CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
  • Home
  • New Courses
        • Cisco
          • Cisco CCNA Primer
          • Cisco CCNA
  • Courses
        • Amazon
          • AWS Certified Solutions Architect – Associate
          • Amazon AWS SysOps – Associate
        • Career
        • Cisco
        • NetApp
        • CompTIA
        • ITIL
        • Juniper
        • Custom menu
          • custom menu 1
          • custom menu 2
          • Custom menu 3
          • custom menu 4
        • Linux
        • Microsoft
          • Security Fundamentals
          • Windows OS
          • Windows Server
          • Microsoft MCSA – Windows Server 2012
          • Microsoft MTA – Database Administration Fundamentals
          • Microsoft MCSA – Administering Windows Server 2012
          • Microsoft MCSA Configuring Advanced Windows Server 2012 Services
        • TCP-IP
        • Wireshark
        • VMware
        • Web Development
  • Racks
    • vRack
    • Live Cisco Racks
  • Tour
  • Join
  • Join
  • Free Training
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • Books
    • Audiobooks
  • Login
  • Members
    • Account
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses

NetApp – NCSA Exam

Back to Exams Page.

1. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 1 of 100

2. What is the purpose of RAID?
 
 
 
 

Question 2 of 100

3. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 3 of 100

4. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 4 of 100

5. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 5 of 100

6. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 6 of 100

7. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 7 of 100

8. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 8 of 100

9. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 9 of 100

10. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 10 of 100

11. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 11 of 100

12. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 12 of 100

13. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 13 of 100

14. What will be the result if a soft quota is exceeded?
 
 
 
 

Question 14 of 100

15. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 15 of 100

16. Match the configuration files or directories to their uses.
Log files directory location
Contains password information
Quota information file
/etc/passwd
/etc/log/
/etc/quotas

Question 16 of 100

17. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 17 of 100

18. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 18 of 100

19. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 19 of 100

20. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 20 of 100

21. A quota target can be applied to  __________.
 
 
 
 

Question 21 of 100

22. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 22 of 100

23. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 23 of 100

24. Match the configuration files or directories to their uses.
Contains password information
Log files directory location
Quota information file
/etc/passwd
/etc/log/
/etc/quotas

Question 24 of 100

25. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 25 of 100

26. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 26 of 100

27. While moving a volume, which of the following statements are true? (Choose two)
 
 
 
 

Question 27 of 100

28. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 28 of 100

29. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 29 of 100

30. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 30 of 100

31. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 31 of 100

32. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp?
 
 
 
 

Question 32 of 100

33. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 33 of 100

34. is the data-protection product that can restore an entire volume in a fraction of a second.

  1. SnapVault
  2. SnapMirror
  3. Snapshot
  4. SnapRestore
  5. SnapManager

Question 34 of 100

35. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group?
 
 
 
 

Question 35 of 100

36. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 36 of 100

37. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two)
 
 
 
 

Question 37 of 100

38. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 38 of 100

39. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two)
 
 
 
 
 

Question 39 of 100

40. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 40 of 100

41. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target?
 
 
 
 

Question 41 of 100

42. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 42 of 100

43. A quota target can be applied to  __________.
 
 
 
 

Question 43 of 100

44. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 44 of 100

45. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 45 of 100

46. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 46 of 100

47. Identify the commands used to enable LUN reservations (Choose two).
 
 
 
 

Question 47 of 100

48. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ .
 
 
 
 

Question 48 of 100

49. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 49 of 100

50. An iSCSI or FC SAN implementation provides type access to LUNs.

  1. File
  2. Block
  3. Object
  4. Virtual local disk (VLD)

Question 50 of 100

51. Match the NetApp commands to their uses.
Reboot the storage array
Displays iscsi service running status
Displays licenses
Displays disk information
disk show
stats show iscsi
reboot
license

Question 51 of 100

52. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this?
 
 
 
 

Question 52 of 100

53. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 53 of 100

54. File locking for a CIFS client is .

  1. advisory
  2. mandatory
  3. ordered
  4. optional

Question 54 of 100

55. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 55 of 100

56. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________.
 
