CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses

NetApp – NCSA Exam

Back to Exams Page.

1. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 1 of 100

2. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 2 of 100

3. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 3 of 100

4. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 4 of 100

5. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 5 of 100

6. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 6 of 100

7. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 7 of 100

8. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 8 of 100

9. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 9 of 100

10. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 10 of 100

11. What is the purpose of RAID?
 
 
 
 

Question 11 of 100

12. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 12 of 100

13. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 13 of 100

14. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 14 of 100

15. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 15 of 100

16. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 16 of 100

17. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 17 of 100

18. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 18 of 100

19. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 19 of 100

20. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 20 of 100

21. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 21 of 100

22. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 22 of 100

23. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 23 of 100

24. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 24 of 100

25. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 25 of 100

26. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 26 of 100

27. A quota target can be applied to  __________.
 
 
 
 

Question 27 of 100

28. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 28 of 100

29. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 29 of 100

30. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 30 of 100

31. Match the configuration files or directories to their uses.
Quota information file
Contains password information
Log files directory location
/etc/passwd
/etc/log/
/etc/quotas

Question 31 of 100

32. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 32 of 100

33. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 33 of 100

34. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 34 of 100

35. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 35 of 100

36. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 36 of 100

37. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 37 of 100

38. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 38 of 100

39. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 39 of 100

40. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 40 of 100

41. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 41 of 100

42. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 42 of 100

43. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 43 of 100

44. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 44 of 100

45. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 45 of 100

46. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 46 of 100

47. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 47 of 100

48. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 48 of 100

49. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 49 of 100

50. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 50 of 100

51. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 51 of 100

52. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 52 of 100

53. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 53 of 100

54. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 54 of 100

55. Match the configuration files or directories to their uses.
Contains password information
Log files directory location
Quota information file
/etc/passwd
/etc/log/
/etc/quotas

Question 55 of 100

56. cifs setup command is which of the following?
 
 
 
 

Question 56 of 100

57. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 57 of 100

58. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 58 of 100

59. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 59 of 100

60. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 60 of 100

61. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 61 of 100

62. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 62 of 100

63. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 63 of 100

64. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 64 of 100

65. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 65 of 100

66. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 66 of 100

67. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 67 of 100

68. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 68 of 100

69. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 69 of 100

70. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 70 of 100

71. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 71 of 100

72. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 72 of 100

73. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 73 of 100

74. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 74 of 100

75. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 75 of 100

76. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 76 of 100

77. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 77 of 100

78. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 78 of 100

79. Match the NetApp commands to their uses.
Reboot the storage array
Displays disk information
Displays licenses
Displays iscsi service running status
disk show
stats show iscsi
reboot
license

Question 79 of 100

80. Match the NetApp commands to their uses.
Displays licenses
Reboot the storage array
Displays iscsi service running status
Displays disk information
disk show
stats show iscsi
reboot
license

Question 80 of 100

81. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 81 of 100

82. cifs setup command is which of the following?
 
 
 
 

Question 82 of 100

83. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 83 of 100

84. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 84 of 100

85. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 85 of 100

86. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 86 of 100

87. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 87 of 100

88. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 88 of 100

89. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 89 of 100

90. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 90 of 100

91. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 91 of 100

92. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 92 of 100

93. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 93 of 100

94. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 94 of 100

95. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 95 of 100

96. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 96 of 100

97. A quota target can be applied to  __________.
 
 
 
 

Question 97 of 100

98. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 98 of 100

99. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 99 of 100

100. What is the purpose of RAID?
 
 
 
 

Question 100 of 100

Loading... Loading…

 

About Us

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

Most Popular

Cisco ICND1 Wireshark WCNA NetApp NCSA CompTIA Network+ VMware VCA-DCV Microsoft MTA OS Fundamentals

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Free IT Webinar Training

Secure Site

website security

Copyright 2016 Reality Press Ltd . / Paul Browning