CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses

NetApp – NCSA Exam

Back to Exams Page.

1. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 1 of 100

2. Match the configuration files or directories to their uses.
Log files directory location
Contains password information
Quota information file
/etc/passwd
/etc/log/
/etc/quotas

Question 2 of 100

3. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 3 of 100

4. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 4 of 100

5. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 5 of 100

6. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 6 of 100

7. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 7 of 100

8. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 8 of 100

9. A quota target can be applied to  __________.
 
 
 
 

Question 9 of 100

10. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 10 of 100

11. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 11 of 100

12. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 12 of 100

13. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 13 of 100

14. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 14 of 100

15. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 15 of 100

16. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 16 of 100

17. cifs setup command is which of the following?
 
 
 
 

Question 17 of 100

18. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 18 of 100

19. What is the purpose of RAID?
 
 
 
 

Question 19 of 100

20. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 20 of 100

21. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 21 of 100

22. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 22 of 100

23. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 23 of 100

24. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 24 of 100

25. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 25 of 100

26. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 26 of 100

27. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 27 of 100

28. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 28 of 100

29. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 29 of 100

30. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 30 of 100

31. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 31 of 100

32. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 32 of 100

33. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 33 of 100

34. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 34 of 100

35. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 35 of 100

36. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 36 of 100

37. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 37 of 100

38. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 38 of 100

39. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 39 of 100

40. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 40 of 100

41. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 41 of 100

42. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 42 of 100

43. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 43 of 100

44. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 44 of 100

45. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 45 of 100

46. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 46 of 100

47. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 47 of 100

48. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 48 of 100

49. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 49 of 100

50. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 50 of 100

51. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 51 of 100

52. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 52 of 100

53. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 53 of 100

54. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 54 of 100

55. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 55 of 100

56. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 56 of 100

57. A quota target can be applied to  __________.
 
 
 
 

Question 57 of 100

58. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 58 of 100

59. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 59 of 100

60. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 60 of 100

61. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 61 of 100

62. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 62 of 100

63. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 63 of 100

64. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 64 of 100

65. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 65 of 100

66. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 66 of 100

67. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 67 of 100

68. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 68 of 100

69. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 69 of 100

70. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 70 of 100

71. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 71 of 100

72. Match the NetApp commands to their uses.
Displays disk information
Displays iscsi service running status
Reboot the storage array
Displays licenses
disk show
stats show iscsi
reboot
license

Question 72 of 100

73. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 73 of 100

74. Match the NetApp commands to their uses.
Displays iscsi service running status
Reboot the storage array
Displays disk information
Displays licenses
disk show
stats show iscsi
reboot
license

Question 74 of 100

75. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 75 of 100

76. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 76 of 100

77. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 77 of 100

78. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 78 of 100

79. cifs setup command is which of the following?
 
 
 
 

Question 79 of 100

80. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 80 of 100

81. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 81 of 100

82. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 82 of 100

83. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 83 of 100

84. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 84 of 100

85. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 85 of 100

86. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 86 of 100

87. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 87 of 100

88. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 88 of 100

89. Match the configuration files or directories to their uses.
Contains password information
Log files directory location
Quota information file
/etc/passwd
/etc/log/
/etc/quotas

Question 89 of 100

90. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 90 of 100

91. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 91 of 100

92. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 92 of 100

93. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 93 of 100

94. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 94 of 100

95. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 95 of 100

96. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 96 of 100

97. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 97 of 100

98. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 98 of 100

99. What is the purpose of RAID?
 
 
 
 

Question 99 of 100

100. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 100 of 100

Loading... Loading…

 

About Us

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

Most Popular

Cisco ICND1 Wireshark WCNA NetApp NCSA CompTIA Network+ VMware VCA-DCV Microsoft MTA OS Fundamentals

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Free IT Webinar Training

Secure Site

website security

Copyright 2016 Reality Press Ltd . / Paul Browning