Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which command on the storage system allows you to display statistics on the performance of system resource such as CPU, NVRAM, network interfaces, and disks?

A.

netstat

B.

netdiag

C.

pktt

D.

sysstat

UNIX allows file access based on___________.

A.

NT ACLs and UNIX permissions.

B.

NT ACLs and SID.

C.

GID or UID and UNIX permissions.

D.

GID or UID and ACLs.

An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________.

A.

session, session, connections

B.

connection, session, connections

C.

connection, connection, sessions

D.

session, connection, sessions

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 resynchronization state when it failed?

A.

Determine which volumes are at the remote and disaster sites.

B.

Re-create the synchronous mirror.

C.

Rejoin the two volumes.

D.

Turn on power to the cluster node at the disaster site.

Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths to a LUN.

A.

Token ring, physical

B.

FC SAN, virtual

C.

FC or IP SAN, virtual

D.

FC or IP SAN, Physical

Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?

A.

All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.

B.

The expansion is triggered by an aggr convert command.

C.

The expansion is triggered by adding disks to exceed 16 TB.

D.

The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with Data ONTAP 8.1 upgrade.

Which storage system command would display the WWPNs of hosts that have logged into storage system using a Fibre Channel connection?

A.

fcp config

B.

fcp initiator show

C.

fcp show –i

D.

fcp show initiator

If the security style is set to UNIX, CIFS client file access is determined by ___________.

A.

NT ACLs

B.

the last client to set permissions

C.

the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions

D.

This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

Which mechanism allows you to make LUNs available to some initiators and unavailable to others?

A.

LUN masking

B.

LUN grouping

C.

LUN cloning

D.

LUN hiding

You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the directory structure no longer exists. Which is the most likely explanation?

A.

Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore. You must now SnapRestore the volume.

B.

Snapshot copies have been created since the original directory structure was deleted.

C.

You must recreate the directory structure before trying to restore the file.

D.

You cannot restore a file to an alternate location.