Which two commands on the storage system allow you to gather detailed statistics about network interfaces, including basic information about network connections? (Choose two.)
A. ifstat -a
B. netdiag -n
C. netstat -i
D. sysstat 1
What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose three.)
A. Use reallocate -p pathname to run the physical reallocate.
B. Use aggr reallocate -p pathname to run the physical reallocate.
C. Reinitialize any SnapMirror relationship for the new physical geometry.
D. Volume Snapshots do not need to be deleted for the reallocate to run effectively.
E. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier than 7.2.
The snapvault snap sched -x command is used to ____________.
A. schedule full backups
B. cancel scheduled backups
C. schedule baseline transfer
D. schedule incremental backups
To remove a cluster setup, you must perform these steps:
1.
Type cf disable.
2.
Unlicense cluster.
3.
Remove partner entries for network interfaces from the /etc/rc file.
4.
Halt and make sure the partner-sysid is blank.
5.
Power down and remove the cluster interconnect card.
6.
Perform steps 1-5 above on the partner node.
A. True
B. False
The required hardware to add SyncMirror to an existing system would be ____________.
A. disk shelves and cluster interconnect
B. disk shelves and termination switches
C. disk shelves, Ethernet adapters, and cabling
D. disk shelves, Fibre Channel adapters, and cabling
Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC).
A. True
B. False
Protection Manager has policies that allow for tape-based protection as well as disk-based protection.
A. True
B. False
After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit aggregates.
A. True
B. False
What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2?
A. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
B. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
C. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent
D. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent
Which iSCSI security method encrypts data between the initiator and the target?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests