Which two will allow you to read and analyze a packet trace file generated by the storage system? (Choose two)
A. WireShark
B. Pktt
C. Netmon
D. Eternal View
When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)
A. The source volume must be offline.
B. SnapMirror must be licensed for each storage system.
C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.
D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source destination volume.
You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?
A. snapmirror restart
B. snapmirror resume
C. snapmirror resync
D. snapmirror update
A NearStore license increases the amount of concurrent replication streams.
A. True
B. False
Which system is recommended as a secondary system for SnapVault?
A. IS1200
B. DataFort
C. NearStore VTL
D. FAS with NearStore license
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
A. disk own -s
B. disk show -v
C. vol status -r
D. disk display r
In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity of the ________.
A. local interfaces only
B. failed partner interfaces only
C. local and failed partner interfaces
D. interfaces as defined in the /etc/rc file
A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plex was built. Data ONTAP will __________.
A. halt all operations to volumes in that pool
B. choose spare disks to reconstruct from the opposite pool
C. warn you that there are no available spares from the proper pool
D. "halt" after 24 hours if spare disks are not added to the proper pool
You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is ________.
A. in a giveback mode
B. fenced off manually
C. powered on and accessible
D. powered off and inaccessible
You receive an error message from an iSCSI host stating that there is an authentication error. Which command would troubleshoot the failure?
A. iscsi security show
B. iscsi security generate
C. iscsi show authentication
D. iscsi security authentication