NetApp – NCSA Exam Back to Exams Page. 1. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) The disk is write-protected Snap reserve is set to 10% The user has reached his or her assigned quota A volumes active file system size could not be providedQuestion 1 of 100 2. What is the purpose of RAID? RAID groups disks in a single enclosure RAID is a scheme that divides and replicates data among multiple physical disk drives RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault tolerance RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity diskQuestion 2 of 100 3. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? Bugs Online/Release Comparison System Configuration Guide Ethereal AutoSupportQuestion 3 of 100 4. What will be the result if a soft quota is exceeded? A spare disk will be added to the volume An autosupport message will be logged An SNMP warning message will be generated All write operations will failQuestion 4 of 100 5. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 5 of 100 6. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create any number of volumes Create online backups Create volumes that can be used with NAS or SAN data Create volumes that can increase or decrease in sizeQuestion 6 of 100 7. The functions of multipathing software are which of the following? (Choose two) Path health monitoring RAID reconstruction after a failure Monitoring fiber optical signal quality Load balancing Mirroring Port IOQuestion 7 of 100 8. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 8 of 100 9. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? pktt netdiag sysstat netstatQuestion 9 of 100 10. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) NFS iSCSl FCIP CIFSQuestion 10 of 100 11. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -a exportfs -v exportfs -i exportfs -uQuestion 11 of 100 12. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. currently being accessed in the same RAID group in the same file system in the same spare poolQuestion 12 of 100 13. Identify the set of protocols that provide block-level access to NetApp storage. HTTP and FTP SNA and RPC CIFS and NFS iSCSI and FCPQuestion 13 of 100 14. What will be the result if a soft quota is exceeded? All write operations will fail An autosupport message will be logged A spare disk will be added to the volume An SNMP warning message will be generatedQuestion 14 of 100 15. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptions Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAM Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the diskQuestion 15 of 100 16. Match the configuration files or directories to their uses.Log files directory locationContains password informationQuota information file/etc/passwd /etc/log/ /etc/quotas Question 16 of 100 17. Identify the true statements about aggregates (Choose two). Aggregates can have RAID groups removed Aggregates may contain multiple RAID groups Aggregates cannot be reduced in size Aggregates must be limited to a single RAID groupQuestion 17 of 100 18. While moving a volume, which of the following statements are true? (Choose two) The volume’s position in the namespace is unaffected The Snapshot copies of the volume are orphaned and then deleted All writes from an NFS client to the volume continue All NAS protocol writes to the volume are interruptedQuestion 18 of 100 19. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 9 disks 3 disks 7 disks 5 disksQuestion 19 of 100 20. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recentQuestion 20 of 100 21. A quota target can be applied to __________. a user group or qtree an aggregate a directory or a qtree a specific disk space thresholdQuestion 21 of 100 22. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 22 of 100 23. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add netapp /vol/vol2/home cifs shares -add netapp /vol/vol2 cifs shares -add /vol/vol2/home/netapp None of the aboveQuestion 23 of 100 24. Match the configuration files or directories to their uses.Contains password informationLog files directory locationQuota information file/etc/passwd /etc/log/ /etc/quotas Question 24 of 100 25. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN grouping LUN cloning LUN hiding LUN maskingQuestion 25 of 100 26. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . initiator, target target, initiator secondary, primary primary, secondaryQuestion 26 of 100 27. While moving a volume, which of the following statements are true? (Choose two) All writes from an NFS client to the volume continue The Snapshot copies of the volume are orphaned and then deleted All NAS protocol writes to the volume are interrupted The volume’s position in the namespace is unaffectedQuestion 27 of 100 28. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) file quotas tree quotas group quotas user quotas root quotasQuestion 28 of 100 29. Identify the three characteristics of NetApp NAS systems (Choose three). NAS data is accessed at the file level NAS systems provide flexible provisioning, reliable backups, and archiving NAS systems support FC, FCOE, or iSCSI protocols NAS systems support CIFS, NFS, or a combination of both (multiprotocol)Question 29 of 100 30. Identify the commands used to enable LUN reservations (Choose two). lun set reservation iscsi -r lun create fcp -rQuestion 30 of 100 31. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 31 of 100 32. Which NOW site utility is used to determine if a problem we are experiencing is known to NetApp? AutoSupport Bugs Online/Release Comparison System Configuration Guide EtherealQuestion 32 of 100 33. File locking for a CIFS client is . advisory mandatory ordered optional Question 33 of 100 34. is the data-protection product that can restore an entire volume in a fraction of a second. SnapVault SnapMirror Snapshot SnapRestore SnapManager Question 34 of 100 35. What is the minimum number of disks required to create an aggregate that contains three data disks with a RAID-DP raid group? 9 disks 3 disks 7 disks 5 disksQuestion 35 of 100 36. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The entry related to the user The first entry for the qtree The entry related to the group The last entry for the qtreeQuestion 36 of 100 37. The protocols involved with NetApp file services solution are which of the folllowing? (Choose two) FCIP NFS CIFS iSCSlQuestion 37 of 100 38. Identify the valid commands that can be used with LUNs. lun clone lun rename lun offline lun copy lun moveQuestion 38 of 100 39. In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two) root quotas user quotas tree quotas group quotas file quotasQuestion 39 of 100 40. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of physical hard disks It is a collection of logical hard disks It is a collection of devices It is a collection of LUNsQuestion 40 of 100 41. Which entry in this /etc/quotas file for a qtree on /vol/wmv will affect the target? The entry related to the group The last entry for the qtree The first entry for the qtree The entry related to the userQuestion 41 of 100 42. The iSCSI security method that encrypts data between the initiator and the target is _______. IPSec LUN masking CHAP Header and Data DigestsQuestion 42 of 100 43. A quota target can be applied to __________. a specific disk space threshold a directory or a qtree an aggregate a user group or qtreeQuestion 43 of 100 44. What purpose does the /etc/nsswitch.conf file serve? It maps a hostname to its IP address It determines the order of authentication It exports a resource persistently It authenticates the usersQuestion 44 of 100 45. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 45 of 100 46. Which command will enable ‘symlink_strict_security’? cifs shares -change -symlink_strict_security options symlink_strict_security=on options symlink_strict_security=true options cifs.symlink_strict_security onQuestion 46 of 100 47. Identify the commands used to enable LUN reservations (Choose two). lun set reservation iscsi -r fcp -r lun createQuestion 47 of 100 48. In a SAN environment, the host’s HBA is referred to as the ___________ , and the storage system’s HBA is referred to as the __________ . initiator, target primary, secondary target, initiator secondary, primaryQuestion 48 of 100 49. Identify the NFS resources items for export (Choose three). file aggregate volume subnet directory/qtreeQuestion 49 of 100 50. An iSCSI or FC SAN implementation provides type access to LUNs. File Block Object Virtual local disk (VLD) Question 50 of 100 51. Match the NetApp commands to their uses.Reboot the storage arrayDisplays iscsi service running statusDisplays licensesDisplays disk informationdisk show stats show iscsi reboot license Question 51 of 100 52. Data ONTAP saves data in NVRAM memory prior to saving it to storage. What’s the reason for this? Data ONTAP saves data in NVRAM memory because it is more cost efficient than disks.snapvault initialize Data ONTAP saves data in the NVRAM in order to protect information in the event of power loss or other disruptions Data ONTAP saves data in NVRAM memory to allow Data ONTAP to later write to disk from NVRAM Data ONTAP saves data in NVRAM memory to allow for faster access to read data than acquiring the same data from the diskQuestion 52 of 100 53. What are the Data ONTAP commands for gathering performance information? (Choose two) sysstat sio_ntap_soll perfstat nfsstatQuestion 53 of 100 54. File locking for a CIFS client is . advisory mandatory ordered optional Question 54 of 100 55. What are three advantages of NAS? (Choose three) Clients running different operating systems can share the same files It provides a high-speed, dedicated network between chants and storage servers It can be expensive to install, deploy, and manage The file services can be extended to hundreds of devices It provides a high-speed, shared network between clients and storage serversQuestion 55 of 100 56. The command that would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2 is __________. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recentQuestion 56 of 100 57. Which two statements about hard and soft zoning are correct? (Choose two) Soft zones separate devices at the name service level. Hard zones allow physical movement of cables to different ports on the switch. Soft zones physically restrict access to only members of that zone. Hard zoning physically restricts access to only members of that zone.Question 57 of 100 58. What are different methods used to create LUN? (Choose three) FilerView lun map lun create lun setupQuestion 58 of 100 59. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 59 of 100 60. The command used to set the configuration of an Ethernet network interface is . ifstat sysconfig – v ifconfig netstat – i Question 60 of 100 61. What purpose does the /etc/nsswitch.conf file serve? It maps a hostname to its IP address It authenticates the users It exports a resource persistently It determines the order of authenticationQuestion 61 of 100 62. The iSCSI security method that encrypts data between the initiator and the target is _______. CHAP IPSec LUN masking Header and Data DigestsQuestion 62 of 100 63. If a volume contains multiple RAID 4 groups, there will be two disks in a volume fail without data loss, as long as they were not ___________. in the same RAID group currently being accessed in the same spare pool in the same file systemQuestion 63 of 100 64. The NetAPP storage efficiency technology that provides an extra level of data protection against disk failure is . Duplication Data compression Thin provisioning RAID-DP Question 64 of 100 65. What are different methods used to create LUN? (Choose three) FilerView lun setup lun create lun mapQuestion 65 of 100 66. Identify the valid commands that can be used with LUNs. lun clone lun copy lun rename lun offline lun moveQuestion 66 of 100 67. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocks A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volume A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-onlyQuestion 67 of 100 68. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 68 of 100 69. Which command will show the FCP target(s) on a storage system? lun stats fcp show adapter fcp show all lun show -vQuestion 69 of 100 70. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 70 of 100 71. Identify the three characteristics of NetApp NAS systems (Choose three). NAS data is accessed at the file level NAS systems support CIFS, NFS, or a combination of both (multiprotocol) NAS systems support FC, FCOE, or iSCSI protocols NAS systems provide flexible provisioning, reliable backups, and archivingQuestion 71 of 100 72. The command that allows you to set the permissions for a share called marketing is _____. cifs share -add marketing /vol/marketing cifs permissions -change marketing /vol/marketing cifs access marketing /vol/marketing cifs shares -permissions marketing /vol/marketingQuestion 72 of 100 73. type storage is provided by an iSCSI or FC SAN. file block VLD VIIP Question 73 of 100 74. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all qtrees to mixed It will change the security style of all volumes to mixed It will set the security style of all files to mixed It will set the default security style for all newly created volumesQuestion 74 of 100 75. LUNs will be available to some initiators and unavailable to others. What is the mechanism that allows that? LUN masking LUN grouping LUN cloning LUN hidingQuestion 75 of 100 76. is the data-protection product designed for disaster recovery. SnapManager SnapRestore Snapshot SnapMirror SnapVault Question 76 of 100 77. What is the command used to collect statistics on the performance of system resources, such as CPU, NVRAM, network interfaces, and disks, on storage system? netdiag sysstat pktt netstatQuestion 77 of 100 78. The command that shares the directory /vol/vol2/home using the share name ‘netapp’ is ________. cifs shares -add netapp /vol/vol2/home cifs shares -add /vol/vol2/home/netapp None of the above cifs shares -add netapp /vol/vol2Question 78 of 100 79. What is the purpose of RAID? RAID combines multiple disk drives into an array of disk drives that performs better than a single large disk drive and provides fault tolerance RAID is a scheme that divides and replicates data among multiple physical disk drives RAID protects disk data by creating a Snapshot copy of the data, which is then stored on a parity disk RAID groups disks in a single enclosureQuestion 79 of 100 80. Which command will enable ‘symlink_strict_security’? options symlink_strict_security=true options cifs.symlink_strict_security on options symlink_strict_security=on cifs shares -change -symlink_strict_securityQuestion 80 of 100 81. The conditions that might cause a user to receive a disk full message from a storage system are which of the following? (Choose two) A volumes active file system size could not be provided