Network-Appliance.Realtests.NS0-155.v2015-03-30.by.Hulda · 2015. 3. 30. · Netapp NS0-155 Exam...

121
Realtests NS0-155 189q Number : NS0-155 Passing Score : 800 Time Limit : 120 min File Version : 26.5 http://www.gratisexam.com/ Netapp NS0-155 Data ONTAP 7-Mode Administrator I have correct many of questions answers. If there is any more then update this vce and re-upload.

Transcript of Network-Appliance.Realtests.NS0-155.v2015-03-30.by.Hulda · 2015. 3. 30. · Netapp NS0-155 Exam...

  • Realtests NS0-155 189q

    Number: NS0-155Passing Score: 800Time Limit: 120 minFile Version: 26.5

    http://www.gratisexam.com/

    Netapp NS0-155

    Data ONTAP 7-Mode Administrator

    I have correct many of questions answers. If there is any more then update this vce and re-upload.

  • Exam A

    QUESTION 1How can you "throttle" SnapValue updates and baseline transfers so that the primary or secondary is not transmitting data as it can?

    A. Use the -k option in the snapvault start or snapshot modify commands.B. SnapVault does not support throttling of network throughout.C. Use the snapvault throttle command.D. Use the -k option in the snapvault initialize command.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_snapvault.1.html The snapvault subcommands are:start [ -r ] [ -k n ] [ -t n ] [ -w ] [-p {inet | inet6 unspec}] [ -o options ] [ -S [primary_filer:]primary_path ] secondary_qtreemodify [ -k n ] [ -t n ] [-p {inet | inet6 | unspec}] [ -o options ] [ -S primary_filer:primary_path ] sec_ondary_qtree

    The -k option sets the maximum speed at which data is transferred in kilobytes per second. It is used to throttle disk, CPU, and network usage. If this option is notset, the filer transmits data as fast as it can. The setting applies to the initial transfer as well as subsequent update transfers from the primary.

    QUESTION 2Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, thepartner node, Node 2, can see all of the Node 1's disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes bydefault, and then forcibly take over Node 1 if the error condition persists?

    A. Auto enable of givebackB. Negotiated Fail OverC. Takeover on panicD. Cf.quickloop.enable

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Real 2Netapp NS0-155 Exam

  • Explanation:http://www.wafl.co.uk/cf/http://wafl.co.uk/options/Negotiated failover is a general facility which supports negotiated failover on the basis of decisions made by various modules.

    cf.takeover.on_disk_shelf_miscompareThis option allows negotiated takeover to be enabled when the cluster nodes detect a mismatch in disk shelf count. By default, this option is set to off.

    This option is available only when cluster is licensed and changing the value on one filer automatically changes the value on the partner filer.

    QUESTION 3In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)

    A. User quotasB. Tree quotasC. Root quotasD. Group quotasE. File quotas

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_quota.1.htmlUser and group quotas do not apply to the root user or to the Windows Administrator account; tree quotas, however, do apply even to root and the WindowsAdministrator account.

    QUESTION 4Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)

    A. Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bitB. Data ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bitC. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.1 64-bitD. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.0.2 64-bit

    Real 3Netapp NS0-155 Exam

  • Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation: Volume SnapMirror Interoperability Matrix.

  • Reference: SnappMirror Async Overview and Best Practices guide.

    QUESTION 5An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are available. Data ONTAP will then perform what action.

    http://www.gratisexam.com/

    A. Chooses a 72-Gigabyte disk and use it as is.B. Chooses a 72-Gigabyte disk and right-size it.C. Halts after 24 hour of running in degraded mode.D. Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-8A91F6A2-61B8-42C3-

    Real 4Netapp NS0-155 Exam

    AEAB7D5AA9BBE9CF.html

    If a disk fails and no hot spare disk that exactly matches the failed disk is available, Data ONTAP uses the best available spare. Understanding how Data ONTAPchooses an appropriate spare when there is no matching spare enables you to optimize your spare allocation for your environment.

    Data ONTAP picks a non-matching hot spare based on the following criteria (and more; in the link above):If the available hot spares are not the correct size, Data ONTAP uses one that is the next size up, if there is one.The replacement disk is downsized (aka right sized) to match the size of the disk it is replacing; the extra capacity is not available.

    QUESTION 6Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?

  • A. All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.B. The expansion is triggered by an aggr convert command.C. The expansion is triggered by adding disks to exceed 16 TB.D. The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with Data ONTAP 8.1 upgrade.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html To upgrade an aggregate in-place, the only available method is to add disks to expand theaggregate to >16TB.

    QUESTION 7What utility on the storage system will allow you to capture network packet information?

    A. SnoopB. Netstats

    Real 5Netapp NS0-155 Exam

    C. PkttD. Traceroute

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:The pktt command controls a simple on-filer packet tracing facility. Packets can be captured into a trace buffer then dumped to a file, or the captured data can belogged to a file. The data is stored in "tcpdump" format, and can be directly viewed with tcpdump, ethereal, and perhaps other viewers. The output can also beconverted using the editcap(1) program to a variety of other formats, including Sniffer, NetMon, and snoop.

    QUESTION 8The root admin on the UNIX box receives an "Access Denied" message when he attempts to access a newly mounted qtree. What's the most likely cause of thiserror?

  • A. The qtree is missing from the /etc/hosts file.B. NFS is turned off on the storage system.C. The qtree is set to ntfs security style.D. The qtree has not been exported.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA- B0BDA63560FECEFF.html

    https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-F6304830-B124-40A5-95D6- C646AA85E9E0.html

    Only hostnames and IPs are referenced in /etc/hosts, so A is incorrect. The question states that the qtree was mounted, and B and D would preclude this so theyare incorrect. You need to set a qtree to mixed or unix security style to support UNIX users.

    QUESTION 9Which two modes support using SnapMirror over multiple network paths?

    Real 6Netapp NS0-155 Exam

    A. StandaloneB. PartnerC. MultiD. FailoverE. Give back

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-75BD4540-A103-4E2B-8B0A- E6BBC0D3F43F.htmlhttp://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html

    Two multipath methods are supported:

  • The multiplexing mode causes snapmirror to use both paths at the same time. If one should fail, it will switch to use the remaining path only and use both againshould the failing path be repaired. Failover mode causes snapmirror to use the first path as the desired path and only use the second path should problems arisewith the first path.

    QUESTION 10Identify the two commands that could be entered on the SnapMirror destination storage system.(Choose two)

    A. Options snapmirror.access onB. Options snapmirror.resync onC. Snapmirror initializeD. Snap mirror resync

    Correct Answer: CDSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html snapmirror initialize [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -ccreate_dest_snap ] [ -w ] destination Starts an initial transfer over the network. An initial transfer is required before update transfers can take place.

    The initialize command must be issued on the destination node. If the destination is a volume, it must be restricted (see na_vol(1) for information on how to examineand restrict volumes). If the destination is a qtree, it must not already exist (see na_qtree(1) for information on how to list qtrees). If a qtree already exists, it must berenamed or removed (using an NFS or CIFS client), or snapmirror initialize to that qtree will not work.

    Real 7Netapp NS0-155 Exam

    snapmirror resync [ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination Resynchronizes a broken-off destination to itsformer source, putting the destination in the snapmirrored state and making it ready for update transfers. The resync command must be issued on the destinationnode.

    QUESTION 11Which two operations can be performed with the SnapDrive for windows graphical user interface?

    A. Create volumeB. Create Snapshot copiesC. Create FileD. Create Disk

  • Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecm/ecm_download_file/ECMM1278920

    What SnapDrive doesSnapDrive software integrates with the Windows Volume Manager so that NetApp filers can serve as virtual storage devices for application data in Windows 2000Server and Windows Server 2003 environments.

    SnapDrive is dependent on the virtual disk service. The virtual disk service must be started on the host prior to installing SnapDrive. SnapDrive manages virtualdisks (LUNs) on a NetApp filer, making these virtual disks available as local disks on Windows hosts. This allows Windows hosts to interact with the virtual disksjust as if they belonged to a directly attached redundant array of independent disks (RAID).

