/pdfs/redp4268.pdf
When you are using SnapVault in combination with Volume SnapMirror, it is important to understand
theirrelationship with Snapshot. You cannot utilize SnapVault to protect a Volume SnapMirror destination,
becauseSnapVault and SnapMirror both use the same Snapshot copies; they cannot run simultaneously.
Schedulesmust be managed to accommodate the interlock that keeps SnapVault and SnapMirror from
stepping on eachother.
QUESTION 37
Protection Manager has policies that allow for tape-based protection as well as disk-based protection.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278633
QUESTION 38
When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server,
which three are valid objects to include in the data set? (Choose three.)
A. A file
B. A qtree
C. A directory
D. Theentire client
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Open Systems Snap Vault runs on servers, so the objects that can be selected for backup will be host-
based.
Qtrees are objects on the storage system.
QUESTION 39
XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html http://backdrift.org/man/
netapp/man5/na_stats_preset.5.html
Data ONTAP provides some XML files that output a predetermined set of statistics that you can use
withouthaving to construct a script or type in a complicated command on the command line.
The preset files are located in the /etc/stats/preset directory. To use a preset file, you add -p filename
toyour stats show or stats stop command line. You can also add counters on the
command line. If any optionsyou specify on the command line conflict with the preset file, your command
line options take precedence.
You can also create your own preset files.
QUESTION 40
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are
designated as ________.
A. 16-bit
B. 32-bit
C. 64-bit
D. Foreign
E. Unknown
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Aggregates are never converted as part of an upgrade. An upgrade will not touch your data!
QUESTION 41
To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create command must
be included?
A. b 64
B. B 64
C. l 64
D. L 64
E. No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
The command to create a 64-bit aggregate is the same aggr create command that is present in Data
ONTAP7G for aggregate creation. The aggr create command has a new flag, -B, to specify
the type of aggregate tocreate. It takes a value of either 32 or 64 and creates the respective type of
aggregate. Therefore the aggrcreate command with -B 64 creates a 64-bit aggregate. The aggr create
command without the -B flag bydefault creates a 32-bit aggregate.
Here are some commands for creating different aggregate types in Data ONTAP 8.0:
Creating a 64-bit aggregate:
aggr create aggr_64 -B 64 5
Creating a 32-bit aggregate using B flag:
aggr create aggr_32 -B 32 5
Creating a 32-bit aggregate without using B flag:
aggr create default_aggr_32 5
Note: the man pages do not include this option in later versions of DOT because 64-bit is now the default.
QUESTION 42
After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit aggregates.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html
To upgrade an aggregate in-place, the only available method is to add disks to expand the aggregate
to>16TB.
There is an obscure method using diag mode but that is not supported or mentioned in the exam content.
Theanswer is always add disks to grow past 16TB, or migrate.
QUESTION 43
With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____.
A. 500
B. 1000
C. 6400
D. 64000
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/products/storage-systems/fas3200/fas3200-tech-specs.aspx
There is no easily remembered reason why its 500. Some people like to remember that there is one
otherquestionon the exam that requires you to remember an arbitrary number and the answer is also 500
(distanceof a fiber interconnect at 2Gbps).
QUESTION 44
The largest volume that can be created on a 64-bit aggregate is ___.
A. 10 TB
B. 16 TB
C. 64 TB
D. Equal to size of the aggregate
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
Trick question.... Depends on the array and the maximum shelves and disks and aggregate size, which
canchange over time. But a volume can never be greater than the aggregate - save for a new feature in 8.2
calledInfinite Volume that is not covered by this exam.
QUESTION 45
Which command will show the FCP target(s) on a storage system?
A. fcp show adapter
B. fcp show all
C. fcp show -t
D. fcp status
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html
fcp show adapter [ -v ] [ adapter ]
If no adapter name is given, information about all adapters are shown. This command displays information
such as nodename/portname and link state about the adapter. If the -v flag is given, this command displays
additional information about the adapters.
QUESTION 46
You are having problems accessing three recently-created LUNs. Given the output below, the reason is
because all of the LUNs are using the same LUN ID of 0.
lun show -m
LUN pathMapped to LUNID
---------------------------------------------------
/vol/vol1/lun0 solaris-igroup0 0
/vol/vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The 'lun' in the path is irrelevant. The 0 at the end of each statement denotes the LUN ID.
