<< Prev Question Next Question >>

Question 25/150

One of the steps while configuring CIFS protocol on an SVM using System Manager is joining the CIFS server to the domain. Which statement is NOT TRUE regarding this task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: How is a FlexClone volume different than a snapshot?...
Question 2: Which command allows you to set the permissions for a share ...
Question 3: Which three Clustered Data ONTAP objects that are "owned" by...
Question 4: If you have a space-reserved, completely full 600G LUN with ...
Question 5: When you create a new volume, Data ONTAP automatically assig...
Question 6: Which three can coexist on a NetApp storage system? (Choose ...
Question 7: In Data ONTAP the root user is exempt from these two quotas:...
Question 8: Which command can you use to add exports to the /etc/exports...
Question 9: Which Clustered Data ONTAP logical component handles storage...
Question 10: Which command on the storage system allows you to collect st...
Question 11: What is the definition of the cifs setup command?...
Question 12: When a client navigates through a junction, the client has e...
Question 13: Cloud Consumers Can provision and manage servers, system and...
Question 14: Which command displays the statistics for Ethernet network i...
Question 15: Which two statements are TRUE about Data ONTAP operating in ...
Question 16: When WAFL (Write Anywhere File Layout) flushes data to disk,...
Question 17: In a traditional SAN environment, which device owns the file...
Question 18: If you change the setting for the option cifs.neg_buf_size, ...
Question 19: What are 3 true statements about physical reallocation of da...
Question 20: CIFS clients can resolve symbolic links created by NFS clien...
Question 21: Which NetApp technology can create multiple virtual controll...
Question 22: Which command would you use to verify that the iSCSI service...
Question 23: What are three advantages of NAS? (Choose three.)...
Question 24: Which will enable "symlink_strict_security"?...
Question 25: One of the steps while configuring CIFS protocol on an SVM u...
Question 26: Which NetApp solution is pre-validated and includes storage,...
Question 27: How are iSCSI Initiators commonly implemented?...
Question 28: You wish to export /vol/vol1/data so that any NFS client may...
Question 29: When creating a flexible volume, which attribute determines ...
Question 30: In a Fibre Channel configuration, the host's HBA is referred...
Question 31: What is the purpose of RAID?
Question 32: Which NetApp hardware product helps in performance optimizat...
Question 33: Which anon option provides every user with root access to th...
Question 34: Which two are Data ONTAP commands for gathering performance ...
Question 35: What does the SnapProtect "Primary (Classic) copy" of the su...
Question 36: Which 3 FAS deduplication features were added in ONTAP 7.3?...
Question 37: What are two functions of the Flash Translation Layer? (Choo...
Question 38: Which term do you use to highlight that a storage administra...
Question 39: Which command will show the FCP target(s) on a storage syste...
Question 40: 27. If a volume contains multiple RAID 4 groups, you could h...
Question 41: FC architecture supports which three topologies? (Choose thr...
Question 42: Which type of Flash memory has high endurance, high performa...
Question 43: DRAG DROP Match each term with its definition. Select and Pl...
Question 44: Which three statements about System Manager are TRUE? (Choos...
Question 45: Which set of commands should be used for troubleshooting Eth...
Question 46: Which command is used to set the configuration of an Etherne...
Question 47: Which NetApp storage-efficiency technology enables storage t...
Question 48: To view per client NFS statistics on a storage system, the o...
Question 49: Which file contains the information on where to look for hos...
Question 50: Which storage system command would display the WWPNs of host...
Question 51: Which Data ONTAP command do you use to identify logged in FC...
Question 52: In Data ONTAP, both the Microsoft Windows Administrator and ...
Question 53: Which two statements about hard and soft zoning are correct?...
Question 54: If a volume is full (because of Snapshot copies, active file...
Question 55: When does a consistency point (CP) flush to disk occur? (Cho...
Question 56: A storage administrator creates two volumes, vol1 located in...
Question 57: Which flash deployment is ideal for environments that need e...
Question 58: Which two statements are TRUE with regard to Snapshot copies...
Question 59: File locking for a CIFS client is __________....
Question 60: You use junctions to join volumes to what?...
Question 61: What are the three major components of enterprise flash devi...
Question 62: Which Flash parameter identifies block erase candidates thro...
Question 63: John is a windows user attempting to access a volume or qtre...
Question 64: There are 16 SAS disks available for creating the aggregate;...
Question 65: Which three commands would help you troubleshoot a LUN that ...
Question 66: What command would create a LUN clone named lun0.clone from ...
Question 67: You create a volume named "vol2" in a data SVM named svm2. Y...
Question 68: Which set of protocols provide block-level access to NetApp ...
Question 69: Which exportfs command will temporarily export the resource ...
Question 70: Executing this command will have what effect? options wafl.d...
Question 71: If an aggregate contains multiple RAID DP groups, three disk...
Question 72: You receive an error message from an iSCSI host stating ther...
Question 73: When viewing the output of the sysstat -f 1 command, which t...