    SnapDrive provides the following additional features:It enables online storage configuration, virtual disk expansion, and streamlined management. It integrates NetApp Snapshot technology, which creates point-in-timeimages of data stored on virtual disks.It works in conjunction with SnapMirror® software to facilitate disaster recovery from either asynchronously or synchronously mirrored destination volumes.

    Real 8Netapp NS0-155 Exam

    QUESTION 12Which storage system command would display the WWPNs of hosts that have logged into storage system using a Fibre Channel connection?

    http://www.gratisexam.com/

    A. fcp configB. fcp initiator showC. fcp show iD. fcp show initiator

  • Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html

    fcp show initiator [ -v ] [ adapter ]If no adapter name is given, information about all initiators connected to all adapters are shown. The command displays the portname of initiators that are currentlylogged in with the Fibre Channel target adapters. If the portname is in an initiator group setup through the igroup command, then the group name is also displayed.Similarly, all aliases set with the fcp wwpn-alias command for the portname are displayed as well.If the -v flag is given, the command displays the Fibre Channel host address and the nodename/portname of the initiators as well.

    QUESTION 13In a Fiber Channel configuration, the host's HBA is referred to as the ___________, and the storage system's HBA to as the _____________.

    A. Target, initiatorB. Primary, secondaryC. Initiator, targetD. Secondary, primary

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 14Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?

    Real 9Netapp NS0-155 Exam

    A. Running snapmirroe update on the source storage system.B. Running snapmirror release on the source storage system.C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage systemD. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.

  • Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html snapmirror update [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destinationFor asynchronous mirrors, an update is immediately started from the source to the destination to update the mirror with the contents of the source.

    For synchronous mirrors, a snapshot is created on the source volume which becomes visible to clients of the destination volume.

    The snapmirror update command must be issued on the destination filer. snapmirror release source { filer:volume | filer:qtree } Tell SnapMirror that a certain directmirror is no longer going to request updates. If a certain destination is no longer going to request updates, you must tell SnapMirror so that it will no longer retain asnapshot for that destination. This command will remove snapshots that are no longer needed for replication to that destination, and can be used to clean upSnapMirror- created snapshots after snapmirror break is issued on the destination side.

    The source argument is the source volume or qtree that the destination is to be released from. The destination argument should be either the destination filer anddestination volume name or the destination filer and destination qtree path. You can use a line from the output of the snapmirror destinations command as the set ofarguments to this command. The /etc/snapmirror.conf file exists on the node containing the mirror used for SnapMirror.

    QUESTION 15You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the directory structure no longer exists. Which is the most likelyexplanation?

    A. Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore. You must now SnapRestore the volume.B. Snapshot copies have been created since the original directory structure was deleted.C. You must recreate the directory structure before trying to restore the file.

    Real 10Netapp NS0-155 Exam

    D. You cannot restore a file to an alternate location.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366- 698C1299E29D.html

  • You can restore a file only to the volume where it was originally located. The directory structure to which a file is to be restored must be the same as that specified inthe path. If this directory structure does not exist, you must create it before restoring the file.

    QUESTION 16Which mechanism allows you to make LUNs available to some initiators and unavailable to others?

    A. LUN maskingB. LUN groupingC. LUN cloningD. LUN hiding

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/Logical_Unit_Number_masking Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical UnitNumber available to some hosts and unavailable to other hosts.

    QUESTION 17An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________.

    A. session, session, connectionsB. connection, session, connectionsC. connection, connection, sessionsD. session, connection, sessions

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Real 11Netapp NS0-155 Exam

    Explanation:http://scst.sourceforge.net/mc_s.htmlhttp://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf

  • Meme: Remember the acronym: MCS or MC/S - Multiple Connections per Session. Microsoft Windows 2008's MPIO driver supports MC/S.

    QUESTION 18Which NetApp Virtual Storage Tier component works at the host level?

    A. Flash PoolB. Flash DiskC. Flash AccelD. Flash CacheE. Flash IO

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3366.pdf&cc=us Flash Accel utilizes server-based flash storage as cache for the host.

    QUESTION 19When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX server, which three valid objects to include in the data set?(Choose three)

    A. The entire clientB. A directoryC. A fileD. A qtree

    Correct Answer: ABCSection: (none)Explanation

    Explanation/Reference:Explanation:

    Real 12Netapp NS0-155 Exam

    QUESTION 20

  • What does it signify if the disks are "not owned" in a FAS2020 system?

    A. The disks are mailbox disks.B. The disks are spare disks.C. The disks are data disks.D. The disks are not used.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:Disks must be assigned to an aggregate to be used as raid group members or spares.Unassigned disks are displayed as "not owned".

    Real 13Netapp NS0-155 Exam

    QUESTION 21For each Open Systems platform directory to be backed up to the SnapVault secondary storage

    Real 14Netapp NS0-155 Examsystem you must execute _____________.

    A. An initial baseline copyB. A temporary copyC. An incremental copyD. A scheduled update copy

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-EEBC8B52-BEA9-4B49-874F- 7EC78D3F602E.html

    Each open systems platform, when prompted by the secondary system, transfers initial base images of specified directories to qtree locations on the secondary

  • system. Note: There are no primary-side Snapshot copies in Open Systems SnapVault.

    QUESTION 22What is the maximum distance between a standard clustered pair at 2Bbps?

    A. 100 metersB. 10 metersC. 50 metersD. 500 meters

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 23Which exportfs command will temporally export the resource while ignoring the options specified in the /etc/exports file?

    A. exportfs v B. exportfs u C. exportfs a D. exportfs i

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Real 15Netapp NS0-155 Exam

    Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_exportfs.1.html exportfs [ -v ] [ -io options ] path -i Ignores the options specified for a file systempath in the /etc/exports file. If you do not specify the I option with the -o option, Data ONTAP uses the options specified for the file system path in the /etc/ exportsfile instead of the options you specify on the command line.

    QUESTION 24Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?

  • http://www.gratisexam.com/

    A. No, but you can file a PVR to request support.B. No. it is targeted for a future release of Data ONATP.C. Yes, only with a special license installed.D. Yes, it has been supported since 8.0.1.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:http://www.ntapgeek.com/2011/03/netapp-storage-encryption-available.html March, 2011: "With the recent release of Data ONTAP 8.0.1, NetApp now offers fulldisk encryption to prevent unauthorized access to data at rest."

    QUESTION 25Which two cp types would indicate a busy storage system? (Choose two).

    A. cp_from_log_fullB. cp_from_busyC. cp_from_cpD. cp_from_timer

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html http://redhunter.com/blog/2010/02/11/netapp-consistency-points-in-cacti/ cp_from_log_full (log full) - thecurrent NVRAM bank is full and the system switches to the other one and starts writing this to disk. Very heavy write activity.

  • Real 16Netapp NS0-155 Exam

    cp_from_cp (aka Back to Back) - filer is overloaded. The write traffic is coming in faster than it can be written and the filer is running out of NVRAM capacity in onebank before the data in the other bank can be written.

    cp_from_busy is not a real cp typecp_from_timer - 10 seconds since the last CP it means the system is pretty idle write-wise.

    QUESTION 26There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct sequence of these phases?

    A. Setup Phase, Mirror Phase, Cutover PhaseB. Initialization phase, Copy Phase, Migrate PhaseC. Begin Phase, Move Phase, Complete PhaseD. Setup Phase, Data Copy Phase, Cutover Phase

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1- 17848/PDF_Tips_Data_Motion_0211.pdf

    Non-disruptive Volume Movement is called DataMotion. DataMotion uses SnapMirror for volume migration.A DataMotion migration occurs in three phases:1. Setup2. Data copy3. Cutover

    QUESTION 27Which statement describes the results of the SnapMirror resynce command?

    A. Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and removes all newer information on the storage system on whichthe command is run.