LUN IDs must be unique per igroup.
QUESTION 47
Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would your
determination be?
A. These are type "Solaris" LUNs.
B. Not enough information is given here. Run the lun map command to get the information requested.
C. Not enough information is given here. Run the lun show -v command to get the information requested.
D. Not enough information is given here. Run the lun status command to get the information requested.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging | -g initiator_group | -n node | -l
vol_name | lun_path ] Displays the status (lun_path, size, online/offline state, shared state) of the given
LUN or class ofLUNs. Withthe -v option supplied, additional information (comment string, serial number,
LUN mapping, HA Pair SharedVolume Information) is also displayed. With the -m option supplied,
information about lun_path toinitiator_group mappings is displayed in a table format. With the -c option
supplied, information about LUNcloning status is displayed.
A specific LUN can be indicated by supplying its lun_path. When an initiator_group is specified, status
isreported for all LUNs that are mapped to the initiator group. When a node is specified, status is reported
for allLUNs that are mapped to initiator groups which contain that node. When staging is specified,
information aboutthe temporary LUNs preserved in the staging area is reported. When vol_name is
specified, status is reportedfor all the LUNs in that volume. Mapped LUNs are ones with at least one map
definition. A LUN is online if it has not been explicitly madeoffline using the lun offline command.
"Pass Any Exam. Any Time." - www.actualtests.com 96
Network Appliance NS0-155 Exam
QUESTION 48
Which two commands would help you troubleshoot a LUN that cannot be accessed by a host? (Choose
two.)
A. fcp show wwpn
B. fcp wwpn
C. igroup show
D. lun show -err
E. lun show -v
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_igroup.1.html
igroup show [ -v ] [ initiator_group ]Displays the nodes in an initiator group and their aliases, set with the fcp
wwpnalias command. If noinitiator_group is specified, the members of all initiator groups are displayed. You
can use the -v option to get averbose listing.
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging | -g initiator_group | -n node | -l
vol_name | lun_path ]Displays the status (lun_path, size, online/offline state, shared state) of the given LUN
or class of LUNs. Withthe -v option supplied, additional information (comment string, serial number, LUN
mapping, HA Pair SharedVolume Information) is also displayed. With the -m option supplied, information
about lun_path toinitiator_group mappings is displayed in a table format. With the -c option supplied,
information about LUNcloning status is displayed.
QUESTION 49
NetApp recommends that Fibre Channel switches that have both disk and tape connected to them should
have separate zones created for each.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.brocade.com/downloads/documents/white_papers/Zoning_Best_Practices_WP-00.pdf
Separating the disk and tape devices into separate zones prevents disk RSCNs from impacting tape
devices,which tend to be more sensitive to RSCNs. Best practice is to zone each initiator WWPN to each
target WWPN individually.
QUESTION 50
Which command shares out the directory /vol/vol2/home using the share name "netapp"?
A. cifs shares -add /vol/vol2 netapp
B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp vol/vol2
D. cifs shares -add netapp /vol/vol2/home
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_cifs_shares.1.html cifs shares -add
sharename path
QUESTION 51
The quota resize command only affects existing /etc/quotas file target entries, not new quota entries.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
quota resize volume
Adjusts currently active quotas in the specified volume to reflect changes in the /etc/quotas file.
Forinstance, if you edit an entry in /etc/quotas to increase a user's quota, quota resize will cause
thechange to take effect. The volume name may be omitted if the system has only one volume. quota
resizecan be used only when quotas are already on. Because it does not rescan the file system to compute
usage,quota resize is faster than turning quotas off and then on again. quota resize will apply all
updatedentries in /etc/quotas; however, it will generally ignore newly added entries. A newly added entry will
onlytake effect if the corresponding user or group has an active quota as a result of updating a file subject
todefault quotas.
QUESTION 52
In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)
A. file quotas
B. group quotas
C. root quotas
D. tree quotas
E. user quotas
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and group
quotas, but not from tree quotas.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas,however, do apply even to root and the Windows Administrator account.
QUESTION 54
What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2?
A. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
B. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
C. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent
D. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_lun.1.html
lun clone create clone_lunpath [ -o noreserve ] -b parent_lunpath parent_snap
QUESTION 55
Which iSCSI security method encrypts data between the initiator and the target?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
IPSec is an encryption transport that can be used to secure any IP traffic including iSCSI.
QUESTION 56
You receive an error message from an iSCSI host stating that there is an authentication error.
Which command would troubleshoot the failure?
A. iscsi security show
B. iscsi security generate
C. iscsi show authentication
D. iscsi security authentication
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_iscsi.1.html
iscsi security show
Display the default authentication and all the initiator specific authentication information. Hint: Remember
that the iscsi command is mostly structured "iscsi noun verb", unlike the fcp command whichis structure
"fcp verb noun". Example: iscsi initiator show, fcp show initiator.
QUESTION 57
Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a NFS mount
request on a Solaris system? (Choose three)
A. check the client's fstab
B. check the /etc/sd.conf file on the client
C. check show mount -e to the storage system from the client
D. check for connectivity to the storage system from the client
E. check the output of the exportfs command on the storage system
Correct Answer: ADE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The fstab file reflects the defined filesystem mount paths (including NFS mounts). Always check network
connectivity when a problem arises with a network service. The exportfs command will display the active
exports on the storage system.
QUESTION 58
Which three configurations would increase data transfer rates in a volume SnapMirror environment for
traditional volumes?
A. The destination volumes are flexible volumes.
B. The destination and source contain disks of the same size.
C. The destination and the source contain RAID groups of the same size.
D. The destination and source contain the same number of raid groups.
E. The destination and source storage systems are no father than 30 meters apart.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
By aligning the performance of the source and destination, optimal data transfer (aka replication) rates can
beattained. Flexvols don't matter, and there is no measurable difference between the performance of a
networkover a 30m or 3m cable.
QUESTION 59
Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two)
A. snapmirror update
B. snapmirror status
C. snapmirror initialize
D. options snapmirror.access all
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
http://www.uow.edu.au/~blane/netapp/ontap/cmdref/man1/na_options.1.htm update [ -S source ] [ -k
kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination For asynchronous mirrors, an update is
immediately started from the source to the destination to update themirror with the contents of the source.
For synchronous mirrors, a snapshot is created on the source volume which becomes visible to clients of
thedestination volume.
The update command must be issued on the destination node.status [ -l | -t | -q ] [ volume | qtree ... ]
Reports status of all the SnapMirror relationships with a source and/or destination on this node. This
commandalso reports whether SnapMirror is on or off. If any volume or qtree arguments are given to the
command, onlythe SnapMirror relationships with a matching source or destination will be reported. If the
argument is invalid,there won't be any status in the output.initialize [ -S source ] [ -k kilobytes ] [ -s
src_snap ] [ -c create_dest_snap ] [ -w ] destinationStarts an initial transfer over the network. An initial
transfer is required before update transfers can take place.
The initialize command must be issued on the destination node. If the destination is a volume, it
must berestricted (see na_vol(1) for information on how to examine and restrict volumes). If the destination
is a qtree, itmust not already exist (see na_qtree(1) for information on how to list qtrees). If a qtree already
exists, it mustbe renamed or removed (using an NFS or CIFS client), or snapmirror initialize to that qtree
will not work.snapmirror.access
This option determines which SnapMirror destination filers may initiate transfers, and over which
networkinterfaces. When set to "legacy", SnapMirror uses the older snapmirror.allow to determine access.
The optionvalue is a string containing an expression which provides the access filter. An example of the
optionscommand for snapmirror.access is options snapmirror.access host=toaster,fridge. The default value
is"legacy". See na_snapmirror(1) , na_snapmirror.allow(5) and na_protocolaccess(8) for more details.
The snapmirror.allow file exists on the source filer used for SnapMirror.
QUESTION 60
Which OSSV tool would you use to perform an OSSV unattended installation?
A. msipackage
B. svunattendossv
C. svconfigpackager
D. unattendpackager
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The reference for thisquestionis an old version of a TR. It is likely that thisquestionwill be removed from
theNSO-155 exam.
