network- · pdf fileyou want to replace the key management passphrase of a fas8200 system...

43
http://www.gratisexam.com/ NS0-158 Number : NS0-158 Passing Score : 800 Time Limit : 120 min File Version : 1.0 http://www.gratisexam.com/ NS0-158 NetApp Certified Data Administrator, ONTAP Version 1.0

Upload: buidan

Post on 06-Mar-2018

242 views

Category:

Documents


11 download

TRANSCRIPT

Page 1: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

NS0-158

Number: NS0-158Passing Score: 800Time Limit: 120 minFile Version: 1.0

http://www.gratisexam.com/

NS0-158

NetApp Certified Data Administrator, ONTAP

Version 1.0

Page 2: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Экзамен A

QUESTION 1Click the Exhibit button.

You create a volume as shown in the exhibit.

Which statement about the new volume is true?

http://www.gratisexam.com/

A. A FlexVol volume is created on the aggregate (sas_01 or sas_02) with the most free space.

B. A FlexVol volume is created on aggregate sas_01 can only be moved to aggregate sas_02.

C. A FlexGroup volume is created with eight constituents.

D. A FlexGroup volume is created with two constituents

Correct Answer: DSection: (none)Explanation

Explanation/Reference:The Volume create parameter -aggr-list <aggregate name>, ... - List of Aggregates for FlexGroup ConstituentsSpecifies an array of names of aggregates to be used for FlexGroup constituents. Each entry in the list will create a constituent on the specified aggregate.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.dot-cm-cmpr-910%2Fvolume__create.html

QUESTION 2Which two features are supported by SnapLock Enterprise but not by SnapLock Compliance? (Choose two.)

A. FlexArray

B. privileged delete

C. NetApp Volume Encryption (NVE)

Page 3: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

D. SnapMirror

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Features supported by SnapLock Enterprise but not by SnapLock Compliance include:

Permission for the system administrator to selectively delete the files (that are not expired) with the privileged delete featureSnapMirror resynchronize support for the destination volume

Note:Comparison table of SnapLock Enterprise and SnapLock ComplianceThe SnapLock Enterprise and the SnapLock Compliance features differ in terms of the options and permissions available for both the features.

Page 4: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

References: https://library.netapp.com/ecmdocs/ECMP1368820/html/GUID-9E05FE59-BF40-4C22-AD4D-ACBCB552D9A0.html

QUESTION 3What is the minimum number of disks required to create a data aggregate with a RAID type of RAID-TEC?

Page 5: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

A. 7

B. 6

C. 5

D. 4

Correct Answer: BSection: (none)Explanation

Explanation/Reference:The aggregate that is to be converted to RAID-TEC must have a minimum of six disks.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.dot-cm-psmg%2FGUID-E63A0CB2-10B6-4998-AE34-10A5F8998361.html

QUESTION 4Which LIF role type is used by a volume move operation between nodes?

A. data

B. cluster

C. intercluster

D. cluster-mgmt

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 5Which two link layer discovery protocols does NetApp ONTAP support? (Choose two.)

http://www.gratisexam.com/

Page 6: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

A. Link Layer Topology Discovery Protocol

B. Cisco Discovery Protocol

C. Link Layer Discovery Protocol

D. Foundry Discovery Protocol

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Data ONTAP supports two neighbor discovery protocols: Cisco Discovery Protocol (CDP), and starting in ONTAP 9.0, Link Layer Discovery Protocol (LLDP).

References: ONTAP 9. 0 Network_Management_Guide (January 2017), page 93https://library.netapp.com/ecm/ecm_download_file/ECMLP2492610

QUESTION 6You have a 2-node NetApp cluster. You would like to use an onboard UTA2 port for host connectivity. The port was previously connected to a tape library usingnative FC.

What must you do to configure the port for host connectivity?

A. Change the port mode to FC.

B. Change the port mode to CNA.

C. Change the FC type to initiator.

D. Change the FC type to target.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Certain converged network adapters (CNAs), such as the X1143 adapter and the UTA2 onboard ports, contain offload support for LLDP.

References: ONTAP 9. 0 Network_Management_Guide (January 2017), page 98https://library.netapp.com/ecm/ecm_download_file/ECMLP2492610

QUESTION 7You want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage Encryption (NSE).

Which action accomplishes this task?

Page 7: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

A. Perform a takeover-giveback of each node in the cluster to update the passphrase on each mode.

B. Use the security key-manager setup command to change the passphrase.

C. Use the volume move command to migrate a volume and update the passphrase during the move.

D. Use the security key-manager update-passphrase command to change the passphrase.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:You can use the security key-manager update-passphrase command to change the onboard key management passphrase.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.pow-nve%2FGUID-ED1579E4-8C57-4BD5-89E3-5FB7308F9D4E.html

QUESTION 8Click the Exhibit button.

Referring to the exhibit, which two statements about the connectivity from the 2-node cluster to the cluster interconnects are true? (Choose two.)

A. The CN1610 switches were discovered by using Cisco CDP.

B. The nodes are cabled correctly.

C. The nodes are cabled incorrectly.

D. The CN1610 switches were discovered by using LLDP.

Page 8: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:From the exhibit we see that cdp is used.

Cabling the private cluster interconnect for NetApp CN1610 switches.Steps1. Using a supplied 10 GbE copper cable, connect port e1a of the first storage controller to port 1 of the top cluster switch.2. Connect port e2a of the first storage controller to port 1 of the bottom cluster switch.3. Repeat for the other storage controllers in the cluster.4. Connect the second controller to port 2 of each switch, the third controller to port 3, and so on.

