NetApp Certified Data Administrator, ONTAP v7.0

Page:    1 / 4   
Exam contains 66 questions

You have a volume in an SVM that needs to be moved to a different SVM. You do not have room to copy the volume to the other SVM.
Which ONTAP command will accomplish this task?

  • A. volume rehost
  • B. volume mount
  • C. volume modify
  • D. volume move

Answer : A

If you have been working with Netapp Clustered Data Ontap for a while now you would no doubt have performed quite a few volume moves. However one limitation of the volume move command was that you couldnt move the volume between storage virtual machines
(SVMs). Starting with Ontap 9 we can now move a volume between Storage Virtual
Machines (SVMs). This is done with the volume rehost command.

Click the exhibit button.

You have a 2-node cluster named cl1 that has separate LIFs on each node for both SAN and NAS traffic. A storage failover takeover process is initiated as shown in the exhibit.
In this scenario, which two statements about the takeover process are true? (Choose two.)

  • A. The SAN LIFs on cl1-01 go offline.
  • B. The NAS LIFs on cl1-01 automatically migrate to cl1-02.
  • C. The NAS LIFs on cl1-01 go offline.
  • D. The SAN LIFs on cl1-01 automatically migrate to cl1-02.

Answer : BC


Storage failover takeover -
{ -ofnode {<nodename>|local} - Node to Takeover
This specifies the node that is taken over. It is shut down and its partner takes over its storage.

An administrator enabled the iSCSI protocol on an SVM and created a LUN for a Windows
2016 system. After rescan, the LUN is not visible on the host.
Which two steps must the administrator take to solve this problem? (Choose two.)

  • A. Create an initiator group (igroup), add the WWPN of the host initiator, and then map the igroup to the LUN.
  • B. Disable the ALUA support from the host for the LUN.
  • C. Configure the iSCSI service on the Windows 2016 system.
  • D. Create an initiator group (igroup), add the iSCSI IQN, and map the igroup to the LUN.

Answer : CD

D: An iSCSI qualified name (IQN) identifier is a worldwide unique name that each iSCSI initiator and iSCSI target must have. The IQN for an iSCSI initiator is available in Microsoft iSCSI Software Initiator or other iSCSI initiators. Typically the IQN is used by the iSCSI target to identify the iSCSI initiator.

You are creating the source and destination SVMs for a new SVM disaster recovery relationship.
Which SVM set of subtypes should you choose?

  • A. Source SVM default, Destination SVM: default
  • B. Source SVM default, Destination SVM: dp-destination
  • C. Source SVM default, Destination SVM: sync-dest
  • D. Source SVM default, Destination SVM: sync-dest

Answer : B

A destination Storage Virtual Machine (SVM) is an SVM with the dp-destination subtype created for protecting a source SVM that serves data. A destination SVM contains replicated data and configuration of the source SVM.

Click the Exhibit button.

Which two data protection deployment configurations shown in the exhibit are supported?
(Choose two.)

  • A. configuration D
  • B. configuration C
  • C. configuration A
  • D. configuration B

Answer : AC

You can use SnapVault to protect a volume SnapMirror destination. You can perform
SnapVault transfers from the volume SnapMirror destination when you want to retain the data for a longer period.

Users report that they are unable to connect to home directories stored on a NetApp cluster. You are using Active Directory-based Kerberos authentication.
Which two actions would correct the problem? (Choose two.)

  • A. Verify that the CIFS server in running in the SVM.
  • B. Verify that the Network Time Protocol service is in sync.
  • C. Verify that an Active Directory domain admin account is configured in ONTAP.
  • D. Verify that domain tunneling is configured in ONTAP.

Answer : AC

Kerberized NFS in Cluster-Mode for use with Active Directory Pre-requisites include:
Note: The CIFS server is not required for basic NFS Kerberos access, but is required for multiprotocol access or when using AD as an LDAP server for name mappings.
References: kerberized-nfs-in-cluster-mode-with-active-directory?language=en_US

Which two features are supported by SnapLock Enterprise but not by SnapLock
Compliance? (Choose two.)

  • A. FlexArray
  • B. privileged delete
  • C. NetApp Volume Encryption (NVE)
  • D. SnapMirror

Answer : BD

Features supported by SnapLock Enterprise but not by SnapLock Compliance include:
Comparison table of SnapLock Enterprise and SnapLock Compliance
The SnapLock Enterprise and the SnapLock Compliance features differ in terms of the options and permissions available for both the features.


What is an array LUN?