The svconfigpackager is a binary in the OSSV client which can be used to create an unattended
installationpackage using an answer file.
QUESTION 61
Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?
A. aggr create aggrX -d 12
B. aggr create aggrX -m 12
C. aggr mirror aggrX -m 12
D. aggr mirror aggrX -n 12
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html The following commands are
available in the aggr suite:
If you use the -d disk1 [ disk2 ... ] argument, the node creates the aggregate with the specified spare
disksdisk1, disk2, and so on. You can specify a space-separated list of disk names. Two separate lists
must bespecified if the new aggregate is mirrored. In the case that the new aggregate is mirrored, the
indicated disksmust result in an equal number of disks on each new plex.
The disks in a plex are not permitted to span spare pools. This behavior can be overridden with the -f
option.
The same option can also be used to force using disks that do not have matching rotational speed. The-
foption has effect only when used with the -d option specifying disks to use.
The -m option can be used to specify that the new aggregate be mirrored (have two plexes) upon creation.
Ifthis option is given, then the indicated disks will be split across the two plexes. By default, the new
aggregatewill not be mirrored.
aggr mirror aggrname
The -n option can be used to display the command that the system will execute without actually making
anychanges. This is useful for displaying the automatically selected disks, for example.
QUESTION 62
Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk
drive?
A. aggr mirror aggrY
B. aggr mirror aggrY -m
C. aggr mirror aggrT -d 12@144
D. aggr mirror aggrY -m 12@144
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
aggr mirror aggrname
[ -f ]
[ -n ]
[ -v victim_aggrname ]
[ -d disk1 [ disk2 ... ] ]
Turns an unmirrored aggregate into a mirrored aggregate by adding a plex to it. The plex is either
newlyformedfrom disks chosen from a spare pool, or, if the -v option is specified, is taken from another
existingunmirrored aggregate. Aggregate aggrname must currently be unmirrored. Use aggr create to make
a new,mirrored aggregate from scratch.
Disks may be specified explicitly using -d in the same way as with the aggr create and aggr add commands.
The number of disks indicated must match the number present on the existing aggregate. The disks
specifiedare not permitted to span disk pools. This behavior can be overridden with the -f option. The -f
option, incombination with -d, can also be used to force using disks that have a rotational speed that does
not matchthat of the majority of existing disks in the aggregate.
If disks are not specified explicitly, then disks are automatically selected to match those in the
aggregate'sexisting plex.
The -v option can be used to join victim_aggrname back into aggrname to form a mirrored aggregate.
Theresult is a mirrored aggregate named aggrname which is otherwise identical to aggrname before the
operation.
Victim_aggrname is effectively destroyed. Victim_aggrname must have been previously mirrored with
aggrname, and then separated via the aggr split command. Victim_aggrname must be offline. Combined
withthe -v option, the -f option can be used to join aggrname and victim_aggrname without prompting the
user.
The -n option can be used to display the command that the system will execute without actually making
anychanges. This is useful for displaying the automatically selected disks, for example.
"Pass Any Exam. Any Time." - www.actualtests.com 105
Network Appliance NS0-155 Exam
QUESTION 63
When troubleshooting a double disk failure with SyncMirror, you decide to remove and destroy a plex from
a mirrored aggregate. What steps remove a plex from a mirrored aggregate?
A. Take the aggregate offline and use the aggr destroy command
B. Take the aggregate offline and use the destroy -f command
C. Ensure the plex is online and use the aggr destroy plexname command.
D. Ensure the plex is offline and use the aggr destroy plexname command.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
aggr destroy { aggrname | plexname } [ -f ]
Destroys the aggregate named aggrname, or the plex named plexname. Note that if the specified
aggregate istied to a traditional volume, then the traditional volume itself is destroyed as well. If an
aggregate is specified, all plexes in the aggregate are destroyed. The named aggregate must also
notcontain any flexible volumes, regardless of their mount state (online, restricted, or offline). If a plex is
specified,the plex is destroyed, leaving an unmirrored aggregate or traditional volume containing the
remaining plex.
Before destroying the aggregate, traditional volume or plex, the user is prompted to confirm the operation.
The-f flag can be used to destroy an aggregate, traditional volume or plex without prompting the user.