    B. Resynchronization will cause the loss of all data written to the destination after the original base Real 17Netapp NS0-155 Examsnapshot was made.

  • C. Resynchronization will update the snapshot on the destination filer.D. Resynchronization will update the snapshot on the source filer.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html

    snapmirror resync[ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destinationResynchronizes a broken-off destination to its former source, putting the destination in the snapmirrored state and making it ready for update transfers. The resynccommand must be issued on the destination node.

    The resync command can cause data loss on the destination. Because it is effectively making destination a replica of the source, any edits made to the destinationafter the break will be undone.

    For formerly mirrored volumes, the resync command effectively performs a SnapRestore (see na_vol(1)) on the destination to the newest snapshot which is common to both the source and the destination. In most cases, this is the last snapshot transferred from thesource to the destination, but it can be any snapshot which is on both the source and destination due to SnapMirror replication. If new data has been written to thedestination since the newest common snapshot was created, that data will be lost during the resync operation.

    QUESTION 28If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to these files?

    A. /vol/vol0/etc/log/snaplog/B. /vol/vol0/etc/snapmirror/C. /vol/vol0/etc/snaplog/D. /vol/vol0/etc/log/

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html

  • Real 18Netapp NS0-155 Exam

    The root volume is always vol0 and etc is contained therein. When exporting the root volume via NFS, the path is/vol/vol0; so the full path to snapmirror log files is /vol/vol0/etc/log./etc/log/snapmirror.

    This file logs SnapMirror activity. Log file for current week. /etc/log/snapmirror.[0-5] SnapMirror log files for previous weeks.

    QUESTION 29Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths to a LUN.

    A. Token ring, physicalB. FC SAN, virtualC. FC or IP SAN, virtualD. FC or IP SAN, Physical

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/Multipath_I/OFiber Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI further encapsulate the transport within IP; hence the term IP SAN.

    In computer storage, multipath I/O is a fault-tolerance and performance enhancement technique whereby there is more than one physical path between the CPU ina computer system and its mass storage devices through the buses, controllers, switches, and bridge devices connecting them.

    A simple example would be a SCSI disk connected to two SCSI controllers on the same computer or a disk connected to two Fibre Channel ports. Should onecontroller, port or switch fail, the operating system can route I/O through the remaining controller transparently to the application, with no changes visible to theapplications, other than perhaps incremental latency.

    QUESTION 30Which two will allow you to read and analyze a packet trace file generated by the storage system? (Choose two)

    Real 19Netapp NS0-155 Exam

    A. WireShark

  • B. PkttC. NetmonD. Eternal View

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation:pktt is part of the Data OnTap command set.The output of pktt is not very human-readable, but it utilizes the tcpdump format which many traffic analyzers can read or import. Only two such analyzers havebeen offered here.

    Wireshark is the successor of Etherreal, and available for several platforms. Netmon is a Microsoft project, available for Windows, soon to be deprecated by theMicrosoft Message Analyzer project.

    QUESTION 31How does the NetApp Remote Agent (RSA) connect to NetApp Support?

    A. NetApp Support initiates a non-secure connection to the RSA.B. NetApp Support initiates a secure connection to the RSA.C. The RSA initiates a secure connection to NetApp Support.D. The RSA initiates a non-secure connection to NetApp support.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecm/ecm_download_file/ECMP1200040

    Remote Support Agent is the facility to provide NetApp Support Engineers with the ability to remotely trigger AutoSupport.

    Remote Support Agent uses HTTP or HTTPS to communicate with the storage controller to initiate commands and to collect files. It uses HTTPS to send systemlogs and core files from the Data ONTAP root volume to Remote Support Enterprise on the NetApp Support side. NetApp RSA is not related to the RSA public keyencryption algorithm.

    QUESTION 32

  • Real 20Netapp NS0-155 ExamWhich two commands can be used to enable LUN reservations? (Choose two)

    A. lun set reservationB. lun reservation setC. lun mapD. lun create

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

    lun set reservation lun_path [ enable | disable ]Enables or disables the space reservation on the LUN. If no arguments are supplied after the lun_path, then the space reservation status of the given lun_path isdisplayed. lun create -s size -t ostype [ -o noreserve ] [ -e space_alloc ] lun_path This usage of the lun create command should be employed to create a new LUN ofgiven size, with initially zero contents. The LUN is created at the lun_path given. No file should already exist at the given lun_path. The directory specified in thelun_path must be a qtree root directory.

    The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be used: c (1), w (2), b (512), k (1024), m (k*k), g (k*m), t(m*m).

    The size of the created LUN could be larger than the size specified, in order to get an integral number of cylinders while reporting the geometry using SANprotocols.

    The size of the LUN actually created is reported if it is different from that specified in the command.The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a singleslice partition), windows (the LUN will be used to storea raw disk device in a single- partition Windows disk using the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX data), aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the LUN will be used to store a Linux raw disk without any partitiontable), netware (the LUN will be used to store NetWare data), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be used to store Windows data for Windows 2008 systems),openvms (the LUN will be used to store Open-VMS data), xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),solaris_efi

    By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.

    Real 21

  • Netapp NS0-155 Exam

    Using this option will create a LUN without any space being reserved. Provisioning threshold events can be enabled by specifying -e space_alloc option. This optionhas to be used in conjunction with -o noreserve.

    lun map [ -f ] lun_path initiator_group [ lun_id ]Maps a LUN to all the initiators in the supplied group. If a LUN ID is not specified, the smallest number that can be used for the various initiators in the group isautomatically picked. Note that this command can be used multiple times to configure multiple maps for a LUN, or for an initiator group. Once created, you can uselun show -m to list all the LUN mappings. The optional -f argument disables checking with the HA partner for LUN mapping conflicts.

    QUESTION 33Which Data ONTAP option sets system-wide for all transfers?

    A. Options transfers.wide.enableB. Options transfer.throttle.enable.C. Option replication.wide.enableD. Options replication.throttle.enable

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

    replication.throttle.enable Enables global network throttling of SnapMirror and SnapVault transfers.The default value for this option is off.replication.throttle.incoming.max_kbsThis option specifies the maximum total bandwidth used by all the incoming (applied at destination) SnapMirror and SnapVault transfers, specified in kilobytes/sec.The default value for this option is unlimited, which means there is no limit on total bandwidth used. This option is valid only when the optionreplication.throttle.enable is on.

    replication.throttle.outgoing.max_kbsThis option specifies the maximum total bandwidth used by all the outgoing (applied at source) SnapMirror and SnapVault transfers specified in kilobytes/sec. Thedefault value for this option is unlimited, which means there is no limit on total bandwidth used. This option is valid only when the option replication.throttle.enable ison.

    Real 22Netapp NS0-155 Exam

  • QUESTION 34What is the correct format for the scheduling component of a SnapVault schedule?

    A. cnt[@day_list][@hour_list]B. YYYY-MM-DDC. Crontable formatD. List of dates in ISO Date format

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html http://www.geekyfacts.com/index.php?option=com_content&view=article&id=64:snapvault snapvault snap sched [ -f ] [ -x ] [ -o options ] [ volname [ snapname [ schedule ]]] schedule is cnt[@day_list][@hour_list] or cnt[@hour_list][@day_list] In the schedule, cnt tells SnapVault how many of the snapshots to keep for primaries and for non- SnapLock secondaryvolumes. The snapshots will be numbered newest to oldest from 0 to cnt-1. When creating a new snapshot, SnapVault will delete the oldest snapshots, incrementby one the number on the remaining snapshots and then create a new number 0 snapshot. If a snapshot is missing from the sequence (e.g. sv.0, sv.1, and sv.3exist but sv.2 does not), only snapshots that need to be renumbered to make room for the new sv.0 snapshot will be renumbered. In the example, sv.0 and sv.1would be renamed to sv.1 and sv.2, but sv.3 would remain unchanged.

