[Free] Download New Updated (December) Network Appliance NS0-155 Exam Questions 61-70

Ensurepass

QUESTION 61

Which statement best describes the output of this command?

 

sysstat -s 5

 

A.

Display the default output every five seconds and terminate after five counts.

B.

Display extended output every five seconds and print a summary after five counts.

C.

Display extended output every five seconds and print a summary upon termination.

D.

Display the default output every five seconds and print a summary upon termination.

 

Correct Answer: D

Explanation:

http://backdrift.org/man/netapp/man1/na_sysstat.1.html s

Display a summary of the output columns upon termination, descriptive columns such as `CP ty’ will nothave summaries printed. Note that, with the exception of `Cache hit’, the `Avg’ summary for percentage valuesis an average of percentages, not a true mean of the underlying data. The `Avg’ is only intended as a grossindicator of performance. For more detailed information use tools such as na_nfsstat, na_netstat, or statit.

 

 

QUESTION 62

What utility on the storage system will allow you to capture network packet information?

 

A.

Snoop

B.

Netstats

C.

Pktt

D.

Traceroute

 

Correct Answer: C

Explanation:

The pktt command controls a simple on-filer packet tracing facility. Packets can be captured into a tracebuffer then dumped to a file, or the captured data can be logged to a file. The data is stored in “tcpdump”format, and can be directly viewed with tcpdump, ethereal, and perhaps other viewers. The output can also beconverted using the editcap(1) program to a variety of other formats, including Sniffer, NetMon, and snoop.

 

 

QUESTION 63

What is the correct format for the scheduling component of a SnapVault schedule?

 

A.

cnt[@day_list][@hour_list]

B.

YYYY-MM-DD

C.

Crontable format

D.

List of dates in ISO Date format

 

Correct Answer: A

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html

http://www.geekyfacts.com/index.php?option=com_content&view=article&id=64:snapvault

snapvault snap sched [ -f ] [ -x ] [ -o options ] [ volname [ snapname [ schedule]]] schedule is cnt[@day_list][@hour_list] or cnt[@hour_list][@day_list]

In the schedule, cnt tells SnapVault how many of the snapshots to keep for primaries and for non-SnapLocksecondary volumes. The snapshots will be numbered newest to oldest from 0 to cnt-1. When creating a newsnapshot, SnapVault will delete the oldest snapshots, increment by one the number on the remainingsnapshots and then create a new number 0 snapshot. If a snapshot is missing from the sequence (e.g. sv.0,sv.1, and sv.3 exist but sv.2 does not), only snapshots that need to be renumbered to make room for the newsv.0 snapshot will be renumbered. In the example, sv.0 and sv.1 would be renamed to sv.1 and sv.2, but sv.3would remain unchanged.

 

The cnt in the schedule is interpreted differently for SnapVault secondary SnapLock volumes. For SnapLocksecondary volumes, snapshots are created with a name that includes an encoded date and time of when thesnapshot is created. These snapshots are never renamed and they are never automatically deleted. Thesesnapshots may be deleted using snap delete after the retention period of the snapshot has expired. If cnt is 0,no snapshots will be taken. If cnt is any non-zero value, snapshots will be taken and no snapshots will beautomatically deleted.

 

If specified, the day_list specifies which days of the week the snapshot should be created. The day_list is acomma-separated list of the first three letters of the day: mon, tue, wed, thu, fri, sat, sun. The names are notcase sensitive. Day ranges such as mon-fri can also be given. The default day_list is mon-sun, i.e. every day.

 

If specified, the hour_list specifies which hours of the day the snapshot should be created, on each scheduledday. The hour_list is a comma-separated list of the hours during the day, where hours are integers from 0 to23. Hour ranges such as 8-17 are allowed. Also, step values are allowed in conjuction with ranges. Forexample, 0-23/2 means “every two hours”. The default hour_list is 0, i.e. midnight on the morning of eachscheduled day.

 

 

QUESTION 64

NTFS allows file access based on ___________.

 

A.

NT ACLs and SID.

B.

NT ACLs and UNIX permissions.

C.

SID and password.

D.

UNIX permissions.

 

Correct Answer: A

Explanation:

http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-B0BDA63560FECEFF.html

 

In OnTap 8.0, when NTFS security style is used, only Windows style security objects are used.

For CIFS clients, security is handled using Windows NTFS ACLs. For NFS clients, the NFS UID (user id) is mapped to a Windows SID (security identifier) and its associatedgroups. Those mapped credentials are used to determine file access, based on the NFTS ACL.

 

 

QUESTION 65

There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct sequence of these phases?

 

A.

Setup Phase, Mirror Phase, Cutover Phase

B.

Initialization phase, Copy Phase, Migrate Phase

C.

