NetApp – NCSA Exam Back to Exams Page. 1. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 1 of 100 2. Match the configuration files or directories to their uses.Log files directory locationContains password informationQuota information file/etc/passwd /etc/log/ /etc/quotas Question 2 of 100 3. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 3 of 100 4. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 4 of 100 5. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recentQuestion 5 of 100 6. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? Bugs Online/Release Comparison System Configuration Guide Ethereal AutoSupportQuestion 6 of 100 7. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 7 of 100 8. The command that allows you to set the permissions for a share called marketing is _____. cifs shares -permissions marketing /vol/marketing cifs permissions -change marketing /vol/marketing cifs access marketing /vol/marketing cifs share -add marketing /vol/marketingQuestion 8 of 100 9. A quota target can be applied to __________. a specific disk space threshold an aggregate a directory or a qtree a user group or qtreeQuestion 9 of 100 10. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 10 of 100 11. What purpose does the /etc/nsswitch.conf file serve? It exports a resource persistently It determines the order of authentication It maps a hostname to its IP address It authenticates the usersQuestion 11 of 100 12. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create any number of volumes Create volumes that can increase or decrease in size Create online backups Create volumes that can be used with NAS or SAN dataQuestion 12 of 100 13. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -a exportfs -v exportfs -i exportfs -uQuestion 13 of 100 14. Which command will enable ‘symlink_strict_security’? cifs shares -change -symlink_strict_security options symlink_strict_security=true options cifs.symlink_strict_security on options symlink_strict_security=onQuestion 14 of 100 15. The iSCSI security method that encrypts data between the initiator and the target is _______. Header and Data Digests LUN masking CHAP IPSecQuestion 15 of 100 16. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? sysstat netstat netdiag pkttQuestion 16 of 100 17. cifs setup command is which of the following? It displays prompts from a script for configuring CIFS on a storage system It displays the names of all mounted directories on the storage system It displays the mount point of all shared directories It displays a list of the users on the storage systemQuestion 17 of 100 18. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of logical hard disks It is a collection of physical hard disks It is a collection of LUNs It is a collection of devicesQuestion 18 of 100 19. What is the purpose of RAID? RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity disk RAID is a scheme that divides and replicates data among multiple physical disk drives RAID groups disks in a single enclosure RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault toleranceQuestion 19 of 100 20. Identify the valid commands that can be used with LUNs. lun move lun rename lun clone lun offline lun copyQuestion 20 of 100 21. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 7 disks 9 disks 5 disks 3 disksQuestion 21 of 100 22. What are the Data ONTAP commands for gathering performance information? (Choose two) perfstat nfsstat sio_ntap_soll sysstatQuestion 22 of 100 23. Which command will enable ‘symlink_strict_security’? options cifs.symlink_strict_security on options symlink_strict_security=on cifs shares -change -symlink_strict_security options symlink_strict_security=trueQuestion 23 of 100 24. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all qtrees to mixed It will set the security style of all files to mixed It will change the security style of all volumes to mixed It will set the default security style for all newly created volumesQuestion 24 of 100 25. Identify the three characteristics of NetApp NAS systems (Choose three). NAS systems support FC, FCOE, or iSCSI protocols NAS systems provide flexible provisioning, reliable backups, and archiving NAS data is accessed at the file level NAS systems support CIFS, NFS, or a combination of both (multiprotocol)Question 25 of 100 26. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) Snap reserve is set to 10% The disk is write-protected A volumes active file system size could not be provided The user has reached his or her assigned quotaQuestion 26 of 100 27. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) CIFS NFS iSCSl FCIPQuestion 27 of 100 28. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add /vol/vol2/home/netapp None of the above cifs shares -add netapp /vol/vol2/home cifs shares -add netapp /vol/vol2Question 28 of 100 29. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. in the same file system currently being accessed in the same spare pool in the same RAID groupQuestion 29 of 100 30. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of devices It is a collection of LUNs It is a collection of logical hard disks It is a collection of physical hard disksQuestion 30 of 100 31. While moving a volume, which of the following statements are true? (Choose two) All NAS protocol writes to the volume are interrupted All writes from an NFS client to the volume continue The volume’s position in the namespace is unaffected The Snapshot copies of the volume are orphaned and then deletedQuestion 31 of 100 32. What are different methods used to create LUN? (Choose three) lun create lun map lun setup FilerViewQuestion 32 of 100 33. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volume A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-only A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocksQuestion 33 of 100 34. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) iSCSl FCIP CIFS NFSQuestion 34 of 100 35. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 35 of 100 36. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 36 of 100 37. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recentQuestion 37 of 100 38. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . primary, secondary secondary, primary target, initiator initiator, targetQuestion 38 of 100 39. Identify the valid commands that can be used with LUNs. lun copy lun rename lun move lun offline lun cloneQuestion 39 of 100 40. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 40 of 100 41. Identify the commands used to enable LUN reservations (Choose two). iscsi -r fcp -r lun set reservation lun createQuestion 41 of 100 42. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) tree quotas file quotas group quotas user quotas root quotasQuestion 42 of 100 43. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 43 of 100 44. The functions of multipathing software are which of the following? (Choose two) Path health monitoring Load balancing Monitoring fiber optical signal quality Mirroring Port IO RAID reconstruction after a failureQuestion 44 of 100 45. File locking for a CIFS client is . advisory mandatory ordered optional Question 45 of 100 46. What will be the result if a soft quota is exceeded? An autosupport message will be logged An SNMP warning message will be generated A spare disk will be added to the volume All write operations will failQuestion 46 of 100 47. Which command will show the FCP target(s) on a storage system? lun stats fcp show adapter fcp show all lun show -vQuestion 47 of 100 48. While moving a volume, which of the following statements are true? (Choose two) All writes from an NFS client to the volume continue All NAS protocol writes to the volume are interrupted The Snapshot copies of the volume are orphaned and then deleted The volume’s position in the namespace is unaffectedQuestion 48 of 100 49. What are three advantages of NAS? (Choose three) It can be expensive to install, deploy, and manage It provides a high-speed, shared network between clients and storage servers It provides a high-speed, dedicated network between chants and storage servers The file services can be extended to hundreds of devices Clients running different operating systems can share the same filesQuestion 49 of 100 50. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 5 disks 7 disks 3 disks 9 disksQuestion 50 of 100 51. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) The user has reached his or her assigned quota Snap reserve is set to 10% A volumes active file system size could not be provided The disk is write-protectedQuestion 51 of 100 52. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The first entry for the qtree The entry related to the user The entry related to the group The last entry for the qtreeQuestion 52 of 100 53. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -v exportfs -u exportfs -a exportfs -iQuestion 53 of 100 54. Which two statements about hard and soft zoning are correct? (Choose two) Hard zoning physically restricts access to only members of that zone. Hard zones allow physical movement of cables to different ports on the switch. Soft zones separate devices at the name service level. Soft zones physically restrict access to only members of that zone.Question 54 of 100 55. What purpose does the /etc/nsswitch.conf file serve? It determines the order of authentication It exports a resource persistently It maps a hostname to its IP address It authenticates the usersQuestion 55 of 100 56. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 56 of 100 57. A quota target can be applied to __________. a specific disk space threshold an aggregate a directory or a qtree a user group or qtreeQuestion 57 of 100 58. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volume A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-only A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocksQuestion 58 of 100 59. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add netapp /vol/vol2/home cifs shares -add netapp /vol/vol2 None of the above cifs shares -add /vol/vol2/home/netappQuestion 59 of 100 60. What will be the result if a soft quota is exceeded? An autosupport message will be logged An SNMP warning message will be generated All write operations will fail A spare disk will be added to the volumeQuestion 60 of 100 61. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 61 of 100 62. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? sysstat netdiag netstat pkttQuestion 62 of 100 63. Identify the true statements about aggregates (Choose two). Aggregates can have RAID groups removed Aggregates may contain multiple RAID groups Aggregates must be limited to a single RAID group Aggregates cannot be reduced in sizeQuestion 63 of 100 64. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 64 of 100 65. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create online backups Create any number of volumes Create volumes that can increase or decrease in size Create volumes that can be used with NAS or SAN dataQuestion 65 of 100 66. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The entry related to the user The entry related to the group The last entry for the qtree The first entry for the qtreeQuestion 66 of 100 67. Which command will show the FCP target(s) on a storage system? lun show -v lun stats fcp show all fcp show adapterQuestion 67 of 100 68. Which two statements about hard and soft zoning are correct? (Choose two) Soft zones separate devices at the name service level. Soft zones physically restrict access to only members of that zone. Hard zones allow physical movement of cables to different ports on the switch. Hard zoning physically restricts access to only members of that zone.Question 68 of 100 69. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . target, initiator secondary, primary initiator, target primary, secondaryQuestion 69 of 100 70. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the disk Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAM Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptionsQuestion 70 of 100 71. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) root quotas group quotas user quotas tree quotas file quotasQuestion 71 of 100 72. Match the NetApp commands to their uses.Displays disk informationDisplays iscsi service running statusReboot the storage arrayDisplays licensesdisk show stats show iscsi reboot license Question 72 of 100 73. The iSCSI security method that encrypts data between the initiator and the target is _______. Header and Data Digests IPSec CHAP LUN maskingQuestion 73 of 100 74. Match the NetApp commands to their uses.Displays iscsi service running statusReboot the storage arrayDisplays disk informationDisplays licensesdisk show stats show iscsi reboot license Question 74 of 100 75. What are three advantages of NAS? (Choose three) It can be expensive to install, deploy, and manage It provides a high-speed, dedicated network between chants and storage servers It provides a high-speed, shared network between clients and storage servers Clients running different operating systems can share the same files The file services can be extended to hundreds of devicesQuestion 75 of 100 76. Identify the NFS resources items for export (Choose three). aggregate volume file subnet directory/qtreeQuestion 76 of 100 77. File locking for a CIFS client is . advisory mandatory ordered optional Question 77 of 100 78. What are different methods used to create LUN? (Choose three) FilerView lun map lun create lun setupQuestion 78 of 100 79. cifs setup command is which of the following? It displays a list of the users on the storage system It displays the names of all mounted directories on the storage system It displays the mount point of all shared directories It displays prompts from a script for configuring CIFS on a storage systemQuestion 79 of 100 80. The command that allows you to set the permissions for a share called marketing is _____. cifs permissions -change marketing /vol/marketing cifs share -add marketing /vol/marketing cifs shares -permissions marketing /vol/marketing cifs access marketing /vol/marketingQuestion 80 of 100 81. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. in the same spare pool in the same RAID group in the same file system currently being accessedQuestion 81 of 100 82. What are the Data ONTAP commands for gathering performance information? (Choose two) sio_ntap_soll sysstat perfstat nfsstatQuestion 82 of 100 83. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 83 of 100 84. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAM Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptions Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the diskQuestion 84 of 100 85. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN cloning LUN hiding LUN masking LUN groupingQuestion 85 of 100 86. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN masking LUN grouping LUN cloning LUN hidingQuestion 86 of 100 87. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 87 of 100 88. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 88 of 100 89. Match the configuration files or directories to their uses.Contains password informationLog files directory locationQuota information file/etc/passwd /etc/log/ /etc/quotas Question 89 of 100 90. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? Bugs Online/Release Comparison AutoSupport System Configuration Guide EtherealQuestion 90 of 100 91. Identify the set of protocols that provide block-level access to NetApp storage. CIFS and NFS HTTP and FTP iSCSI and FCP SNA and RPCQuestion 91 of 100 92. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all qtrees to mixed It will set the default security style for all newly created volumes It will set the security style of all files to mixed It will change the security style of all volumes to mixedQuestion 92 of 100 93. Identify the three characteristics of NetApp NAS systems (Choose three). NAS systems provide flexible provisioning, reliable backups, and archiving NAS systems support FC, FCOE, or iSCSI protocols NAS systems support CIFS, NFS, or a combination of both (multiprotocol) NAS data is accessed at the file levelQuestion 93 of 100 94. Identify the set of protocols that provide block-level access to NetApp storage. HTTP and FTP CIFS and NFS SNA and RPC iSCSI and FCPQuestion 94 of 100 95. Identify the commands used to enable LUN reservations (Choose two). iscsi -r lun create fcp -r lun set reservationQuestion 95 of 100 96. Identify the NFS resources items for export (Choose three). file subnet volume directory/qtree aggregateQuestion 96 of 100 97. Identify the true statements about aggregates (Choose two). Aggregates can have RAID groups removed Aggregates may contain multiple RAID groups Aggregates must be limited to a single RAID group Aggregates cannot be reduced in sizeQuestion 97 of 100 98. The functions of multipathing software are which of the following? (Choose two) Path health monitoring Monitoring fiber optical signal quality Mirroring Port IO Load balancing RAID reconstruction after a failureQuestion 98 of 100 99. What is the purpose of RAID? RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault tolerance RAID groups disks in a single enclosure RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity disk RAID is a scheme that divides and replicates data among multiple physical disk drivesQuestion 99 of 100 100. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 100 of 100 Loading…