NetApp – NCSA Exam Back to Exams Page. 1. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 1 of 100 2. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 2 of 100 3. Identify the set of protocols that provide block-level access to NetApp storage. CIFS and NFS iSCSI and FCP HTTP and FTP SNA and RPCQuestion 3 of 100 4. Identify the commands used to enable LUN reservations (Choose two). iscsi -r fcp -r lun set reservation lun createQuestion 4 of 100 5. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 5 of 100 6. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocks A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-only A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volumeQuestion 6 of 100 7. What are the Data ONTAP commands for gathering performance information? (Choose two) nfsstat sio_ntap_soll perfstat sysstatQuestion 7 of 100 8. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . target, initiator primary, secondary initiator, target secondary, primaryQuestion 8 of 100 9. While moving a volume, which of the following statements are true? (Choose two) All writes from an NFS client to the volume continue The volume’s position in the namespace is unaffected The Snapshot copies of the volume are orphaned and then deleted All NAS protocol writes to the volume are interruptedQuestion 9 of 100 10. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all volumes to mixed It will change the security style of all qtrees to mixed It will set the default security style for all newly created volumes It will set the security style of all files to mixedQuestion 10 of 100 11. What is the purpose of RAID? RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity disk RAID groups disks in a single enclosure RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault tolerance RAID is a scheme that divides and replicates data among multiple physical disk drivesQuestion 11 of 100 12. Identify the NFS resources items for export (Choose three). directory/qtree subnet volume aggregate fileQuestion 12 of 100 13. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 13 of 100 14. Identify the three characteristics of NetApp NAS systems (Choose three). NAS systems support CIFS, NFS, or a combination of both (multiprotocol) NAS data is accessed at the file level NAS systems provide flexible provisioning, reliable backups, and archiving NAS systems support FC, FCOE, or iSCSI protocolsQuestion 14 of 100 15. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? System Configuration Guide AutoSupport Ethereal Bugs Online/Release ComparisonQuestion 15 of 100 16. Identify the true statements about aggregates (Choose two). Aggregates must be limited to a single RAID group Aggregates cannot be reduced in size Aggregates may contain multiple RAID groups Aggregates can have RAID groups removedQuestion 16 of 100 17. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? sysstat pktt netdiag netstatQuestion 17 of 100 18. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 9 disks 7 disks 3 disks 5 disksQuestion 18 of 100 19. Identify the valid commands that can be used with LUNs. lun move lun copy lun offline lun rename lun cloneQuestion 19 of 100 20. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) iSCSl FCIP CIFS NFSQuestion 20 of 100 21. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 21 of 100 22. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 22 of 100 23. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? netstat sysstat netdiag pkttQuestion 23 of 100 24. What are different methods used to create LUN? (Choose three) lun map FilerView lun setup lun createQuestion 24 of 100 25. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recentQuestion 25 of 100 26. What are the Data ONTAP commands for gathering performance information? (Choose two) perfstat sysstat sio_ntap_soll nfsstatQuestion 26 of 100 27. A quota target can be applied to __________. a directory or a qtree an aggregate a user group or qtree a specific disk space thresholdQuestion 27 of 100 28. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -a exportfs -u exportfs -i exportfs -vQuestion 28 of 100 29. Which command will enable ‘symlink_strict_security’? options cifs.symlink_strict_security on options symlink_strict_security=on cifs shares -change -symlink_strict_security options symlink_strict_security=trueQuestion 29 of 100 30. The iSCSI security method that encrypts data between the initiator and the target is _______. LUN masking Header and Data Digests CHAP IPSecQuestion 30 of 100 31. Match the configuration files or directories to their uses.Quota information fileContains password informationLog files directory location/etc/passwd /etc/log/ /etc/quotas Question 31 of 100 32. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) The disk is write-protected Snap reserve is set to 10% The user has reached his or her assigned quota A volumes active file system size could not be providedQuestion 32 of 100 33. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) FCIP CIFS iSCSl NFSQuestion 33 of 100 34. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of physical hard disks It is a collection of LUNs It is a collection of devices It is a collection of logical hard disksQuestion 34 of 100 35. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 35 of 100 36. While moving a volume, which of the following statements are true? (Choose two) The Snapshot copies of the volume are orphaned and then deleted All NAS protocol writes to the volume are interrupted The volume’s position in the namespace is unaffected All writes from an NFS client to the volume continueQuestion 36 of 100 37. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 37 of 100 38. What are three advantages of NAS? (Choose three) It provides a high-speed, shared network between clients and storage servers Clients running different operating systems can share the same files It can be expensive to install, deploy, and manage The file services can be extended to hundreds of devices It provides a high-speed, dedicated network between chants and storage serversQuestion 38 of 100 39. Which command will enable ‘symlink_strict_security’? options cifs.symlink_strict_security on cifs shares -change -symlink_strict_security options symlink_strict_security=true options symlink_strict_security=onQuestion 39 of 100 40. Which command will show the FCP target(s) on a storage system? fcp show adapter lun stats fcp show all lun show -vQuestion 40 of 100 41. What will be the result if a soft quota is exceeded? A spare disk will be added to the volume An autosupport message will be logged All write operations will fail An SNMP warning message will be generatedQuestion 41 of 100 42. Identify the commands used to enable LUN reservations (Choose two). lun create lun set reservation fcp -r iscsi -rQuestion 42 of 100 43. The command that allows you to set the permissions for a share called marketing is _____. cifs share -add marketing /vol/marketing cifs shares -permissions marketing /vol/marketing cifs access marketing /vol/marketing cifs permissions -change marketing /vol/marketingQuestion 43 of 100 44. The command that allows you to set the permissions for a share called marketing is _____. cifs access marketing /vol/marketing cifs share -add marketing /vol/marketing cifs shares -permissions marketing /vol/marketing cifs permissions -change marketing /vol/marketingQuestion 44 of 100 45. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recentQuestion 45 of 100 46. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The entry related to the user The last entry for the qtree The first entry for the qtree The entry related to the groupQuestion 46 of 100 47. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) file quotas group quotas user quotas tree quotas root quotasQuestion 47 of 100 48. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -i exportfs -a exportfs -u exportfs -vQuestion 48 of 100 49. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 49 of 100 50. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the disk Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptions Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAMQuestion 50 of 100 51. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) A volumes active file system size could not be provided Snap reserve is set to 10% The user has reached his or her assigned quota The disk is write-protectedQuestion 51 of 100 52. Identify the set of protocols that provide block-level access to NetApp storage. iSCSI and FCP SNA and RPC CIFS and NFS HTTP and FTPQuestion 52 of 100 53. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN cloning LUN masking LUN hiding LUN groupingQuestion 53 of 100 54. What are three advantages of NAS? (Choose three) Clients running different operating systems can share the same files It provides a high-speed, dedicated network between chants and storage servers The file services can be extended to hundreds of devices It can be expensive to install, deploy, and manage It provides a high-speed, shared network between clients and storage serversQuestion 54 of 100 55. Match the configuration files or directories to their uses.Contains password informationLog files directory locationQuota information file/etc/passwd /etc/log/ /etc/quotas Question 55 of 100 56. cifs setup command is which of the following? It displays the names of all mounted directories on the storage system It displays a list of the users on the storage system It displays the mount point of all shared directories It displays prompts from a script for configuring CIFS on a storage systemQuestion 56 of 100 57. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create any number of volumes Create volumes that can increase or decrease in size Create volumes that can be used with NAS or SAN data Create online backupsQuestion 57 of 100 58. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. in the same spare pool in the same file system in the same RAID group currently being accessedQuestion 58 of 100 59. Identify the true statements about aggregates (Choose two). Aggregates must be limited to a single RAID group Aggregates cannot be reduced in size Aggregates can have RAID groups removed Aggregates may contain multiple RAID groupsQuestion 59 of 100 60. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add /vol/vol2/home/netapp cifs shares -add netapp /vol/vol2/home None of the above cifs shares -add netapp /vol/vol2Question 60 of 100 61. Identify the valid commands that can be used with LUNs. lun offline lun move lun copy lun clone lun renameQuestion 61 of 100 62. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. in the same RAID group in the same spare pool in the same file system currently being accessedQuestion 62 of 100 63. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN hiding LUN grouping LUN cloning LUN maskingQuestion 63 of 100 64. What purpose does the /etc/nsswitch.conf file serve? It determines the order of authentication It authenticates the users It exports a resource persistently It maps a hostname to its IP addressQuestion 64 of 100 65. The functions of multipathing software are which of the following? (Choose two) Load balancing Path health monitoring RAID reconstruction after a failure Mirroring Port IO Monitoring fiber optical signal qualityQuestion 65 of 100 66. Which command will show the FCP target(s) on a storage system? fcp show all fcp show adapter lun stats lun show -vQuestion 66 of 100 67. What will be the result if a soft quota is exceeded? A spare disk will be added to the volume An autosupport message will be logged An SNMP warning message will be generated All write operations will failQuestion 67 of 100 68. File locking for a CIFS client is . advisory mandatory ordered optional Question 68 of 100 69. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-only A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocks A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volumeQuestion 69 of 100 70. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of devices It is a collection of physical hard disks It is a collection of LUNs It is a collection of logical hard disksQuestion 70 of 100 71. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 71 of 100 72. The functions of multipathing software are which of the following? (Choose two) Load balancing Path health monitoring RAID reconstruction after a failure Monitoring fiber optical signal quality Mirroring Port IOQuestion 72 of 100 73. Which two statements about hard and soft zoning are correct? (Choose two) Hard zones allow physical movement of cables to different ports on the switch. Soft zones separate devices at the name service level. Soft zones physically restrict access to only members of that zone. Hard zoning physically restricts access to only members of that zone.Question 73 of 100 74. What purpose does the /etc/nsswitch.conf file serve? It exports a resource persistently It maps a hostname to its IP address It determines the order of authentication It authenticates the usersQuestion 74 of 100 75. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 75 of 100 76. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 76 of 100 77. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) user quotas tree quotas file quotas group quotas root quotasQuestion 77 of 100 78. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The entry related to the group The first entry for the qtree The entry related to the user The last entry for the qtreeQuestion 78 of 100 79. Match the NetApp commands to their uses.Reboot the storage arrayDisplays disk informationDisplays licensesDisplays iscsi service running statusdisk show stats show iscsi reboot license Question 79 of 100 80. Match the NetApp commands to their uses.Displays licensesReboot the storage arrayDisplays iscsi service running statusDisplays disk informationdisk show stats show iscsi reboot license Question 80 of 100 81. Which two statements about hard and soft zoning are correct? (Choose two) Soft zones separate devices at the name service level. Hard zones allow physical movement of cables to different ports on the switch. Soft zones physically restrict access to only members of that zone. Hard zoning physically restricts access to only members of that zone.Question 81 of 100 82. cifs setup command is which of the following? It displays prompts from a script for configuring CIFS on a storage system It displays the names of all mounted directories on the storage system It displays the mount point of all shared directories It displays a list of the users on the storage systemQuestion 82 of 100 83. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptions Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the disk Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAMQuestion 83 of 100 84. File locking for a CIFS client is . advisory mandatory ordered optional Question 84 of 100 85. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all volumes to mixed It will change the security style of all qtrees to mixed It will set the security style of all files to mixed It will set the default security style for all newly created volumesQuestion 85 of 100 86. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 7 disks 5 disks 9 disks 3 disksQuestion 86 of 100 87. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . initiator, target secondary, primary target, initiator primary, secondaryQuestion 87 of 100 88. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 88 of 100 89. Identify the NFS resources items for export (Choose three). volume aggregate subnet directory/qtree fileQuestion 89 of 100 90. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? System Configuration Guide Bugs Online/Release Comparison AutoSupport EtherealQuestion 90 of 100 91. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 91 of 100 92. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 92 of 100 93. The iSCSI security method that encrypts data between the initiator and the target is _______. CHAP IPSec LUN masking Header and Data DigestsQuestion 93 of 100 94. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create volumes that can be used with NAS or SAN data Create volumes that can increase or decrease in size Create any number of volumes Create online backupsQuestion 94 of 100 95. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 95 of 100 96. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add netapp /vol/vol2/home cifs shares -add netapp /vol/vol2 None of the above cifs shares -add /vol/vol2/home/netappQuestion 96 of 100 97. A quota target can be applied to __________. an aggregate a user group or qtree a directory or a qtree a specific disk space thresholdQuestion 97 of 100 98. Identify the three characteristics of NetApp NAS systems (Choose three). NAS systems support FC, FCOE, or iSCSI protocols NAS systems support CIFS, NFS, or a combination of both (multiprotocol) NAS systems provide flexible provisioning, reliable backups, and archiving NAS data is accessed at the file levelQuestion 98 of 100 99. What are different methods used to create LUN? (Choose three) lun map lun setup lun create FilerViewQuestion 99 of 100 100. What is the purpose of RAID? RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault tolerance RAID groups disks in a single enclosure RAID is a scheme that divides and replicates data among multiple physical disk drives RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity diskQuestion 100 of 100 Loading…