<< Prev Question Next Question >>

Question 31/37

An administrator encountered a ransomware attack that affected the active file system data. They have
been creating Snapshot copies on an hourly schedule. They determine that the entire volume needs to be
recovered.
In this scenario, which command would you use?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (37q)
Question 1: You have a 2-node NetApp cluster with CIFS volumes and SAN L...
Question 2: An SVM is configured to authenticate SVM administrators with...
Question 3: You want to asynchronously replicate an SVM's volumes and co...
Question 4: The vsadmin account for SVM vs1 is unlocked and configured w...
Question 5: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 6: You are configuring replication between two NetApp clusters....
Question 7: Which three configurations does ONTAP Select support? (Choos...
Question 8: You want to configure Active Directory authentication for a ...
Question 9: When a cluster is created, which two objects are required to...
Question 10: A storage administrator has a Linux Oracle database that is ...
Question 11: Click the Exhibit button. (Exhibit) You need to create a 200...
Question 12: A cluster is running ONTAP 9.3. You create a SnapMirror rela...
Question 13: Click the Exhibit button. (Exhibit) A storage administrator ...
Question 14: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 15: Click the Exhibit button. (Exhibit) You use the commands sho...
Question 16: Which NetApp tool is used to perform a configuration validat...
Question 17: You want to configure a local cluster to accept SnapMirror t...
Question 18: You create a Snapshot copy of a new volume. Which activity i...
1 commentQuestion 19: You want e-mail notifications sent to you automatically when...
Question 20: There is a node in your cluster that needs to be halted to r...
Question 21: What is the minimum number of disks required to create a RAI...
Question 22: Where would a cluster administrator move a FlexVol volume us...
Question 23: You have a RAID-DP aggregate with 42x 4 TB NL-SAS drives. Th...
Question 24: On which two types of ports would data LIFs be hosted?...
Question 25: Click the Exhibit button. (Exhibit) According to NetApp best...
Question 26: A customer requires that their data is fully protected from ...
Question 27: Click the Exhibit button. (Exhibit) Assuming that the export...
Question 28: Where would you look to find the minimum and the maximum num...
Question 29: Click the Exhibit button. (Exhibit) If you change the aggr1 ...
Question 30: Which three objects are restorable from a FlexVol Snapshot c...
Question 31: An administrator encountered a ransomware attack that affect...
Question 32: You use the Automated Workload Analyzer (AWA) to identify wo...
Question 33: Click the Exhibit button. (Exhibit) Referring to the exhibit...
Question 34: You complete an installation of a FAS8200 that has two separ...
Question 35: You have an 8-node cluster and need to test a ping to all cl...
Question 36: A customer wants to add nodes to an 8-node AFF A700 NAS clus...
Question 37: You configure a new LUN on a NetApp cluster, and you can suc...