<< Prev Question Next Question >>

Question 140/150

UNIX allows file access based on __________.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (150q)
Question 1: How is a FlexClone volume different than a snapshot?...
Question 2: Which command allows you to set the permissions for a share ...
Question 3: Which three Clustered Data ONTAP objects that are "owned" by...
Question 4: If you have a space-reserved, completely full 600G LUN with ...
Question 5: When you create a new volume, Data ONTAP automatically assig...
Question 6: Which three can coexist on a NetApp storage system? (Choose ...
Question 7: In Data ONTAP the root user is exempt from these two quotas:...
Question 8: Which command can you use to add exports to the /etc/exports...
Question 9: Which Clustered Data ONTAP logical component handles storage...
Question 10: Which command on the storage system allows you to collect st...
Question 11: What is the definition of the cifs setup command?...
Question 12: When a client navigates through a junction, the client has e...
Question 13: Cloud Consumers Can provision and manage servers, system and...
Question 14: Which command displays the statistics for Ethernet network i...
Question 15: Which two statements are TRUE about Data ONTAP operating in ...
Question 16: When WAFL (Write Anywhere File Layout) flushes data to disk,...
Question 17: In a traditional SAN environment, which device owns the file...
Question 18: If you change the setting for the option cifs.neg_buf_size, ...
Question 19: What are 3 true statements about physical reallocation of da...
Question 20: CIFS clients can resolve symbolic links created by NFS clien...
Question 21: Which NetApp technology can create multiple virtual controll...
Question 22: Which command would you use to verify that the iSCSI service...
Question 23: What are three advantages of NAS? (Choose three.)...
Question 24: Which will enable "symlink_strict_security"?...
Question 25: One of the steps while configuring CIFS protocol on an SVM u...
Question 26: Which NetApp solution is pre-validated and includes storage,...
Question 27: How are iSCSI Initiators commonly implemented?...
Question 28: You wish to export /vol/vol1/data so that any NFS client may...
Question 29: When creating a flexible volume, which attribute determines ...
Question 30: In a Fibre Channel configuration, the host's HBA is referred...
Question 31: What is the purpose of RAID?
Question 32: Which NetApp hardware product helps in performance optimizat...
Question 33: Which anon option provides every user with root access to th...
Question 34: Which two are Data ONTAP commands for gathering performance ...
Question 35: What does the SnapProtect "Primary (Classic) copy" of the su...
Question 36: Which 3 FAS deduplication features were added in ONTAP 7.3?...
Question 37: What are two functions of the Flash Translation Layer? (Choo...
Question 38: Which term do you use to highlight that a storage administra...
Question 39: Which command will show the FCP target(s) on a storage syste...
Question 40: 27. If a volume contains multiple RAID 4 groups, you could h...
Question 41: FC architecture supports which three topologies? (Choose thr...
Question 42: Which type of Flash memory has high endurance, high performa...
Question 43: DRAG DROP Match each term with its definition. Select and Pl...
Question 44: Which three statements about System Manager are TRUE? (Choos...
Question 45: Which set of commands should be used for troubleshooting Eth...
Question 46: Which command is used to set the configuration of an Etherne...
Question 47: Which NetApp storage-efficiency technology enables storage t...
Question 48: To view per client NFS statistics on a storage system, the o...
Question 49: Which file contains the information on where to look for hos...
Question 50: Which storage system command would display the WWPNs of host...
Question 51: Which Data ONTAP command do you use to identify logged in FC...
Question 52: In Data ONTAP, both the Microsoft Windows Administrator and ...
Question 53: Which two statements about hard and soft zoning are correct?...
Question 54: If a volume is full (because of Snapshot copies, active file...
Question 55: When does a consistency point (CP) flush to disk occur? (Cho...
Question 56: A storage administrator creates two volumes, vol1 located in...
Question 57: Which flash deployment is ideal for environments that need e...
Question 58: Which two statements are TRUE with regard to Snapshot copies...
Question 59: File locking for a CIFS client is __________....
Question 60: You use junctions to join volumes to what?...
Question 61: What are the three major components of enterprise flash devi...
Question 62: Which Flash parameter identifies block erase candidates thro...
Question 63: John is a windows user attempting to access a volume or qtre...
Question 64: There are 16 SAS disks available for creating the aggregate;...
Question 65: Which three commands would help you troubleshoot a LUN that ...
Question 66: What command would create a LUN clone named lun0.clone from ...
Question 67: You create a volume named "vol2" in a data SVM named svm2. Y...
Question 68: Which set of protocols provide block-level access to NetApp ...
Question 69: Which exportfs command will temporarily export the resource ...
Question 70: Executing this command will have what effect? options wafl.d...
Question 71: If an aggregate contains multiple RAID DP groups, three disk...
Question 72: You receive an error message from an iSCSI host stating ther...
Question 73: When viewing the output of the sysstat -f 1 command, which t...
Question 74: Consider three volumes eng_projects, hr_projects and vol1, t...