The disks originally in the destroyed object become spare disks. Only offline aggregates, traditional
volumesand plexes can be destroyed.
QUESTION 64
When replicating data between 32-bit and 64-bit aggregates, which two are allowed? (Choose two)
A. NDMPcopy
B. QSM
C. vol copy
D. VSM
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
http://wafl.co.uk/ndmpcopy/
Because volume SnapMirror works at the block level, the source and destination must both be
FlexVolvolumes in the same aggregate type. The source and destination of a volume SnapMirror
relationship musteither both be FlexVol volumes in 32-bit aggregates or both be FlexVol volumes in 64-bit
aggregates.
Therefore you cannot create a volume SnapMirror relationship from a FlexVol volume in a 32-bit aggregate
to aFlexVol volume in a 64-bit aggregate or vice versa.
"Pass Any Exam. Any Time." - www.actualtests.com 107
Network Appliance NS0-155 Exam
QUESTION 65
What types of migration are supported from 32-bit to 64-bit?
A. migration of qtrees via QSM
B. migration of volumes via ndmpcopy
C. migration of volumes via SnapMirror
D. Both A & B
E. Both B & C
F. Both A & C
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Volume SnapMirror operates at the physical block level. It replicates the contents of an entire volume,
includingall Snapshot copies, plus all volume attributes verbatim from a source (primary) volume to a target
(secondary)volume. Implicitly, the destination volume will be the same as the source volume. Since C is
incorrect, A & Bmust be correct.
Qtree snapmirror operates at the logical level, so it is unimportant that the destination system has a
differentvolume configuration.
ndmpcopy is similarly operating with data already read from the volume and so the destination volume type
isnot a consideration.
QUESTION 66
How do you migrate LUNs under volumes from 32-bit to 64-bit?
A. lrep
B. ndmpcopy
C. rsync
D. snapvault
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://wafl.co.uk/ndmpcopy/
Think of ndmpcopy as a sort of ftp for SAN. You can use it to copy files from one volume to
another. Becausethe file is read from one volume and written to another, the constraints of volume types
are not an issue.
QUESTION 67
Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?
A. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup directory.
B. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process
continuesuninterrupted.
C. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source,
destination, orboth systems.
D. The fingerprint database and the change logs that the deduplication process uses are located outside
thevolume, in the aggregate.
E. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just like
thededuplication schedule for any volume.
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
Explanation: Section: Data Protection
NetApp also recommends that if deduplication is used on the source volume, then it should also be used
onthe destination volume. However, you are not restricted using deduplication on the source volume only.
The deduplication schedule is not tied to the qtree SnapMirror update. In other words, the
deduplicationprocess does not automatically start at the completion of the qtree SnapMirror transfer.
The fingerprint database and the change log files that are used in the deduplication process are
locatedoutside of the volume in the aggregate and are therefore not captured in Snapshot copies http://
www.netapp.com/us/media/tr-3505.pdf
QUESTION 68
To manage SnapVault relationships with an NDMP management application, you must specify a:
A. directory path
B. volume and qtree
C. SnapVault license
D. username and password
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Add a new backup user to the Backup Operators useradmin group list. Enter the following command:
useradmin user add backupuser -g "Backup Operators"
Generate an NDMP password for the new user. Enter the following command:
ndmpd password backupuser
The NDMP password is used to authenticate the NetBackup media server to the storage system.
Thispassword is required for setup on the NetBackup management station. https://library.netapp.com/
ecmdocs/ECMM1278284/html/onlinebk/5snapv37.htm
QUESTION 69
For OSSV sources, the qtree is the basic unit of SnapVault backups.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140-
EB147B941BDA.html
The data structures that are backed up and restored through SnapVault depend on the primary system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore. SnapVault
backs up specified qtrees on the primary system to associated qtrees on the SnapVaultsecondary system.
If necessary, data is restored from the secondary qtrees back to their associated primaryqtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup. SnapVaultbacks
up specified directories from the native system to specified qtrees in the SnapVault secondary system.
If necessary SnapVault can restore an entire directory or a specified file to the open systems platform.
The destination system uses a slightly more disk space and directories than the source system.

You might also like