    The cnt in the schedule is interpreted differently for SnapVault secondary SnapLock volumes. For SnapLock secondary volumes, snapshots are created with aname that includes an encoded date and time of when the snapshot is created. These snapshots are never renamed and they are never automatically deleted.These snapshots may be deleted using snap delete after the retention period of the snapshot has expired. If cnt is 0, no snapshots will be taken. If cnt is any non-zero value, snapshots will be taken and no snapshots will be automatically deleted.

    If specified, the day_list specifies which days of the week the snapshot should be created. The day_list is a comma-separated list of the first three letters of the day:mon, tue, wed, thu, fri, sat, sun. The names are not case sensitive. Day ranges such as mon-fri can also be given. The default day_list is mon-sun, i.e. every day.

    If specified, the hour_list specifies which hours of the day the snapshot should be created, on each scheduled day. The hour_list is a comma-separated list of thehours during the day, where hours are integers from 0 to 23. Hour ranges such as 8-17 are allowed. Also, step values are allowed in conjuction with ranges. Forexample, 0-23/2 means "every two hours". The default hour_list is 0, i.e. midnight on the morning of each scheduled day.

    Real 23Netapp NS0-155 Exam

    QUESTION 35When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?

  • http://www.gratisexam.com/

    A. When the 64-bit volumes has Volume Guarantee disabledB. When the 64-bit volume has compression enabledC. When the 64-bit volume has FlexShare enabledD. When the 64-bit volume has ASIS enabled

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-87340429-8F4A-4AA6-B081- 0F5040089C78.htmlData compression requires 64-bit aggregates.

    QUESTION 36UNIX allows file access based on___________.

    A. NT ACLs and UNIX permissions.B. NT ACLs and SID.C. GID or UID and UNIX permissions.D. GID or UID and ACLs.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA- B0BDA63560FECEFF.html

  • In OnTap 8.0, when UNIX security style is selected, only UNIX security objects can be used. The correct answer is GID, UID and UNIX permissions.

    Basic UNIX permissions are organized into three classes: user, group, and others. UNIX operating systems identify users with a numerical value: a user identifier,also known as a UID or User ID. Each user is a member of a group of the same name as the user. Like UIDs, groups (GIDs) are also specified using a numericalvalue.

    Real 24Netapp NS0-155 Exam

    QUESTION 37Which NetApp Storage Tier component works controller-wide on a FAS controller?

    A. Flash PoolB. Flash DiskC. Flash AccelD. Flash CacheE. Flash IO

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us http://www.netapp.com/us/products/storage-systems/flash- cache/index.aspx?ref_source=ntp141p359372brg-c-26967a63-442e-c7e9-6a73- 00002efa4dd6&gclid=CLLdsqWKrbkCFS4aOgodb1AAuA

    Flash Cache is a controller-attached PCIe intelligent caching solution.Flash Accel is a host-attached caching solution.Flash Pool utilizes SSDs to enhance performance of disk aggregates (implicitly not controller- wide).Flash Disk and Flash IO are ambiguous terms.

    QUESTION 38Which NetApp Storage Tier component works aggregate-wide on a FAS controller?

    A. Flash PoolB. Flash DiskC. Flash CacheD. Flash Accel

  • E. Flash IO

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us

    Real 25Netapp NS0-155 Exam

    http://www.netapp.com/us/products/platform-os/flashpool.aspx Flash Pool utilizes SSDs to enhance performance of disk aggregates. Flash Cache is a controller-attached PCIe intelligent caching solution.Flash Accel is a host-attached caching solution.Flash Disk and Flash IO are ambiguous terms.

    QUESTION 39What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)

    A. Snap AutodeleteB. iGroup throttleC. LUN resetD. Volume AutoSize

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional- reservation--lunoverwrite

    From the article:"If you reduce the Fractional Reservation to 0, you need to make sure the rate of change is within the volume size, or you need to make sure the volume can auto-grow when required or even snap auto-delete to reduce the reserved blocks and free up space (although I am not a huge fan of snap auto-delete for variousreasons)."

    QUESTION 40Which set of protocols provide block-level access to NetApp storage?

  • A. SNA and RPCB. iSCSI and FCPC. HTTP and FTPD. CIFS and NFS

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Real 26Netapp NS0-155 Exam

    Explanation:iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are commonly referred to as a block storage protocols. FCoE is anothersuch protocol. CIFS and NFS, HTTP and FTP provide file access not block access.

    QUESTION 41An iSCSI or FC SAN implementation provides ____________ access to LUNs.

    A. VLDB. VIIPC. FileD. Block

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are commonly referred to as a block storage protocols. FCoE is anothersuch protocol. CIFS and NFS, HTTP and FTP provide file access not block access.

    QUESTION 42Which command on the storage system allows you to display statistics on the performance of system resource such as CPU, NVRAM, network interfaces, anddisks?

  • A. netstatB. netdiagC. pkttD. sysstat

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html sysstat reports aggregated filer performance statistics such as the current CPUutilization, the amount of network I/O, the amount of disk I/O, and the amount of tape I/O.

    Real 27Netapp NS0-155 Exam

    QUESTION 43Which three protocols can coexist on a NetApp storage system? (Choose three)

    A. DAFSB. CIFSC. DFSD. FCPE. NFS

    Correct Answer: BDESection: (none)Explanation

    Explanation/Reference:Explanation:Data OnTap can simultaneously serve NAS and SAN protocols. CIFS, NFS, and FC protocol are examples of NAS and SAN protocols respectively.

    Data OnTap 7.1 or later does not support DAFS.DFS provides location transparency and redundancy by allowing shares in multiple different locations to be logically grouped under one folder, or DFS root. Whilepractically a CIFS server shared by a Data OnTap filer can be a DFS target, DFS namespaces can only be hosted on Windows systems.

    QUESTION 44

  • Which three tools present statistics from the Data ONTAP counter manager? (Choose three)

    A. Operations managerB. Window perfmonC. SysstatD. Stats

    Correct Answer: ABDSection: (none)Explanation

    Explanation/Reference:Explanation: Section: OnTap AdministrationExplanation

    https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html https://communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5-34635/TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performance-

    Real 28Netapp NS0-155 Exam

    stats-withoutperfstat-or-ops-mgr

    Note in the diagram below how the performance tools integration with Data OnTap. statit and sysstat interface directly with the performance counters while the othertools - including stats, a command line tool -integrate with the Counter Manager.

  • QUESTION 45What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a SnapVault secondary system?

    A. MD5 authentication between SnapVault primary and secondary, with changeable passwordB. Contents inside file called access and located in OSSV /snapvault/etcC. QSM access list modifiable via svconfiguratorD. Via /etc/hosts.equiv file

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:

  • Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf In order to restrict the NetApp secondary systems that are allowedto initiate backups from an OSSV host, the QSM Access List field can be populated with the hostname of the secondary using the OSSV Configurator utility. Whenusing this option, make sure the "Check QSM Access List" box is enabled.

    Real 29Netapp NS0-155 Exam

    The snapvault.access option on the NetApp secondary can be used to restrict the OSSV hosts that are allowed to initiate restores from that secondary system. Thisoption can be populated with a list of hostnames for each OSSV host. For example:options snapvault.access host=ossv1,ossv2,ossv3Screenshot of the svconfigurator GUI; note the QSM access list checkbox and field.

  • QUESTION 46Which command disables client access to Snapshot copies on a volume called flexvoll?

    A. cifs shares change flxvoll nosnap

  • B. snap access flexvoll offC. vol options flexvoll nonsnapdir onD. vol options flexvoll snapdir offE. vol options flexvoll snapdir on

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html vol options nosnapdir [on|off]If this option is on, it disables the visible .snapshot directory that is normally present at client

    Real 30Netapp NS0-155 Exam

    mount points, and turns off access to all other .snapshot directories in the volume. The default setting is off.

    QUESTION 47When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster site node. (Choose two)

    A. Use manual fencingB. Use the cf giveback f command.C. Use the cf forcetakeover d command.D. Turn off power to the disaster site node.E. Isolate the failed node from the surviving node.