 
 
 

Question 56 of 100

57. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 57 of 100

58. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 58 of 100

59. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 59 of 100

60. The command used to set the configuration of an Ethernet network interface is .

  1. ifstat
  2. sysconfig – v
  3. ifconfig
  4. netstat – i

Question 60 of 100

61. What purpose does the /etc/nsswitch.conf file serve?
 
 
 
 

Question 61 of 100

62. The iSCSI security method that encrypts data between the initiator and the target is _______.
 
 
 
 

Question 62 of 100

63. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________.
 
 
 
 

Question 63 of 100

64. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is .

  1. Duplication
  2. Data compression
  3. Thin provisioning
  4. RAID-DP

Question 64 of 100

65. What are different methods used to create LUN? (Choose three)
 
 
 
 

Question 65 of 100

66. Identify the valid commands that can be used with LUNs.
 
 
 
 
 

Question 66 of 100

67. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 67 of 100

68. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 68 of 100

69. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 69 of 100

70. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 70 of 100

71. Identify the three characteristics of NetApp NAS systems (Choose three).
 
 
 
 

Question 71 of 100

72. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 72 of 100

73. type storage is provided by an iSCSI or FC SAN.

  1. file
  2. block
  3. VLD
  4. VIIP

Question 73 of 100

74. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 74 of 100

75. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that?
 
 
 
 

Question 75 of 100

76. is the data-protection product designed for disaster recovery.

  1. SnapManager
  2. SnapRestore
  3. Snapshot
  4. SnapMirror
  5. SnapVault

Question 76 of 100

77. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system?
 
 
 
 

Question 77 of 100

78. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________.
 
 
 
 

Question 78 of 100

79. What is the purpose of RAID?
 
 
 
 

Question 79 of 100

80. Which command will enable ‘symlink_strict_security’?
 
 
 
 

Question 80 of 100

81. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two)
 
 
 
 

Question 81 of 100

82. The functions of multipathing software are which of the following? (Choose two)
 
 
 
 
 

Question 82 of 100

83. The command that allows you to set the permissions for a share called marketing is _____.
 
 
 
 

Question 83 of 100

84. The command that verifies the iSCSI service is running is .

  1. license add iSCSI
  2. iscsi service
  3. iscsi status
  4. iscsi protocol

Question 84 of 100

85. Identify the set of protocols that provide block-level access to NetApp storage.
 
 
 
 

Question 85 of 100

86. Match the NetApp commands to their uses.
Reboot the storage array
Displays disk information
Displays licenses
Displays iscsi service running status
disk show
stats show iscsi
reboot
license

Question 86 of 100

87. cifs setup command is which of the following?
 
 
 
 

Question 87 of 100

88. Identify the differences between FlexClone volume and snapshot.
 
 
 
 

Question 88 of 100

89. What are the Data ONTAP commands for gathering performance information? (Choose two)
 
 
 
 

Question 89 of 100

90. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage?

 

Aggregate 
 
 
 
 

Question 90 of 100

91. What are the consequences of running the command “options wafl.default_security_style mixed“?
 
 
 
 

Question 91 of 100

92. Which command will show the FCP target(s) on a storage system?
 
 
 
 

Question 92 of 100

93. Identify the true statements about aggregates (Choose two).
 
 
 
 

Question 93 of 100

94. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two)
 
 
 
 

Question 94 of 100

95. What are three advantages of NAS? (Choose three)
 
 
 
 
 

Question 95 of 100

96. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file?
 
 
 
 

Question 96 of 100

97. Identify the NFS resources items for export (Choose three).
 
 
 
 
 

Question 97 of 100

98. cifs setup command is which of the following?
 
 
 
 

Question 98 of 100

99. Which two statements about hard and soft zoning are correct? (Choose two)

 
 
 
 
 

Question 99 of 100

100. The technology that natively enables block-level access by a host to disk storage via a standard LAN is .

  1. iSCSI
  2. FC
  3. CIFS
  4. NFS

Question 100 of 100

Loading... Loading…

 

About Us

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

Most Popular

Cisco ICND1 Wireshark WCNA NetApp NCSA CompTIA Network+ VMware VCA-DCV Microsoft MTA OS Fundamentals

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Free IT Webinar Training

Secure Site

website security

Copyright 2016 Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.