The user has reached his or her assigned quota Snap reserve is set to 10% The disk is write-protectedQuestion 81 of 100 82. The functions of multipathing software are which of the following? (Choose two) RAID reconstruction after a failure Path health monitoring Mirroring Port IO Load balancing Monitoring fiber optical signal qualityQuestion 82 of 100 83. The command that allows you to set the permissions for a share called marketing is _____. cifs share -add marketing /vol/marketing cifs access marketing /vol/marketing cifs permissions -change marketing /vol/marketing cifs shares -permissions marketing /vol/marketingQuestion 83 of 100 84. The command that verifies the iSCSI service is running is . license add iSCSI iscsi service iscsi status iscsi protocol Question 84 of 100 85. Identify the set of protocols that provide block-level access to NetApp storage. CIFS and NFS HTTP and FTP iSCSI and FCP SNA and RPCQuestion 85 of 100 86. Match the NetApp commands to their uses.Reboot the storage arrayDisplays disk informationDisplays licensesDisplays iscsi service running statusdisk show stats show iscsi reboot license Question 86 of 100 87. cifs setup command is which of the following? It displays the mount point of all shared directories It displays the names of all mounted directories on the storage system It displays prompts from a script for configuring CIFS on a storage system It displays a list of the users on the storage systemQuestion 87 of 100 88. Identify the differences between FlexClone volume and snapshot. A FlexClone volume is a separate copy of all data blocks within a parent volume that lives outside of the volumes, while the snapshot lives within the volume A FlexClone volume is the same as a snapshot until you split the FlexClone to remove all restrictions on the parent A FlexClone volume is a copy of all data blocks in a volume, while a snapshot only references data blocks A Flexclone volume is a writeable copy of a patent volume, while a snapshot is read-onlyQuestion 88 of 100 89. What are the Data ONTAP commands for gathering performance information? (Choose two) nfsstat sysstat sio_ntap_soll perfstatQuestion 89 of 100 90. In the picture, we can see the Aggregate creation. What best describes the Aggregate of NetApp Storage? It is a collection of logical hard disks It is a collection of physical hard disks It is a collection of LUNs It is a collection of devicesQuestion 90 of 100 91. What are the consequences of running the command “options wafl.default_security_style mixed“? It will change the security style of all volumes to mixed It will change the security style of all qtrees to mixed It will set the security style of all files to mixed It will set the default security style for all newly created volumesQuestion 91 of 100 92. Which command will show the FCP target(s) on a storage system? fcp show adapter lun stats fcp show all lun show -vQuestion 92 of 100 93. Identify the true statements about aggregates (Choose two). Aggregates cannot be reduced in size Aggregates can have RAID groups removed Aggregates may contain multiple RAID groups Aggregates must be limited to a single RAID groupQuestion 93 of 100 94. Which two actions can be implemented by an administrator on Data ONTAP FlexVol? (Choose two) Create online backups Create volumes that can be used with NAS or SAN data Create volumes that can increase or decrease in size Create any number of volumesQuestion 94 of 100 95. What are three advantages of NAS? (Choose three) It provides a high-speed, shared network between clients and storage servers The file services can be extended to hundreds of devices It can be expensive to install, deploy, and manage Clients running different operating systems can share the same files It provides a high-speed, dedicated network between chants and storage serversQuestion 95 of 100 96. What is the command to export a filesystem temporarily by ignoring the options in the /etc/exports file? exportfs -i exportfs -u exportfs -v exportfs -aQuestion 96 of 100 97. Identify the NFS resources items for export (Choose three). file subnet aggregate volume directory/qtreeQuestion 97 of 100 98. cifs setup command is which of the following? It displays the mount point of all shared directories It displays the names of all mounted directories on the storage system It displays prompts from a script for configuring CIFS on a storage system It displays a list of the users on the storage systemQuestion 98 of 100 99. Which two statements about hard and soft zoning are correct? (Choose two) Soft zones physically restrict access to only members of that zone. Soft zones separate devices at the name service level. Hard zoning physically restricts access to only members of that zone. Hard zones allow physical movement of cables to different ports on the switch.Question 99 of 100 100. The technology that natively enables block-level access by a host to disk storage via a standard LAN is . iSCSI FC CIFS NFS Question 100 of 100 Loading…