Question 74: Consider three volumes eng_projects, hr_projects and vol1, t...
Question 75: Clustered Data ONTAP supports ALUA with which protocols?...
Question 76: The super user receives an "Access Denied" message when he a...
Question 77: Cloud Resources are built specifically for an entity (group,...
Question 78: To automatically export volumes and directories on reboot, i...
Question 79: In an aggregate using a RAID-DP raid group, what is the mini...
Question 80: Which statement best describes NAS?...
Question 81: If the security style is set to UNIX, CIFS client file acces...
Question 82: Which process statement accurately describes the functionali...
Question 83: Which two commands on the storage system allow you to gather...
Question 84: The Data ONTAP FlexVol feature allows administrators to do w...
Question 85: Which four authentication options (types) are supported by t...
Question 86: What is the function of initiator groups?...
Question 87: Which NFS resources can be exported?...
Question 88: Which technology natively enables block-level access by a ho...
Question 89: CIFS SMB 2.0 is a stateful protocol. What maintains a histor...
Question 90: Which two parameters influence Solid State Disk (SSD) perfor...
Question 91: Which data-protection product can restore an entire volume i...
Question 92: You are having problems accessing three recently-created LUN...
Question 93: Which three items are NFS resources for export? (Choose thre...
Question 94: To configure a storage system as a member of a Windows activ...
Question 95: Starting with Data ONTAP 7.3.1, support for SMB 2.0 in Windo...
Question 96: Which mechanism controls access to the volumes displayed in ...
Question 97: Which command shares out the directory /vol/vol2/home using ...
Question 98: Which two commands can be used to enable LUN reservations? (...
Question 99: Which is NOT a Data ONTAP 7-Mode feature?...
Question 100: Which iSCSI security method encrypts data between the initia...
Question 101: What are three characteristics of NetApp NAS systems? (Choos...
Question 102: When using SnapRestore to restore a single LUN, the LUN must...
Question 103: Which two conditions might cause a user to receive a disk fu...
Question 104: Which two are functions of multipathing software? (Choose tw...
Question 105: Which two operations can be performed with the SnapDrive for...
Question 106: Which user has the default access to the system shell in clu...
Question 107: Which option should be used with the nfsstat command to assi...
Question 108: Which three statements apply to an entry in the /etc/exports...
Question 109: DRAG DROP Match the configuration file with its purpose. Sel...
Question 110: ____________ is the default cfmode for new installations of ...
Question 111: An iSCSI or FC SAN implementation provides what type access ...
Question 112: What will happen if a soft quota is exceeded?...
Question 113: Why does Data ONTAP save data in NVRAM memory prior to savin...
Question 114: Which secure multi-tenancy feature is unique to Data ONTAP C...
Question 115: Before running lun setup on the storage system, you must fir...
Question 116: What is FlexArray?
Question 117: Which items should you consider when you migrate data from D...
Question 118: Which three are used for creating LUNs on a storage system? ...
Question 119: What are three characteristics of a logical interface (UF)?...
Question 120: Which three are valid commands to be used with LUNs?...
Question 121: Which two are benefits of storage virtualization? (Choose tw...
Question 122: Which two statements about aggregates are TRUE? (Choose two....
Question 123: Which NetAPP storage efficiency technology provides an extra...
Question 124: Data ONTAP can be organized into what?...
Question 125: What are the ABCs of the NetApp Big Data solution?...
Question 126: One key attribute of Data ONTAP is unified storage architect...
Question 127: What is server virtualization?
Question 128: iSCSI Node names have which two forms? (Choose two)...
Question 129: Two alternatives to guaranteeing LUN space reservations duri...
Question 130: NTFS allows file access based on ___________....
Question 131: Which Cloud delivery model abstracts the underlying infrastr...
Question 132: What are two characteristics of NAS? (Choose two.)...
Question 133: Which two statements are TRUE of moving a volume? (Choose tw...
Question 134: What mechanism allows you to make LUNs available to some ini...
Question 135: An iSCSI or FC SAN implementation provides _____ access to L...
Question 136: To access a share from a CIFs client, what parameters are co...
Question 137: To determine if a problem you are experiencing is known to N...
Question 138: What is the main purpose of fractional reserve in SAN Enviro...
Question 139: Which data-protection product is designed for disaster recov...
Question 140: UNIX allows file access based on __________....
Question 141: Which statement is NOT true if the /etc/exports file contain...
Question 142: Which entry in this /etc/quotas file for a qtree on /vol/wmv...
Question 143: Physical Reallocation of a SnapMirror source volume increase...
Question 144: When you create UNIX security style volumes, which two state...
Question 145: NetApp file services solution involves which two protocols? ...
Question 146: A quota target can be applied to _______________....
Question 147: These are three methods of creating a LUN: lun setup (Exhibi...
Question 148: When running deduplication on SnapVault destinations, which ...
Question 149: Cfmode is a(n) ____________-specific setting in an active/ac...
Question 150: What is the purpose of the /etc/nsswitch.conf file?...