NetApp Certified Data Administrator, ONTAP v1.0 (NS0-162)

Page:    1 / 6   
Total 94 questions

You have deployed an ONTAP cluster and want to add protocol licenses.

In this scenario, which management tool accomplishes this task?

  • A. Active IQ Config Advisor
  • B. Active IQ Unified Manager
  • C. NetApp Cloud Manager
  • D. ONTAP System Manager


Answer : B

Click the Exhibit button.



You create a storage virtual machine (SVM) called SVM500 that is provisioned for iSCSI. After creating a LUN in the SVM and mapping it to an igroup, the attached VMware hosts are unable to mount the LUN.

Referring to the exhibit, what is the issue?

  • A. The initiator is a member of igroups of different OS types.
  • B. The igroup contains multiple initiators.
  • C. The igroup does not contain the appropriate initiators.
  • D. The igroup contains the wrong protocol.


Answer : C

Click the Exhibit button.



You have installed a new ONTAP 9.8 cluster and want to move the e0e and e0c ports into a new broadcast domain.

Referring to the exhibit, which action satisfies this requirement?

  • A. Use ONTAP System Manager to create a new broadcast domain.
  • B. Use the broadcast-domain split command.
  • C. Use the broadcast-domain create command.
  • D. Use the broadcast-domain merge command.


Answer : B

You have a 2-node NetApp FAS500f system serving NAS and SAN protocols. The cluster is running NetApp ONTAP 9.8. You have a requirement to use SnapMirror to mirror your data to public cloud object storage.

In this scenario, which ONTAP native solution is supported?

  • A. Cloud Backup Service
  • B. Flash Pool
  • C. Cloud Sync
  • D. Cloud Compliance service


Answer : C

After deploying an AFF A400, you want to deploy a storage virtual machine (SVM) to serve SMB data.

Which three conditions must exist in this scenario? (Choose three.)

  • A. You must synchronize the cluster time.
  • B. You must have a non-root aggregate in the online state.
  • C. You must have sufficient space for the root volume.
  • D. You must have configured the export policies.
  • E. You must have encryption enabled on the root volume.


Answer : ABD

You have finished deploying a NetApp AFF A400 cluster.

Before you place the array into production, which two tools should be used to validate the deployment? (Choose two.)

  • A. OnCommand Workflow Automation
  • B. Active IQ Config Advisor
  • C. Active IQ Web site
  • D. Active IQ Unified Manager


Answer : BD

Click the Exhibit button.



You have a 2-node FAS8300 switchless cluster. You ran the performance capacity report to see the last hour of performance.

Referring to the exhibit, which two statements describe the performance? (Choose two.)

  • A. The CPU has been over utilized.
  • B. A storage failover event will cause performance issues.
  • C. The CPU has been underutilized.
  • D. A storage failover event will have no performance degradation.


Answer : AB

Auditing has been enabled and configured on your ONTAP storage system. You have also created audit policies to monitor files and folders. Auditing has been running for over six months. You want to ensure that there have been no improper file access attempts.

How would you accomplish this task?

  • A. Import EVTX files into Microsoft Event Viewer.
  • B. Use Microsoft System Center to read EVTX files.
  • C. Use the Active IQ Web site to read EVTX files.
  • D. Import EVTX files into Microsoft SQL.


Answer : A

You have two ONTAP clusters and are setting up a new SnapMirror SVM replication (SVM DR) relationship.

Which two statements are true in this scenario? (Choose two.)

  • A. The target SVM subtype must be sync-destination.
  • B. The target SVM subtype must be dp-destination.
  • C. The target SVM subtype must be default.
  • D. The target SVM subtype must be sync-source.


Answer : AD

Click the Exhibit button.



A company has three servers that are using the iSCSI protocol to connect to a 2-node NetApp ONATP cluster. The server administrator notices that half of the paths are down. When you check the ONTAP cluster, you notice that the servers are logging into only the first controller.

Referring to the exhibit, which two steps do you take to troubleshoot the issue? (Choose two.)

  • A. Verify that the controller has not been taken over.
  • B. Verify that the iSCSI data protocol has been enabled on the ports.
  • C. Verify that each server has been rebooted.
  • D. Verify that the LIFs are up.


Answer : BD

Click the Exhibit button.



You have an AFF A400 HA pair serving SMB locally and a FAS8300 HA pair serving SMB over FlexCache. Both clusters are running ONTAP 9.8 software.

In this scenario, which two protocol features are supported at the remote cache? (Choose two.)

  • A. file locking
  • B. SMB3 continuously available (CA) shares
  • C. multiprotocol NFSv4.1
  • D. multiprotocol NFSv3


Answer : BD

Due to the increasing threat of ransomware, you must implement a secure and fast solution to recover files in your ONTAP cluster. The users should be able to recover their files from their Windows Desktop.

In this scenario, which two steps fulfill this requirement? (Choose two.)

  • A. Ensure that the option to show previous versions on the SVM is activated.
  • B. Ensure that the option to show previous versions on each share is activated.
  • C. Ensure that there is a Snapshot copy schedule for every volume containing files.
  • D. Ensure that the option to copy a FlexClone of each volume containing files is activated.


Answer : BC

You are planning an installation of a new stack of shelves to an HA pair and need to locate empty SAS ports since the current stacks are full.

In this scenario, which tool would you use to accomplish this task remotely?

  • A. Hardware Universe
  • B. Active IQ Web site
  • C. ONTAP System Manager
  • D. Interoperability Matrix Tool


Answer : C

You have a 4-node cluster with a NetApp AFF A400 HA pair and a NetApp FAS8700 HA pair running NetApp ONTAP 9.8 software. You are required to set up 2-factor authentication for the ONTAP CLI.

Which two authentication methods are required in this scenario? (Choose two.)

  • A. IP security
  • B. public key
  • C. password
  • D. Security Assertion Markup Language (SAML)


Answer : BC

Click the Exhibit button.



You have a 4-node ONTAP cluster and use FCP to access several LUNs. You perform a volume move to move a LUN (/vol/sql01_sysdb/lun) from node na01-01 to na01-03. After the move, you perform an HBA rescan from the host, but ALUA is now seeing twice the number of paths to the LUN.

Referring to the exhibit, which action would solve this problem?

  • A. Ensure that the fabric zoning is correct.
  • B. Update the Selective LUN Map configuration for the LUN mapping.
  • C. Change the MPIO policy on the host.
  • D. Reboot the host.


Answer : B

Page:    1 / 6   
Total 94 questions