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:http://vipulvajpayeestorage.blogspot.com/2012/01/manually-failover-activity-in-netapp.html

    In order to test or effect a Disaster Recovery operation, you must restrict access to the disaster site node to prevent the node from resuming service. If you do not,you risk the possibility of data corruption.

    Access to the disaster site note can be restricted in the following ways:

  • Turn off the power to the disaster site node Use "manual fencing" (Disconnect VI interconnects and fiber channel cables; either physically or through configurationchanges on the fabric switches.)Isolating the failed node from the surviving node could still lead to the possibility of a split brain, so this is not a correct answer.

    QUESTION 48The two copies SyncMirror volume are called ____________, which are physical copies of the same file system and consist of one or more RAID groups.

    A. Snapshot copiesB. AggregatesC. Plexes

    Real 31Netapp NS0-155 Exam

    D. Volumes

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA- 8FEE619EEF1D.html

    SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for real-time mirroring of data to matching aggregates physicallyconnected to the same storage system.SyncMirror provides for synchronous mirroring of data, implemented at the RAID level. You can use SyncMirror to create aggregates that consist of two copies ofthe same WAFL file system. The two copies, known as plexes, are simultaneously updated. Therefore, the copies are always identical. The two plexes are directlyconnected to the same system.

    The following provides information about the activities of SyncMirror:SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume is essentially an aggregate with a single volume that spans the entireaggregate.) SyncMirror cannot be used to mirror FlexVol volumes. However, FlexVol volumes can be mirrored as part of an aggregate.SyncMirror is different from synchronous SnapMirror.

    QUESTION 49You want to create an automated test environment that performs a single file SnapRestore time you run the procedure, however, SnapRestore prompts you toconfirm your decision to revert the file. How can you automate this step?

    A. Use the -f option with the snap restore command.B. Enable the options snaprestore_noprompts enable = on option.C. These prompts are for data protection and auditing and cannot be overridden.

  • D. Enter the priv set advanced mode on the storage system and prompt will not appear.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snap.1.html

    snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ]

    Real 32Netapp NS0-155 Exam

    vol_name | restore_from_pathReverts a volume to a specified Snapshot copy, or reverts a single file to a revision from a specified Snapshot copy.Before reverting the volume or file, the user is requested to confirm the operation. The -f option suppresses this confirmation step.

    QUESTION 50When viewing the output of the sysstat f command, which three fields are part of the output? (Choose three)

    A. FCPB. FTPC. CIFSD. NFSE. iSCSI

    Correct Answer: ACDSection: (none)Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html

    sysstat [ -c count ] [ -s ] [ -u | -x | -m | -f | -i | -b ] [ -d ] [ interval ] -f For the default format display FCP statistics.The FCP default output format is as follows:CPU NFS CIFS FCP Net kB/s Disk kB/s FCP kB/s Cachein out read write in out age

  • ###% ##### ##### ##### ##### ##### ##### ##### ##### ##### >##

    QUESTION 51Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS users are now complaining about getting "stale file handles" for thefile. Which is the most likely cause of this problem, and the best procedure to correct it?

    A. This might be due to an NFS storage system and client mismatch. Check to see that these users have the same version of the NFS client that existed at thetime the snapshot was taken.Real 33Netapp NS0-155 Exam

    B. NFS users why try to access a reverted file without first reopening it might get a "stale file handle" error message. Have the users try to reopen the file and see ifthe problem is resolved.

    C. After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their systems.D. These users are on a different subnet from the others. Start troubleshooting by checking their subnet.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366- 698C1299E29D.html

    Reverting a file to a selected Snapshot copyUsing snap restore to revert a single file to a selected Snapshot copy is practical when the file is so large that you cannot copy the previous file version from theSnapshot copy to the active file system.Before you begin Ensure that you notify the network users before reverting a file so that they know that the current data in the file will be replaced by that of theselected Snapshot copy.

    Note: NFS users who try to access a reverted file without first reopening it might get a stale file handle error message after the volume reversion.

    QUESTION 52Using the output below, a co-worker determined that these are types "Solaris" LUNs. What would your destination be?

    lun show m LUN patch mapped to LUN ID -------------------------------------------------------

    /vol/vol1/lun0 solaris igroup0 0 /vol/vol1/lun solaris- igroup1

    0 /vol/vol1/qtree1/lun2 solaris igroup2 0 /vol/vol1/qtree1/lun3 solaris igroup3 0

    A. These are type "Solaris" LUNs.

  • B. Not enough information is given here. Run the lun status command to get the information requested.C. Not enough information is given here. Run the lun show v command to get the information requested.D. Not enough information is given here. Run the lun map command to get the information Real 34

    Netapp NS0-155 Examrequested.

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 53Which statement is true about ASIS deduplication license with Data ONTAP 8.1?

    A. The existing 8.0 license key is used.B. A new license key is generated.C. The license is capacity-based.D. The license no longer exists.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1120690/html/frameset.html

    Changes to deduplication in 8.1 7-modeStarting with Data ONTAP 8.1, you can enable the deduplication feature without adding a license.Fordeduplication, no limit is imposed on the supported maximum volume size. The maximum volume size limit is determined by the type of storage system regardlessof whether deduplication is enabled.

    QUESTION 54Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 resynchronization state when it failed?

    A. Determine which volumes are at the remote and disaster sites.

  • B. Re-create the synchronous mirror.C. Rejoin the two volumes.D. Turn on power to the cluster node at the disaster site.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1210206/html/GUID-A865DB95-9418-4ED2-A993-

    Real 35Netapp NS0-155 Exam

    74F347F674A0.html

    1. Validate that you can access the remote storage by entering the following command:aggr status -rNote: A (level-0 resync in progress) message indicates that a plex cannot be rejoined.

    2. Turn on the power to the node at the disaster site. After the node at the disaster site boots up, it displays the following:Waiting for giveback...(Press Ctrl-C to abort wait)

    3. If the aggregates at the disaster site are online, take them offline by entering the following command for each aggregate that was split:aggr offline disaster_aggrdisaster_aggr is the name of the aggregate at the disaster site. Note: An error message appears if the aggregate is already offline.

    4. Destroy every target plex that is in a level-0 resync state by entering the following command:aggr destroy plex_name

    5. Re-create the mirrored aggregates by entering the following command for each aggregate that was split:aggr mirror aggr_name -v disaster_aggraggr_name is the aggregate on the surviving site's node. disaster_aggr is the aggregate on the disaster site's node. The aggr_name aggregate rejoins thedisaster_aggr aggregate to reestablish the MetroCluster configuration.

    6. Enter the following command at the partner node:cf givebackThe node at the disaster site reboots.

    QUESTION 55

  • When running deduplication on SnapVault destinations, which three statements are true?

    A. The target SnapVault controller deduplicates inline.B. The source SnapVault data is deduplicated inline on the target before it is written to disk.C. Deduplication internally synchronizes with the SnapVault schedule on the destination.D. The source (primary) system sends duplicated data even if the source data is deduplicated.

    Real 36Netapp NS0-155 Exam

    E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the snapshot to effectively deduplicate savings.

    Correct Answer: CDESection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-E5AD37DE-2F44-47DB-90A3- C8E115FCBFB7.htmlSnapVault replicates at the file level not the block level. Deduplication is always a post-processed activity for Data OnTap, while compression is an inline process.The deduplication schedule depends on the SnapVault update schedule on the destination system.A new Snapshot copy replaces the archival Snapshot copy after deduplication finishes running on the destination system. (The name of this new Snapshot copy isthe same as that of the archival copy, but the Snapshot copy uses a new timestamp, which is the creation time.) The SnapVault update recognizes the deduplicatedblocks as changed blocks. Thus, when deduplication is run on an existing SnapVault source for the first time, all saved space is transferred to the destinationsystem.

    QUESTION 56If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solaris host and storage system data for analysis?

    A. sio_ntap.exeB. prestartC. poststatD. perfstat

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://communities.netapp.com/docs/DOC-1059

  • Performance and Statistics Collector (perfstat) is a data collection tool with several key properties:

    Perfstat comes in exactly two flavors:

    Supported platforms:

    Real 37Netapp NS0-155 Exam

    QUESTION 57Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?

    A. FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 synsB. FilerA:source_vol FilerB:destination_vol 0-55/5 * * *C. FilerA:source_vol FilerB:destination_vol syncD. FilerA:source_vol FilerB:destination_vol outstanding=3s sync

    Correct Answer: ACDSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html Each relationship entry of the /etc/snapmirror.conf file is a single linecontaining space-separated fields.The entry has this format:Source destination arguments schedule scheduleThis is the schedule used by the destination node for updating the mirror. It informs the SnapMirror scheduler when transfers will be initiated. The schedule field cancontain the word sync to specify fully synchronous mirroring, semi-sync to specify semi-synchronous mirroring, or a cron-style specification of when to update themirror.

    visibility_intervalThe value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h (hours). If a suffix is not specified, value is interpreted asseconds. This argument controls the amount of time before an automatic snapshot is created on the source volume that is synchronously mirrored. The value is thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A small number here can negatively affect the performance of themirror. This argument is ignored for asynchronous mirrors.

    Outstanding (deprecated)This argument controls the performance versus synchronicity trade-off for synchronous mirrors. The value for this argument is a number followed by the suffixes:ops (operations), ms (milliseconds) or s (seconds). Setting a value less than 10s configures the mirror to run in fully synchronous mode. Setting a value greater than

  • or equal to 10s configures the mirror to run in semi-synchronous mode. This argument is ignored for asynchronous mirrors. Please note that this is a deprecatedoption. Use the schedule field to specify the synchronous mode for the mirror.

    cksum

    Real 38Netapp NS0-155 Exam

    This controls which checksum algorithm is used to protect the data transmitted by SnapMirror. Currently supported values are "none", "crc32c", and"crc32c_header_only". The value "crc32c_header_only" has been added only for volume SnapMirror and is not supported for synchronous SnapMirror and qtreeSnapMirror.

    QUESTION 58Which three are valid LUN commands? (Choose three)

    A. lun cloneB. lun copyC. lun moveD. lun renameE. lun snap

    Correct Answer: ACESection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

    The following commands are available in the lun suite:

  • QUESTION 59Which three attributes would you specify when creating a LUN? (Choose three)

    http://www.gratisexam.com/

    A. The host operating system of the system attached to LUN.B. The version of Data ONTAPC. The size of the LUN.D. The path to the LUN.

    Correct Answer: ACDSection: (none)Explanation

    Explanation/Reference:Real 39Netapp NS0-155 Exam

    Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

    The usage for lun create is shown below. Options not in brackets are mandatory. lun create -s size -t ostype [ -o noreserve ] [ -e space_alloc ] lun_path This usageof the lun create command should be employed to create a new LUN of given size, with initially zero contents. The LUN is created at the lun_path given. No fileshould already exist at the given lun_path. The directory specified in the lun_path must be a qtree root directory.

    The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be used: c (1), w (2), b (512), k (1024), m (k*k), g (k*m), t(m*m). The size of the created LUN could be larger than the size specified, in order to get an integral number of cylinders while reporting the geometry using SANprotocols.

    The size of the LUN actually created is reported if it is different from that specified in the command.The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a singleslice partition), windows (the LUN will be used to storea raw disk device in a single- partition Windows disk using the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX data), aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the LUN will be used to store a Linux raw disk without any partitiontable), netware (the LUN will be used to store NetWare data), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to store

  • Windows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be used to store Windows data for Windows 2008 systems),openvms (the LUN will be used to store Open-VMS data), xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),solaris_efi (the LUN will be used to store Solaris_EFI data).

    By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.Using this option will create a LUN without any space being reserved. Provisioning threshold events can be enabled by specifying -e space_alloc option. This optionhas to be used in conjunction with -o noreserve.

    QUESTION 60Which three items are NFS resources for export? (Choose three.)

    A. aggregateReal 40Netapp NS0-155 Exam

    B. directory/qtreeC. fileD. subnetE. volume

    Correct Answer: BCESection: (none)Explanation

    Explanation/Reference:Explanation:You can export any file path. Implicitly file paths are filesystem objects. You can export a directory, a qtree, a volume or even a file.

    QUESTION 61Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.

    A. TrueB. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3740.pdf&cc=us

  • SMB 2.0 support was included in Data OnTap 8.1.

    QUESTION 62In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore operations on the file or volume cannot rely on the timestamps todetermine what data needs to be backed up or restored. Which course of action ensures correct incremental backups?

    A. Perform a base-level backup of the volume after you restore it.B. Reboot the storage system to reset timestamps back to their original times before the reversion.C. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.D. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup, and then perform a base-level backup of the volume after

    you restore it.

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:

    Real 41Netapp NS0-155 Exam

    A baseline (aka "full") backup is always required before valid incremental backups can be made.

    QUESTION 63Which changes the NDMP password on the Open System SnapVault agent?

    A. passwordB. password C. svpasswd D. svpassword

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://kb.netapp.com/support/index?

  • Page=content&id=2010134&actp=LIST_RECENT&viewlocale=en_US&searchid=1296570465177 The svpassword command is available on the OSSV host as partof the agent binaries in the path \netapp\snapvault\bin.

    QUESTION 64Which three licenses are required for fabric-attached MetroCluster? (Choose three.)

    A. ClusterB. Cluster_remoteC. Syncmirror_localD. Syncmirror_fabricE. Syncmirror_remote

    Correct Answer: ABCSection: (none)Explanation

    Explanation/Reference:Explanation:https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf http://backdrift.org/man/netapp/man1/na_license.1.html Inpreparation for a fabric attached metrocluster configuration, the following licenses must be installed:Cluster syncmirror _localcluster_remotesyncmirror_fabric and syncmirror_remote are not valid license types.

    Real 42Netapp NS0-155 Exam

    QUESTION 65Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)

    A. A LUN can be converted into a VLD.B. LUNs can be accessed using the FCP protocol.C. LUNs can be accessed using the iSCSI protocol.D. Block services are associated with an iSCSI or FCP SAN environment.

    Correct Answer: BCDSection: (none)Explanation

  • Explanation/Reference:Explanation:Sadly, you cannot convert a LUN into a Vulcan Language Dictionary.

    QUESTION 66To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utility. (Choose two.)

    A. AutoSupportB. Bugs OnlineC. NetApp DiagnosticsD. Release ComparisonE. System Configuration Guide

    Correct Answer: BDSection: (none)Explanation

    Explanation/Reference:Explanation:This question is out of date, but its still on the exam as of Sept2013! NOW has been replaced with support.netapp.com.

    You should be very familiar with what AutoSupport does. Also if you have done any research, you know that the System Configuration Guide is an invaluable toolthat you will use regularly. Neither of those are related to bugs.

    Bugs Online (BOL) is located at http://support.netapp.com/NOW/cgi-bin/bol/ Bugs Online provides a suite of tools to help manage and resolve your bug issues.

    Real 43Netapp NS0-155 Exam

    The Release Bug Advisor is located athttp://support.netapp.com/NOW/cgi-bin/relrec

    There is also a Version Comparison tool available athttps://communities.netapp.com/docs/DOC-8168/diff?secondVersionNumber=8

    QUESTION 67Which two commands on the storage system allow you to gather detailed statistics about network interfaces, including basic information about networkconnections? (Choose two.)

    A. ifstat -a

  • B. netdiag -nC. netstat -iD. sysstat 1

    Correct Answer: ACSection: (none)Explanation

    Explanation/Reference:Explanation:ifstat -a provides detailed statistics (multiple pages) about all network interfaces. netstat -i provides a list of connections and open network sockets (listeners).netdiag -n will perform a diagnostic but does not provide detailed statistics about networking. sysstat 1 will provide performance statistics but not detailed statisticsabout networking.

