[Free] Download New Updated (December) Network Appliance NS0-155 Exam Questions 11-20

Ensurepass

QUESTION 11

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default, and then forcibly take over Node 1 if the error condition persists?

 

A.

Auto enable of giveback

B.

Negotiated Fail Over

C.

Takeover on panic

D.

Cf.quickloop.enable

 

Correct Answer: B

Explanation:

http://www.wafl.co.uk/cf/

http://wafl.co.uk/options/

Negotiated failover is a general facility which supports negotiated failover on the basis of decisionsmade by various modules.

 

cf.takeover.on_disk_shelf_miscompare

This option allows negotiated takeover to be enabledwhen the cluster nodes detect a mismatch in disk shelfcount. By default, this option is set to off.

 

This option is available only when cluster is licensedand changing the value on one filer automaticallychanges the value on the partner filer.

 

 

QUESTION 12

To automatically export volumes and directories on storage system reboot, include them in the /etc/exports file.

 

A.

True

B.

False

 

Correct Answer: A

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

The /etc/exports file contains a list of export entries for all file system paths that Data ONTAP exportsautomatically when NFS starts up.

 

 

QUESTION 13

Which Data ONTAP option sets system-wide for all transfers?

 

A.

Options transfers.wide.enable

B.

Options transfer.throttle.enable.

C.

Option replication.wide.enable

D.

Options replication.throttle.enable

 

Correct Answer: D


Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

 

replication.throttle.enableEnables global network throttling of SnapMirror and SnapVault transfers. The default value for this option isoff.

replication.throttle.incoming.max_kbs

This option specifies the maximum total bandwidth used by all the incoming (applied at destination) SnapMirrorand SnapVault transfers, specified in kilobytes/sec. The default value for this option is unlimited, which meansthere is no limit on total bandwidth used. This option is valid only when the option replication.throttle.enable ison.

 

replication.throttle.outgoing.max_kbs

This option specifies the maximum total bandwidth used by all the outgoing (applied at source) SnapMirror andSnapVault transfers specified in kilobytes/sec. The default value for this option is unlimited, which means thereis no limit on total bandwidth used. This option is valid only when the option replication.throttle.enable is on.

 

 

QUESTION 14

Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?

 

A.

FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 syns

B.

FilerA:source_vol FilerB:destination_vol – 0-55/5 * * *

C.

FilerA:source_vol FilerB:destination_vol – sync

D.

FilerA:source_vol FilerB:destination_vol outstanding=3s sync

 

Correct Answer: ACD

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html

Each relationship entry of the /etc/snapmirror.conf file is a single line containing space- separated fields.

The entry has this format:

Source destination arguments scheduleschedule

This is the schedule used by the destination node for updating the mirror. It informs the SnapMirror schedulerwhen transfers will be initiated. The schedule field can contain the word sync to specify fully synchronousmirroring, semi-sync to specify semi-synchronous mirroring, or a cron-style specification of when to update themirror.

 

visibility_interval

The value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h(hours). If a suffix is not specified, value is interpreted as seconds. This argument controls the amount of timebefore an automatic snapshot is created on the source volume that is synchronously mirrored. The value is thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A small numberhere can negatively affect the performance of the mirror. This argument is ignored for asynchronous mirrors.

 

Outstanding (deprecated)

This argument controls the performance versus synchronicity trade-off for synchronous mirrors. The value forthis argument is a number followed by the suffixes: ops (operations), ms (milliseconds) o
r s (seconds). Settinga value less than 10s configures the mirror to run in fully synchronous mode. Setting a value greater than orequal to 10s configures the mirror to run in semi-synchronous mode. This argument is ignored forasynchronous mirrors. Please note that this is a deprecated option. Use the schedule field to specify thesynchronous mode for the mirror.

 

cksum

This controls which checksum algorithm is used to protect the data transmitted by SnapMirror. Currentlysupported values are “none”, “crc32c”, and “crc32c_header_only”. The value “crc32c_header_only” has beenadded only for volume SnapMirror and is not supported for synchronous SnapMirror and qtree SnapMirror.