Question 75: Clustered Data ONTAP supports ALUA with which protocols?...
Question 76: The super user receives an "Access Denied" message when he a...
Question 77: Cloud Resources are built specifically for an entity (group,...
Question 78: To automatically export volumes and directories on reboot, i...
Question 79: In an aggregate using a RAID-DP raid group, what is the mini...
Question 80: Which statement best describes NAS?...
Question 81: If the security style is set to UNIX, CIFS client file acces...
Question 82: Which process statement accurately describes the functionali...
Question 83: Which two commands on the storage system allow you to gather...
Question 84: The Data ONTAP FlexVol feature allows administrators to do w...
Question 85: Which four authentication options (types) are supported by t...
Question 86: What is the function of initiator groups?...
Question 87: Which NFS resources can be exported?...
Question 88: Which technology natively enables block-level access by a ho...
Question 89: CIFS SMB 2.0 is a stateful protocol. What maintains a histor...
Question 90: Which two parameters influence Solid State Disk (SSD) perfor...
Question 91: Which data-protection product can restore an entire volume i...
Question 92: You are having problems accessing three recently-created LUN...
Question 93: Which three items are NFS resources for export? (Choose thre...
Question 94: To configure a storage system as a member of a Windows activ...
Question 95: Starting with Data ONTAP 7.3.1, support for SMB 2.0 in Windo...
Question 96: Which mechanism controls access to the volumes displayed in ...
Question 97: Which command shares out the directory /vol/vol2/home using ...
Question 98: Which two commands can be used to enable LUN reservations? (...
Question 99: Which is NOT a Data ONTAP 7-Mode feature?...
Question 100: Which iSCSI security method encrypts data between the initia...
Question 101: What are three characteristics of NetApp NAS systems? (Choos...
Question 102: When using SnapRestore to restore a single LUN, the LUN must...
Question 103: Which two conditions might cause a user to receive a disk fu...
Question 104: Which two are functions of multipathing software? (Choose tw...
Question 105: Which two operations can be performed with the SnapDrive for...
Question 106: Which user has the default access to the system shell in clu...
Question 107: Which option should be used with the nfsstat command to assi...
Question 108: Which three statements apply to an entry in the /etc/exports...
Question 109: DRAG DROP Match the configuration file with its purpose. Sel...
Question 110: ____________ is the default cfmode for new installations of ...
Question 111: An iSCSI or FC SAN implementation provides what type access ...
Question 112: What will happen if a soft quota is exceeded?...
Question 113: Why does Data ONTAP save data in NVRAM memory prior to savin...
Question 114: Which secure multi-tenancy feature is unique to Data ONTAP C...
Question 115: Before running lun setup on the storage system, you must fir...
Question 116: What is FlexArray?
Question 117: Which items should you consider when you migrate data from D...
Question 118: Which three are used for creating LUNs on a storage system? ...
Question 119: What are three characteristics of a logical interface (UF)?...
Question 120: Which three are valid commands to be used with LUNs?...
Question 121: Which two are benefits of storage virtualization? (Choose tw...
Question 122: Which two statements about aggregates are TRUE? (Choose two....
Question 123: Which NetAPP storage efficiency technology provides an extra...
Question 124: Data ONTAP can be organized into what?...
Question 125: What are the ABCs of the NetApp Big Data solution?...
Question 126: One key attribute of Data ONTAP is unified storage architect...
Question 127: What is server virtualization?
Question 128: iSCSI Node names have which two forms? (Choose two)...
Question 129: Two alternatives to guaranteeing LUN space reservations duri...
Question 130: NTFS allows file access based on ___________....
Question 131: Which Cloud delivery model abstracts the underlying infrastr...
Question 132: What are two characteristics of NAS? (Choose two.)...
Question 133: Which two statements are TRUE of moving a volume? (Choose tw...
Question 134: What mechanism allows you to make LUNs available to some ini...
Question 135: An iSCSI or FC SAN implementation provides _____ access to L...
Question 136: To access a share from a CIFs client, what parameters are co...
Question 137: To determine if a problem you are experiencing is known to N...
Question 138: What is the main purpose of fractional reserve in SAN Enviro...
Question 139: Which data-protection product is designed for disaster recov...
Question 140: UNIX allows file access based on __________....
Question 141: Which statement is NOT true if the /etc/exports file contain...
Question 142: Which entry in this /etc/quotas file for a qtree on /vol/wmv...
Question 143: Physical Reallocation of a SnapMirror source volume increase...
Question 144: When you create UNIX security style volumes, which two state...
Question 145: NetApp file services solution involves which two protocols? ...
Question 146: A quota target can be applied to _______________....
Question 147: These are three methods of creating a LUN: lun setup (Exhibi...
Question 148: When running deduplication on SnapVault destinations, which ...
Question 149: Cfmode is a(n) ____________-specific setting in an active/ac...
Question 150: What is the purpose of the /etc/nsswitch.conf file?...