Click the Exhibit button.
An export policy rule for a volume is set by using the command shown in the exhibit.
If clients with IP addresses 10.64.19.0 and 10.64.18.20 accessed the export, what is the outcome?
A. Neither client is given access.
B. Client 10.64.19.0 is given access but 10.64.18.20 is not given access.
C. Client 10.64.19.0 is not given access but 10.64.18.20 is given access.
D. Both clients are given access.
Click the Exhibit button.
You execute the cluster1::> network ipspace show command, and notice that two IPspaces are not able to
be renamed or deleted.
Referring to the exhibit, what are these two IPspaces? (Choose two.)
A. IPspace1
B. Default
C. IPspace2
D. Cluster
An administrator forgot to update the cabling sheet for a core Cisco switch and cannot recall which ports
were used by the NetApp FAS system.
Which command should the administrator run to obtain this information?
A. network port show
B. network device-discovery show
C. network interface show
D. network port broadcast-domain show
An administrator enabled the iSCSI protocol on an SVM and created a LUN for a Windows 2016 system.
After a rescan, the LUN is not visible on the host.
In this scenario, which two statements describe what the administrator must do to solve this problem?
(Choose two.)
A. Create an initiator group (igroup), add the iSCSI IQN, and map the igroup to the LUN.
B. Create an initiator group (igroup), add the WWPN of the host initiator, and then map the igroup to the LUN.
C. Disable the ALUA support from the host for the LUN.
D. Configure the iSCSI service on the Windows 2016 system.
Which three actions would be used to upload an image or firmware for ONTAP 9.3? (Choose three.)
A. Use TFTP.
B. Use USB.
C. Use HTTP.
D. Use FTP.
E. Use SFTP.
You must create separate SVMs that are based on teams. You also need to create separate SVMs that
are based on the block-level and file-level protocols. Your DevOps team requests NFS and CIFS protocols,
your AI team requests NFS and NVMe protocols, and your marketing team requests SMB and iSCSI
protocols.
In this scenario, what is the minimum number of SVMs that you must create to satisfy these requirements?
A. 3
B. 5
C. 6
D. 4
What is the purpose of Epsilon?
A. to monitor cluster health
B. to be used as a load-balancer for a 2-node cluster
C. to evaluate the differences in node configurations
D. to be used as a tie-breaker for a cluster quorum
You are running a FAS8200 system with ONTAP 9.5 with a Flash Pool aggregate. You have an SVM root
volume and two volumes (Vol1 and Vol2).
In this scenario, which two caching technologies would be applied to which volumes? (Choose two.)
A. Flash Pool can be applied to all volumes including the SVM root volume.
B. FlashCache can be applied to all volumes including the SVM root volume.
C. Flash Pool can be applied to all volumes except the SVM root volume.
D. FlashCache can be applied to all volumes except the SVM root volume.
You have configured SVM Disaster Recovery on your cluster, and you set the identity-preserve option to
false.
In this scenario, which objects are replicated?
A. SAN LIFs
B. NFS Export policies
C. DNS and DNS hosts
D. Snapshot copies
A storage administrator currently has an 8-node FAS8200 cluster with CIFS, NFS, and iSCSI licenses
installed.
In this scenario, how many additional nodes are supported?
A. 3
B. 6
C. 4
D. 1