To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some questions:
Q
A customer wants to enable CHAP authentication on their iSCSI sessions.
Which command should be used to set up the appropriate security policies and passwords?
A. vserver iscsi security create
B. igroup initiator modify
C. security certificate create
D. security login create
Q
Which two steps must be taken first to restore a LUN from a SnapMirror Synchronous destination? (Choose two.)
A. Resync the relationship.
B. Release the relationship.
C. Delete the relationship.
D. Initialize the relationship.
Q
An administrator configured an SVM with LUNs with two WWPNs per node. The administrator accidentally created a WWPN on node1 that needs to move to node2. The SAN hosts use ALUA.
Based on this requirement, what must be taken offline to correct the situation?
A. LIF
B. LUN
C. SVM
D. Volume
Q
A customer Is setting up a four-node NetApp AFF cluster for use with NVMe/TCP and wants to use automatic host discovery.
Which protocol is used for the discovery of controllers?
A. TFTP
B. mDNS
C. LLDP
D. PXE
Q
Which NetApp feature presents LUNs only within the HA pair?
A. Selective LUN Mapping
B. Subsystem
C. Consistency group
D. igroup
Q
During expansion planning for a 10-node cluster running NetApp ONTAP 9.14.1 software, which uses SAN and NAS, how many additional nodes can be added to this cluster?
A. 4
B. 6
C. 2
D. 8
Q
A four-node NetApp ONTAP SAN cluster has been deployed. After installation, the engineer wants to verify cabling.
Which NetApp tool should the engineer use?
A. NetApp Host Utilities package
B. Active IQ Config Advisor
C. Interoperability Matrix Tool
D. Hardware Universe
…………….