  • A. a LUN provisioned in ONTAP that is mounted by a connected host
  • B. a LUN provisioned on third-party storage that ONTAP will use as a passthrough LUN
  • C. a LUN that is used only as a part of a volume group
  • D. a LUN provisioned on third-party storage that ONTAP will use in a RAID group

Answer : A

The Data ONTAP software-based scheme provides ownership control only for storage systems running Data ONTAP; it does not prevent a different type of host from overwriting data in an array LUN owned by a system running Data ONTAP. Therefore, if multiple hosts are accessing array LUNs through the same storage array port, be sure to use LUN security on your storage array to prevent the systems from overwriting each other's array

You need to duplicate a production LUN for quality assurance testing. The LUN resides in svm_prod and needs to be available in svm_qa. Both SVMs reside on the same cluster.
Which step will accomplish this task?

  • A. Issue the lun move command.
  • B. Issue the volume rehost command.
  • C. Issue the lun copy command.
  • D. Issue the volume move command.

Answer : C

Cluster administrators can copy a LUN across Storage Virtual Machines (SVMs) within the cluster by using the lun copy command.
References: sanag%2FGUID-5B6FA678-31F6-4572-9E9E-B22637BAE911.html

Click the Exhibit button.

The size of the aggr1 RAID group shown in the exhibit is 8.
What is the RAID type?

  • B. RAID-DP
  • C. RAID4
  • D. RAID0

Answer : B

RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks.
Figure: Diagram of a RAID 6 setup, which is identical to RAID 5 other than the addition of a second parity block

Which CLI command is used to move epsilon to a new node?

  • A. cluster modify
  • B. cluster identity modify
  • C. cluster setup
  • D. storage failover takeover

Answer : A

Reassigning epsilon to another node in the cluster.
Only one node in the cluster can hold epsilon. Epsilon gives the holding node an extra fractional voting weight in the quorum.

Steps -

You have a SnapLock Compliance volume that needs to be replicated to a different cluster at a disaster recovery site.
Which two statements concerning the SnapMirror destination volume are true? (Choose two.)

  • A. The destination volume type must be SnapLock Enterprise.
  • B. The destination volume type must be SnapLock Compliance.
  • C. The destination cluster does not require a SnapLock license.
  • D. The destination cluster requires a SnapLock license.

Answer : BD

B: To create an end-to-end relationship between SnapLock Compliance volumes by using
SnapMirror, you need to create both the source and the destination volumes as SnapLock
Compliance volumes and then initialize the mirroring relationship by using the snapmirror initialize command. The other commands you use differ depending on whether you are creating a volume SnapMirror relationship for a traditional volume or a FlexVol volume.
D: A SnapLock license entitles you to use both SnapLock Compliance mode and SnapLock
Enterprise mode. SnapLock licenses are issued on a per-node basis. You must install a license for each node that hosts a SnapLock aggregate.

Click the Exhibit button.

While reviewing the port health shown in the exhibit, you notice that port e0c on node1 is degraded.
What would cause this problem?

  • A. The port is not plugged into a switch.
  • B. The port is in the wrong broadcast domain.
  • C. The port does not have an IP address.
  • D. The port has been flapping.

Answer : B

L2 reachability health monitor: Monitors whether all ports configured in the same broadcast domain have L2 reachability to each other.
This health monitor reports L2 reachability issues in all IPspaces; however, it marks only the ports in the cluster IPspace as degraded.

Click the Exhibit button.

You create a new SnapMirror relationship, but is fails to initialize. The SnapMirror relationship is configured as shown in the exhibit.
How would you solve this problem?

  • A. Re-create the destination volume as C.UTF-8.
  • B. Re-create the destination volume as en_US.
  • C. Change the language on the source volume to en_US.
  • D. Change the language on the destination volume to C.UTF-8.

Answer : D

Cause: The language setting in the source Vserver is not the same as the language setting in the destination Vserver.
Resolution: The only way to resolve this issue is to create a destination Vserver with the same language setting as the source Vserver.
References: snapmirror-initialization-failures?language=en_US

Click the Exhibit button.

Referring to the exhibit, which two statements about the connectivity from the 2-node cluster to the cluster interconnects are true? (Choose two.)

  • A. The CN1610 switches were discovered by using Cisco CDP.
  • B. The nodes are cabled correctly.
  • C. The nodes are cabled incorrectly.
  • D. The CN1610 switches were discovered by using LLDP.

Answer : AC

From the exhibit we see that cdp is used.
Cabling the private cluster interconnect for NetApp CN1610 switches.

Steps -

Page:    1 / 4   
Exam contains 66 questions

Talk to us!

Have any questions or issues ? Please dont hesitate to contact us is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy