Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You want to add your NetApp StorageGRID embedded Prometheus instance as a data source to Grafana.What must be done to accomplish this task?

A.

Unblock port 9090 on the StorageGRID primary admin node.

B.

Deploy a gateway node in StorageGRID.

C.

Reboot the StorageGRID primary admin

D.

Create a dashboard for StorageGRID in Grafana.

Your customer is running their Kafka and Spark applications inside a Kubernetes cluster. They want to create a single backup policy within Astra to automate the backup of both applications and all their related Kubernetes objects at the same time.

Which method in Kubernetes should be used to accomplish this task?

A.

Create a Helm chart that deploys Kafka and Spark and their related objects to multiple namespaces.

B.

Put the applications and their objects in a single namespace, or label all the objects with a single label that Astra can recognize.

C.

Create a Kubernetes custom resource definition that includes all of the objects that Astra needs to treat as a single entity.

D.

Use a single Trident-based StorageClass to provision all storage for Kafka and Spark.

You are asked to administer your NetApp Cloud Central account settings to manage users, service accounts, workspaces, connectors, and subscriptions.

In this scenario, which REST API would you access?

A.

Cloud Manager API

B.

AWS API

C.

Tenancy API

D.

ONTAP API

You recently started at a new company where the persistent storage for Kubernetes was not provided by NetApp. You want to make sure you take full advantage of the additional annotations available from your NetApp storage.

In this scenario, which three parameters would you use to accomplish this task? (Choose three.)

A.

accessModes,

B.

snapshotPolicy

C.

unixPennis sions

D.

cloneFromPVC

E.

mountOptions

You configured your NetApp Cloud Volumes ONTAP instance to protect your data against ransomware. A previously unknown ransomware file extension infects your data.

In this scenario, which two NetApp technologies will provide a writable volume of the dataset before the ransomware attack? (Choose two.)

A.

FPolicy

B.

SnapRestore

C.

FlexCache

D.

FlexClone

You are creating an Ansible playbook to deploy a NetApp ONTAP cluster. You want to take advantage of a loop to automate the creation of several volumes.

What would accomplish this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

You deployed a NetApp Cloud Volumes ONTAP system in your AWS environment and you need to activate the WORM feature to secure them.

In this scenario, which two statements are correct? (Choose two.)

A.

You can activate WORM storage on individual volumes; you do not need to activate WORM at the system level.

B.

When WORM storage is activated, data tiering to object storage cannot be enabled.

C.

When WORM storage is activated, data tiering to object storage can be enabled.

D.

You cannot activate WORM storage on individual volumes; WORM must be activated at the system level.

You are using Nvidia DeepOps to deploy Kubernetes clusters on top of NetApp ONTAP AI systems. In this scenario, which automation engine is required?

A.

Ansible

B.

Puppet

C.

Jenkins

D.

Terraform