Begin Phase, Move Phase, Complete Phase

D.

Setup Phase, Data Copy Phase, Cutover Phase

 

Correct Answer: D

Explanation:

https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1-17848/PDF_Tips_Data_Motion_0211.pdf

 

Non-disruptive Volume Movement is called DataMotion. DataMotion uses SnapMirror for volume migration.

A DataMotion migration occurs in three phases:

1. Setup

2. Data copy

3. Cutover

 

 

QUESTION 66

Which exportfs command will temporarily export the resource while ignoring the options specified in the /etc/exports file?

 

A.

exportfs -a

B.

exportfs -i

C.

exportfs -u

D.

exportfs -v

 

Correct Answer: B

 

 

QUESTION 67

Which two commands can be used to enable LUN reservations? (Choose two)

 

A.

lun set reservation

B.

lun reservation set

C.

lun map

D.

lun create

 

Correct Answer: AD

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

 

lun set reservation lun_path [ enable | disable ]

Enables or disables the space reservation on the LUN. If no arguments are supplied after the lun_path, thenthe space reservation status of the given lun_path is displayed.

lun create -s size -t ostype [ -o noreserve ] [ -e space_alloc ] lun_path This usage of the lun create command should be employed to create a new LUN of given size, with initiallyzero contents. The LUN is created at the lun_path given. No file should already exist at the given lun_path. Thedirectory specified in the lun_path must be a qtree root directory.

 

The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be used: c(1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m).

 

The size of the created LUN could be larger than the size specified, in order to get an integral number ofcylinders while reporting the geometry using SAN protocols.

 

The size of the LUN actually created is reported if it is different from that specified in the command.

The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a singleslicepartition), windows (the LUN will be used to store a raw disk device in a single-partition Windows diskusing the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX data), aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the LUN will beused to store a Linux raw disk without any partition table), netware (the LUN will be used to store NetWaredata), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be used tostore Windows data for Windows 2008 systems), openvms (the LUN will be used to store Open-VMS data),xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data), solaris_efi

 

By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.

 

Using this option will create a LUN without any space being reserved. Provisioning threshold events can beenabled by specifying -e space_alloc option. This option has to be used in conjunction with -o noreserve.

 

lun map [ -f ] lun_path initiator_group [ lun_id ]

Maps a LUN to all the initiators in the supplied group. If a LUN ID is not specified, the smallest number that canbe used for the various initiators in the group is automatically picked. Note that this command can be usedmultiple times to configure multiple maps for a LUN, or for an initiator group. Once created, you can use lunshow -m to list all the LUN mappings.

The optional -f argument disables checking with the HA partner for LUN mapping conflicts.

 

 

QUESTION 68

Before running lun setup on the storage system, you must first create the igroup to which the initiator will be attached.

 

A.

True

B.

False

 

Correct Answer: B

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

 

lun setup

Easy to use interactive
mechanism for setting up initiator groups, LUNs, and mapping configuration.

 

 

QUESTION 69

UNIX allows file access based on___________.

 

A.

NT ACLs and UNIX permissions.

B.

NT ACLs and SID.

C.

GID or UID and UNIX permissions.

D.

GID or UID and ACLs.

 

Correct Answer: C

Explanation:

http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GU
ID-866DD79D-D2A6-4FBA-B0BDA63560FECEFF.html

 

In OnTap 8.0, when UNIX security style is selected, only UNIX security objects can be used. The correctanswer is GID, UID and UNIX permissions.

 

Basic UNIX permissions are organized into three classes: user, group, and others. UNIX operating systems identify users with a numerical value: a user identifier, also known as a UID or UserID. Each user is a member of a group of the same name as the user. Like UIDs, groups (GIDs) are alsospecified using a numerical value.

 

 

QUESTION 70

How does the NetApp Remote Agent (RSA) connect to NetApp Support?

 

A.

NetApp Support initiates a non-secure connection to the RSA.

B.

NetApp Support initiates a secure connection to the RSA.

C.

The RSA initiates a secure connection to NetApp Support.

D.

The RSA initiates a non-secure connection to NetApp support.

 

Correct Answer: C

Explanation:

https://library.netapp.com/ecm/ecm_download_file/ECMP1200040

 

Remote Support Agent is the facility to provide NetApp Support Engineers with the ability to remotely triggerAutoSupport.

 

Remote Support Agent uses HTTP or HTTPS to communicate with the storage controller to initiate commandsand to collect files. It uses HTTPS to send system logs and core files from the Data ONTAP root volumeto Remote Support Enterprise on the NetApp Support side.

 

NetApp RSA is not related to the RSA public key encryption algorithm.

 

Free VCE & PDF File for Network Appliance NS0-155 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in NS0-155 Exam Questions (December) and tagged , , , , , , . Bookmark the permalink.