    QUESTION 68To configure a storage system as a member of a Windows active directory domain, the time on the storage system must be set to be within plus or minus fiveminutes of the time on the domain controller.

    A. TrueB. False

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:

    Real 44Netapp NS0-155 Exam

    QUESTION 69For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must do what?

    A. Enter the CIFS user in the NIS database.B. Enter the user names in the /etc/hosts.equiv file.C. Use both a NIS server and a Domain Controller in the network.D. Nothing: mapping will occur if user name authentication is available.

  • Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79- EAB803E7A8EB.html

    If the user names in the UNIX password database are identical to the Windows names, you need not provide the mapping information in the /etc/usermap.cfg file.

    QUESTION 70If the security style is set to UNIX, CIFS client file access is determined by ___________.

    A. NT ACLsB. the last client to set permissionsC. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissionsD. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79- EAB803E7A8EB.html

    For Data ONTAP to obtain the UID and GIDs for a CIFS user, it must first determine the user's UNIX-style name. It does this through user mapping.

    QUESTION 71NTFS allows file access based on ___________.

    Real 45Netapp NS0-155 Exam

    A. NT ACLs and SID.B. NT ACLs and UNIX permissions.C. SID and password.D. UNIX permissions.

    Correct Answer: A

  • Section: (none)Explanation

    Explanation/Reference:Explanation:http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA- B0BDA63560FECEFF.html

    In OnTap 8.0, when NTFS security style is used, only Windows style security objects are used. For CIFS clients, security is handled using Windows NTFS ACLs.For NFS clients, the NFS UID (user id) is mapped to a Windows SID (security identifier) and its associated groups. Those mapped credentials are used todetermine file access, based on the NFTS ACL.

    QUESTION 72UNIX allows file access based on __________.

    A. GID or UID and ACLs.B. GID or UID and UNIX permissions.C. NT ACLs and SID.D. NT ACLs and UNIX permissions.

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:

    * Unix-like operating systems identify users within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range ofUID values varies amongst different systems; at the very least, a UID represents a 15-bit integer, ranging between 0 and

    The UID value references users in the /etc/passwd file. Shadow password files and Network Information Service also refer to numeric UIDs. The user identifier hasbecome a necessary component of Unix file systems and processes.

    * In POSIX-compliant environments the command-line command id gives the user's user identifier number as well as more information on the user account like theuser name, primary user group and group identifier (GID).

    Real 46Netapp NS0-155 Exam

    * Files and directories are owned by a user. The owner determines the file's owner class. Distinct permissions apply to the owner.Files and directories are assigned a group, which define the file's group class. Distinct permissions apply to members of the file's group members. The owner maybe a member of the file's group. Users who are not the owner, nor a member of the group, comprise a file's others class. Distinct permissions apply to others.

  • The effective permissions are determined based on the user's class. For example, the user who is the owner of the file will have the permissions given to the ownerclass regardless of the permissions assigned to the group class or others class.

    QUESTION 73Executing this command will have what effect?

    Options wafl.default_security_style ntfs

    A. It will set the security style of all files to be ntfs.B. It will change the security style of all qtrees to be ntfs.C. It will change the security style of all existing volumes to be ntfs.D. It will set the security style of all newly created volumes to ntfs.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

    wafl.default_security_styleSpecifies the default security style assigned to a new volume. All qtrees created on the volume get this as their security style. Legal values for this option are `unix',`ntfs', or `mixed'. The default value for this option is `unix', unless the node is an NTFS-only node, in which case the default is `ntfs'.Note: if cifs setup is run after setting wafl.default_security_style, the filer will become an NTFS security style filer.

    QUESTION 74Which two statements apply to an entry in the /etc/exports file regarding exporting

    Real 47Netapp NS0-155 Examdirectories/qtrees and volumes? (Choose two.)

    A. Each volume must be exported separately.B. Exports are accessible only to hosts with names.C. User names used in an export must be resolvable.D. Exports can access multiple paths on the same volume.

    Correct Answer: ADSection: (none)

  • Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

    IP addresses and wildcards can be used when specifying host targets in exports. User names are not valid exports options, save for the anon option which utilizes alocal system UID or user name (i.e. no user name mapping or resolution is performed.) The highest level in the filesystem that can be specified for an export is thevolume level. Implicitly this means that each volume must be exported separately. An export provides access to paths below the export, implying that multiple pathson the same volume can be exported from an export.

    QUESTION 75To automatically export volumes and directories on storage system reboot, include them in the /etc/exports file.

    A. TrueB. False

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

    The /etc/exports file contains a list of export entries for all file system paths that Data ONTAP exports automatically when NFS starts up.

    QUESTION 76Which exportfs command will temporarily export the resource while ignoring the options specified

    Real 48Netapp NS0-155 Examin the /etc/exports file?

    A. exportfs -aB. exportfs -iC. exportfs -uD. exportfs -v

    Correct Answer: B

  • Section: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 77Which two are Data ONTAP commands for displaying performance information? (Choose two.)

    A. nfsstatB. perfstatC. sio_ntap_sollD. sysstat

    Correct Answer: ADSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html

    nfsstat and sysstat are OnTap commands used for performance information.sio_ntap_soll is not an OnTap command.

    Perfstat is a GUI performance tool, not an OnTap command. Think of PerfMon for Windows to remind you that PerfStat is a Windows tool. Note how many of theONTAP performance commands end in stat.

    QUESTION 78Which statement best describes the output of this command? sysstat -s 5

    A. Display the default output every five seconds and terminate after five counts.B. Display extended output every five seconds and print a summary after five counts.C. Display extended output every five seconds and print a summary upon termination.

    Real 49Netapp NS0-155 Exam

    D. Display the default output every five seconds and print a summary upon termination.

    Correct Answer: DSection: (none)

  • Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_sysstat.1.html -sDisplay a summary of the output columns upon termination, descriptive columns such as `CP ty' will not have summaries printed. Note that, with the exception of`Cache hit', the `Avg' summary for percentage values is an average of percentages, not a true mean of the underlying data. The `Avg' is only intended as a grossindicator of performance. For more detailed information use tools such as na_nfsstat, na_netstat, or statit.

    QUESTION 79To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set on.

    A. TrueB. False

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

    nfs.per_client_stats.enableEnables/disables the collection and display of perclient NFS statistics, as described in na_nfsstat(1). Valid values for this option are on or off. The default value forthis option is off.

    QUESTION 80Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)

    A. lun createB. lun configC. lun makeD. lun setup

    Real 50Netapp NS0-155 Exam

    Correct Answer: ADSection: (none)Explanation

  • Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

    The following commands are available in the lun suite:

    Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.

    QUESTION 81In a Fibre Channel configuration, the host's HBA is referred to as the ___________, and the storage system's HBA is referred to as the __________ .

    A. initiator, targetB. primary, secondaryC. secondary, primaryD. target, initiator

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:http://en.wikipedia.org/wiki/SCSI_initiator_and_target

    QUESTION 82Before running lun setup on the storage system, you must first create the igroup to which the initiator will be attached.

  • A. TrueB. False

    Real 51Netapp NS0-155 Exam

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

    lun setupEasy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.

    QUESTION 83These are three methods of creating a LUN:

    * lun create

    * lun map

    * lun setup

    A. TrueB. False

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html The following commands are available in the lun suite:

  • Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.

    lun map [ -f ] lun_path initiator_group [ lun_id ]

    Maps a LUN to all the initiators in the supplied group

    Real 52Netapp NS0-155 Exam

    QUESTION 84Which set of commands should be used for troubleshooting Ethernet connectivity problems from the storage system console?

    A. ifstat, netdiagB. perfstat, tracertC. sysconfig - cr, sysstatD. dish shm_stats, sysstat

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html http://backdrift.org/man/netapp/man1/na_netdiag.1.html

    ifstat - display device-level statistics for network interfaces netdiag - perform network diagnostics

  • QUESTION 85Which command displays the statistics for Ethernet network interfaces?

    A. ifconfigB. ifstatC. sysconfigD. sysstat

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html ifstat - display device-level statistics for network interfaces

    QUESTION 86Real 53Netapp NS0-155 ExamWhich command is used to set the configuration of an Ethernet network interface?

    A. ifconfigB. ifstatC. netstat - iD. sysconfig - v

    Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_ifconfig.1.html

    ifconfig - Configures network interface parameters.

    QUESTION 87What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose three.)

  • http://www.gratisexam.com/

    A. Use reallocate -p pathname to run the physical reallocate.B. Use aggr reallocate -p pathname to run the physical reallocate.C. Reinitialize any SnapMirror relationship for the new physical geometry.D. Volume Snapshots do not need to be deleted for the reallocate to run effectively.E. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier than 7.2.

    Correct Answer: ADESection: (none)Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html

    The -p option requests that reallocation of user data take place on the physical blocks in the aggregate, but the logical block locations within a flexible volume arepreserved. Aggregate reallocation is not supported on aggregates created prior to Data ONTAP 7.2. Using the -p option may reduce the extra storage requirementsin a flexible volume when reallocation is run on a volume with snapshots. It may also reduce the amount of data that needs to be transmitted by SnapMirror on itsnext update after reallocation is performed on a SnapMirror source volume.

    Real 54Netapp NS0-155 Exam

    QUESTION 88Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the next SnapMirror update.

    A. TrueB. False

    Correct Answer: BSection: (none)

  • Explanation

    Explanation/Reference:Explanation:https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html Using the -p option may reduce the extra storage requirements in a flexiblevolume when reallocation is run on a volume with snapshots. It may also reduce the amount of data that needs to be transmitted by SnapMirror on its next updateafter reallocation is performed on a SnapMirror source volume.

    QUESTION 89A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of the ____________ at the time the snapshot wascreated.

    A. qtreesB. volumeC. directoryD. storage system

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:http://backdrift.org/man/netapp/man1/na_snap.1.html

    Snapshots can be made of volumes or aggregates; most commonly the former. The question refers to a file system, or more specifically a volume.You cannot snapshot directories or qtrees alone.

    QUESTION 90Data ONTAP uses inodes in an active file system to reference ___________.

    Real 55Netapp NS0-155 Exam

    A. qtreesB. disk blocksC. file segmentsD. Snapshot copies

    Correct Answer: B

  • Section: (none)Explanation

    Explanation/Reference:Explanation:All data, whether file or block-based, resides in 4KB blocks on disk. A group of related blocks make up a file. To accommodate different file sizes, the WAFLfilesystem describes each file with reference pointers called inodes.

    https://communities.netapp.com/servlet/JiveServlet/previewBody/5027-102-1- 6953/PS%20Tech%20Note%20018%20-%20maxfiles.pdf

    Topic 2, Volume B

    QUESTION 91Which command disables client access to Snapshot copies on a volume called flexvol1?

    A. cifs shares -change flexvol1 -nosnapB. snap access flexvol1 offC. vol options flexvol1 nosnapdir onD. vol options flexvol1 snapdir offE. vol options flexvol1 snapdir on

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 92When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list command) is adjusted for all the weekly.n, nightly.n, orhourly.n Snapshot copies. The higher the value of n, the _________ the snapshot.

    A. olderB. newerC. more important

    Real 56Netapp NS0-155 Exam

    D. least important

  • Correct Answer: ASection: (none)Explanation

    Explanation/Reference:Explanation:where n is an integer. The most recent weekly Snapshot copy is weekly.0, weekly.1 is the next most recent weekly Snapshot copy, and so on.

    https://library.netapp.com/ecmdocs/ECMP1113957/html/GUID-1D3B0C7D-D94E-43A3-9091- 5E76003E16EB.html

    QUESTION 93A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.

    A. 125B. 251C. 255D. Depends on capacity and number of disk drives

    Correct Answer: BSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 94Which three are pre-requisites for using SnapRestore? (Choose three.)

    A. The volume to be reverted must be offline.B. The volume to be reverted must not be a SnapMirror destination.C. You must enter the SnapRestore license code before you can use it.D. Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:Explanation:

  • You must meet certain prerequisites before using SnapRestore:- SnapRestore must be licensed on your storage system.- There must be at least one Snapshot copy on the system that you can select to revert.- The volume to be reverted must be online.

    Real 57Netapp NS0-155 Exam

    - The volume to be reverted must not be in use for data replication. http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-A14081A3-9270-47EE-A1C1-EC52D3ABDBD0.html

    QUESTION 95Which command or procedure would you use to undo a volume SnapRestore operation?

    A. snap restore -r volB. snap revert -s volC. snap restore undo volD. You cannot undo a SnapRestore operation at the volume level.

    Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:SnapRestore overwrites all data in the file or volume. After you use SnapRestore to revert to a selectedSnapshot copy, you cannot undo the reversion.

    http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-80FEDAF8-75FA-4E43- B683-58C1F66B61E2.html

    QUESTION 96What happens after you use SnapRestore to revert a volume to a specific snapshot?

    A. You must bring the volume back online.B. The storage system automatically performs a snapshot for that volume.C. The Snapshot copies that are older than the snapshot you used are deleted.D. The Snapshot copies that are more recent than the snapshot you used are deleted.

    Correct Answer: DSection: (none)

  • Explanation

    Explanation/Reference:Explanation:After you revert a volume to a selected Snapshot copy, you lose all the Snapshot copies that were taken after the selected Snapshot copy.

    https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-80FEDAF8-75FA-4E43-B683-

    Real 58Netapp NS0-155 Exam

    58C1F66B61E2.html

    QUESTION 97Which three statements are true when using SnapRestore? (Choose three.)

    A. The volume must be online.B. SnapRestore must be licensed before you can use it.C. The snap restore enable on option must be enabled.D. The volume to be reverted must not be a SnapMirror destination mirror.

    Correct Answer: ABDSection: (none)Explanation

    Explanation/Reference:Explanation:

    QUESTION 98Which objects can be restored by a single SnapRestore command? (Choose three)

    A. fileB. LUNC. qtreeD. volumeE. directory

    Correct Answer: ABDSection: (none)

  • Explanation

    Explanation/Reference:Explanation:SnapRestore on a file and volume:https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-1E99ACB2-5C69-4FFC-B115- 9D2951D109E9.html

    SnapRestore on a LUN:https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04- 55E736962FD1.html

    Hint: snaprestore at the volume level or at the file level. LUNs are effectively files.

    Real 59Netapp NS0-155 Exam

    QUESTION 99Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?

    A. snap restore -cB. snap restore -dC. snap restore -rD. snap restore s

    Correct Answer: CSection: (none)Explanation

    Explanation/Reference:Explanation:snap restore [ -A | -V ] [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name | restore_from_pathSee more at: http://wafl.co.uk/snap/#sthash.nJiEwxGV.dpuf

    QUESTION 100A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago. Which command continues the relationship?

    A. SnapMirror initializeB. SnapMirror quiesceC. SnapMirror resumeD. SnapMirror resyncE. SnapMirror update

  • Correct Answer: DSection: (none)Explanation

    Explanation/Reference:Explanation:You can use the snapmirror resync command to reestablish the connection between the source and the destination. This command is applied after the SnapMirrorrelationship between the source and destination is broken.https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-5D846D24-0903-4982-A429- 71AE5C0F9033.html

    QUESTION 101When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)

    Real 60Netapp NS0-155 Exam

    A. The source volume must be offline.B. SnapMirror must be licensed for each storage system.C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source destination volume.

    Correct Answer: BCDSection: (none)Explanation

    Explanation/Reference:Explanation:You need to fulfill a set of prerequisites before you can use SnapMirror:- You must purchase and enable the SnapMirror license. If the SnapMirror source and destination are on different systems, you must enable the SnapMirror licenseon each system.- For SnapMirror volume replication, you must create a restricted volume to be used as the destination volume.

    SnapMirror does not automatically create a volume. For information about how to create volumes, see the section on organizing data using volumes and qtrees inthe Data ONT