Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

To assist with capacity planning, your supervisor wants to receive weekly capacity summaryreports using e- mail for all on-premises ONTAP clusters. You are asked to implement a solution that has no additional software licensing costs.

Which action accomplishes this task?

A.

Configure Cloud Insights Premium Edition.

B.

Create a capacity dashboard in Active IQ Digital Advisor.

C.

Configure capacity and utilization reports in Active IQ Unified Manager.

D.

Configure Cloud Insights Basic Edition.

A client is planning to configure a SnapMirror relationship between two sites. Normally their ISP provides network throughput of 100 Mbps; however, they can arrange to have this burst to 1 Gbps for a period of time at an additional cost.

Their intention is to back up 400 GB of Snapshot data each day using the burst option to keep the replication time to a minimum. In this scenario, how much burst time do they need to purchase?

A.

15 minutes

B.

30 minutes

C.

45 minutes

D.

60 minutes

Your DevOps team reported that one virtual machine on a VMware datastore has been corrupted due to a ransomware attack.

In this scenario, which two methods would solvethe issue? (Choose two.)

A.

Restore the Snapshot copy of the volume from ONTAP System Manager.

B.

Restore the VM using SnapCenter Plug-in for VMware vSphere.

C.

Restore the datastore using SnapCenter Plug-in for VMware vSphere.

D.

Clone thevolume's Snapshot copy prior to the attack, mount, and storage vMotion.

You want to create an application-consistent Snapshot copy by using SnapCenter software. What is required to accomplishthis task?

A.

NetApp NFS Plug-in for VMware VAAI

B.

SnapDrive for Windows Server

C.

VMware VM Tools

D.

Plug-in for Microsoft Exchange

You are asked to enable WORM technology on a large amount of legal data. The legal team asks that a designated user group have the ability to delete files as needed.

What would satisfy the legal team's requirements?

A.

SnapLock Enterprise

B.

SnapVault

C.

SnapCenter Plug-in for Microsoft SQL Server

D.

SnapLock Compliance

Click the Exhibit button.

Your customer is deploying SnapCenter to protect volumes on an ONTAP Select cluster.

Referring to the exhibit, which licensing is required to protect the Engineering and Marketing volumes?

A.

a SnapManagerSuite controller-based license

B.

a 3 TB SnapCenter capacity-based license

C.

a 5TB SnapCenter capacity-based license

D.

a SnapProtectApps controller-based license

What are two NetApp data protection solutions? (Choose two.)

A.

RecoverPoint

B.

SnapMirror

C.

TimeFinder

D.

SnapVault

Which two tools would you use toverify that an Oracle database has an application-consistent snapshot taken? (Choose two.)

A.

SnapManager for Oracle

B.

OnCommand System Manager

C.

SnapCenter

D.

OnCommand Unified Manager

You want to generate performance-related reports and alerts using the OnCommand Unified Manager 6.x server. Which two additional tasks must be completed to enable these features?

(Choose two.)

A.

Create a local user with limited Event Publisher role privileges

B.

Install and configure OnCommand Workflow Automation.

C.

Configure a connection between the Unified Manager server and OnCommand System Manager.

D.

Configure a connection between the Unified Manager server and a Performance Manager server.

Click the Exhibit button.

You are configuring cluster peering from cluster2 to cluster1 on your ONTAP 9.7 clusters using ONTAP System Manager. You are given the details shown below to set up the cluster peer relationship. You want to determine why the peering has failed.

Cluster2 intercluster LIFIP: 192.168.0.143 Subnet: 255.255.255.0 Port: e0e passphrase: netapp1234

Cluster1 intercluster LIF IP: 192.168.0.153 Subnet: 255.255.255.0 Port: e0e passphrase: netapp1234

Referring to the exhibit, which statement is correct?

A.

The Source Cluster IP is incorrect.

B.

The Target Cluster Passphrase is incorrect.

C.

The Target Cluster IP is incorrect.

D.

The Source Cluster Passphrase is incorrect.