 

 

QUESTION 15

Which command disables client access to Snapshot copies on a volume called flexvoll?

 

A.

cifs shares -change flxvoll -nosnap

B.

snap access flexvoll off

C.

vol options flexvoll nonsnapdir on

D.

vol options flexvoll snapdir off

E.

vol options flexvoll snapdir on

 

Correct Answer: C

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html

vol options nosnapdir [on|off]

If this option is on, it disables the visible .snapshot directory that is normally present at client mount points, andturns off access to all other .snapshot directories in the volume.

The default setting is off.

 

 

QUESTION 16

An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a ______________ you can have one or more ____________.

 

A.

session, session, connections

B.

connection, session, connections

C.

connection, connection, sessions

D.

session, connection, sessions

 

Correct Answer: A

Explanation:

http://scst.sourceforge.net/mc_s.html

http://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf

Meme: Remember the acronym: MCS or MC/S – Multiple Connections per Session.

Microsoft Windows 2008’sMPIO driver supports MC/S.

 

 

QUESTION 17

The two copies SyncMirror volume are called ____________, which are physical copies of the same file system and consist of one or more RAID groups.

 

A.

Snapshot copies

B.

Aggregates

C.

Plexes

D.

Volumes

Correct Answer: C

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA-8FEE619EEF1D.html

 

SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for real-timemirroring of data to matching aggregates physically connected to the same storage system.

SyncMirror provides for synchronous mirroring of data, implemented at the RAID level. You can use SyncMirrorto create aggregates that consist of two copies of the same WAFL file system. The twocopies, known asplexes, are simultaneously updated. Therefore, the copies are always identical. The two plexes are directlyconnected to the same system.

 

The following provides information about the activities of SyncMirror:

SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume isessentially an aggregate with a single volume that spans the entire aggregate.)

SyncMirror cannot be used to mirror FlexVol volumes. However, FlexVol volumes can be mirrored as part ofan aggregate.

SyncMirror is different from synchronous SnapMirror.

 

 

QUESTION 18

UNIX allows file access based on __________.

 

A.

GID or UID and ACLs.

B.

GID or UID and UNIX permissions.

C.

NT ACLs and SID.

D.

NT ACLs and UNIX permissions.

 

Correct Answer: B

Explanation:

* Unix-like operating systems identify users within the kernel by an unsigned integer value called a user identifier, often abbreviated to UID or User ID. The range of UID values varies amongst different systems; at the very least, a UID represents a 15-bit integer, ranging between 0 and

The UID value references users in the /etc/passwd file. Shadow password files and Network Information Service also refer to numeric UIDs. The user identifier has become a necessary component of Unix file systems and processes.

* In POSIX-compliant environments the command-line command id gives the user’s user identifier number as well as more information on the user account like the user name, primary user group and group identifier (GID).

* Files and directories are owned by a user. The owner determines the file’s owner class.

Distinct permissions apply to the owner.

Files and directories are assigned a group, which define the file’s group class. Distinct permissions apply to members of the file’s group members. The owner may be a member of the file’s group.

Users who are not the owner, nor a member of the group, comprise a file’s others class.

Distinct permissions apply to others.

The effective permissions are determined based on the user’s class. For example, the user who is the owner of the file will have the permissions given to the owner class regardless of the permissions assigned to the group class or others class.

 

 

 

 

 

QUESTION 19

Which set of protocols provide block-level access to NetApp storage?

 

A.

SNA and RPC

B.

iSCSI and FCP

C.

HTTP and FTP

D.

CIFS and NFS

 

Correct Answer: B

Explanation:

iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are commonlyreferred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP and FTP provide file access not block access.

 

 

QUESTION 20

Which command displays the statistics for Ethernet network interfaces?

 

A.

ifconfig

B.

ifstat

C.

sysconfig

D.

sysstat

 

Correct Answer: B

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html

ifstat – display device-level statistics for network interfaces

 

Free VCE & PDF File for Network Appliance NS0-155 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in NS0-155 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.