Your company has purchased two NetApp AFF A400 HA pairs.
During deployment, how many root aggregates are created?
Answer : D
Reference:
https://www.netapp.com/fr/media/13482-tr4375.pdf
Click the Exhibit button.
You have an ONTAP 9.8 cluster. After network maintenance, the LIF that is shown in the exhibit is not always on a correct port and is unreachable by users until the LIFs are moved to port e0c or e0d on either storage node.
In this scenario, which action should you take to ensure that the LIF only fails over to the correct ports?
Answer : A
When you set up an ONTAP cluster, which two SVM types are automatically created? (Choose two.)
Answer : AB
Reference:
https://library.netapp.com/ecmdocs/ECMP1354558/html/GUID-D860985F-11BF-4589-9457-E0FD03130B1F.html
An application owner at your organization requests a solution for zero RTO in the event of a failure in your primary data center, where you are using NetApp
ONTAP 9.8 software with iSCSI LUNs. The owner wants to avoid reconfiguring the application.
Which NetApp solution would you propose to fulfill these requirements?
Answer : C
Reference:
https://docs.netapp.com/ontap-9/topic/com.netapp.doc.pow-dap/Data%20protection.pdf
You are asked to deploy a 2-node ONTAP Select cluster. The physical hardware is located in two different locations and you want the aggregates mirrored synchronously between the two data centers. You must ensure high availability and automated switchover.
In this scenario, which two steps would you take to fulfill this requirement? (Choose two.)
Answer : BC
You need to increase the number of files that can be created in a volume.
Which two methods enable you to achieve this goal? (Choose two.)
Answer : AD
Reference:
https://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.dot-cm-vsmg%2FGUID-E4A62DE4-E7A4-410E-9E9E-8EB5C360D8FF.html
You are asked by your network engineering team to make sure that your NetApp cluster is configured to run LACP on its network ports.
Which network component satisfies this request?
Answer : A
Reference:
https://library.netapp.com/ecm/ecm_download_file/ECMP1401193
(19)
Click the Exhibit button.
You are adding a NetApp AFF A400 system to an existing 4-node cluster and want to know which ports you would use to expand your cluster.
Referring to the exhibit, which tool would you use to accomplish this task?
Answer : B
Which three protocols are supported by NetApp ONTAP Select? (Choose three.)
Answer : ABD
Reference:
https://docs.netapp.com/us-en/ontap-select/pdfs/sidebar/Deep_dive.pdf
(35)
You are currently using SnapMirror Synchronous (SM-S) to protect a critical workload at your organization and you want to convert the SnapMirror policy from
Sync to StrictSync.
In this scenario, which procedure allows you to achieve this task?
Answer : A
Reference:
https://www.netapp.com/pdf.html?item=/media/17174-tr4733pdf.pdf&v=20216291358
Which security method would be used to authenticate targets and initiators in an ISCSI environment?
Answer : A
Reference:
https://library.netapp.com/ecmdocs/ECMP1368845/html/GUID-5DCC56E6-A0EF-4E1D-B52C-F372D9CB986A.html
You want to enable the internal ONTAP engine that quickly identifies the file and directory differences between two Snapshot copies. In this scenario, which feature would accomplish this task?
Answer : B
Reference:
https://library.netapp.com/ecmdocs/ECMP1196874/html/GUID-C2793E0D-0AB5-40FD-9F36-324F3178FF6F.html
You need to configure data-at-rest encryption for your NetApp ONTAP 9.8 cluster. Your company does not have Key Management Interoperability Protocol (KMIP) services available but must require a passphrase to be entered when a node is rebooted.
In this scenario, which two actions should be performed to satisfy these requirements? (Choose two.)
Answer : AD
Reference:
https://docs.netapp.com/ontap-9/topic/com.netapp.doc.pow-nve/Encryption%20of%20data%20at%20rest.pdf
After creating an SVM in an ONTAP cluster, you are asked to delegate administration of the newly created SVM to an SVM administrator.
In this scenario, which two tasks must you complete? (Choose two.)
Answer : AC
Reference:
https://www.ibm.com/docs/en/nseriessoftware/com.ibm.nseries.software.doc/sc27628501.pdf
After deploying an ONTAP 9.8 cluster, you want to disable the unused Ethernet ports.
In this scenario, which two methods would accomplish this task? (Choose two.)
Answer : BD
Have any questions or issues ? Please dont hesitate to contact us