References: https://library.netapp.com/ecmdocs/ECMP1197116/html/GUID-3F4B53E3-C5D4-40D8-ABF3-4FD8AFD6D10D.html

QUESTION 9Click the exhibit button.

You have a 2-node cluster named cl1 that has separate LIFs on each node for both SAN and NAS traffic. A storage failover takeover process is initiated as shown inthe exhibit.

In this scenario, which two statements about the takeover process are true? (Choose two.)

A. The SAN LIFs on cl1-01 go offline.

B. The NAS LIFs on cl1-01 automatically migrate to cl1-02.

C. The NAS LIFs on cl1-01 go offline.

D. The SAN LIFs on cl1-01 automatically migrate to cl1-02.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Storage failover takeover

Page 9: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

{ -ofnode {<nodename>|local} - Node to TakeoverThis specifies the node that is taken over. It is shut down and its partner takes over its storage.

References: https://library.netapp.com/ecmdocs/ECMP1196817/html/storage/failover/takeover.html

QUESTION 10Click the exhibit button.

Referring to the exhibit, which statement about the volume move process is true?

http://www.gratisexam.com/

A. Client access to the volume is blocked during this phase of operation.

B. The initial replication phase sent 39 MB from the source to the destination location.

C. Client access is being redirected to the destination location during this phase of the operation.

D. The cutover process failed and is in a holding pattern before being attempted again.

Correct Answer: BSection: (none)Explanation

Page 10: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Explanation/Reference:

QUESTION 11What are three causes of a storage failover partial giveback? (Choose three.)

A. iSCSI sessions are active.

B. AutoSupports are being generated.

C. NFSv3 mounts are active.

D. CIFS sessions are active.

E. SnapMirrors are running.

Correct Answer: BDESection: (none)Explanation

Explanation/Reference:When a giveback occurs, the storage will be once again homed to the owning node of the disks.However, this process can be vetoed in certain conditions, such as:

AutoSupports are being generatedCIFS sessions are activeSnapMirrors are runningStorage issues occur (such as failed disks)

References: https://kb.netapp.com/support/s/article/ka21A0000000daaQAA/what-does-partial-giveback-mean-in-clustered-data-ontap?language=en_US

QUESTION 12Click the Exhibit button.

Page 11: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

The size of the aggr1 RAID group shown in the exhibit is 8.

What is the RAID type?

A. RAID-TEC

B. RAID-DP

C. RAID4

D. RAID0

Correct Answer: BSection: (none)Explanation

Explanation/Reference:RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks.

Figure: Diagram of a RAID 6 setup, which is identical to RAID 5 other than the addition of a second parity block

Page 12: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Incorrect Answers:D: RAID0 does not use parity,

References: https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_6

QUESTION 13Which CLI command is used to move epsilon to a new node?

A. cluster modify

B. cluster identity modify

C. cluster setup

D. storage failover takeover

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Reassigning epsilon to another node in the cluster.Only one node in the cluster can hold epsilon. Epsilon gives the holding node an extra fractional voting weight in the quorum.

Steps1. If you are currently at the admin privilege level, set the privilege level to advanced by using the set command with the -privilege parameter.2. Remove epsilon from the node that holds it currently by using the cluster modify command with the -epsilon parameter set to false for the node.You can use the cluster show command with the -epsilon parameter to identify the node that holds epsilon currently.3. Assign epsilon to another node by using the cluster modify command with the -epsilon parameter set to true for the node.

References: https://library.netapp.com/ecmdocs/ECMP1196798/html/GUID-5FAA5445-0872-400B-B7AD-B27CEE3D770A.html

Page 13: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

QUESTION 14You just finished upgrading a cluster to ONTAP 9.1 and would like to enable NetApp Volume Encryption (NVE) on an existing volume. You do not have NetAppStorage Encryption (NSE) drives installed.

Which three steps would you take to accomplish this task? (Choose three.)

A. Replace drives with NSE drives.

B. Modify the volume options with the –encrypt true parameter.

C. Install the NVE license.

D. Execute the key manager setup wizard.

E. Perform volume move operation using the –encrypt-destination true parameter.

Correct Answer: CDESection: (none)Explanation

Explanation/Reference:You must install the NVE license and enable onboard key management before you can enable volume encryption. You can enable encryption on a new volume oron an existing volume.

You can use the volume move start command to enable encryption on an existing volume. You can use the same aggregate or a different aggregate.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.pow-nve%2FGUID-EAD13D8E-0219-45B6-A2C6-B25B76C9CA1A.html

QUESTION 15You have a cluster of FAS controllers with HDD aggregates. The data is being compressed into 32 KB blocks before being written to a volume.

In this scenario, which type of compression is being used?

A. secondary, inline compression

B. adaptive, inline compression

C. adaptive, postprocess compression

D. secondary, postprocess compression

Correct Answer: ASection: (none)Explanation

Explanation/Reference:NetApp data compression reduces the physical capacity required to store data on storage systems by compressing data within a flexible volume (FlexVol volume)

Page 14: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

on primary, secondary, and archive storage. It compresses regular files, virtual local disks, and LUNs.

When NetApp data compression is configured for inline operation, data is compressed in memory before it is written to disk.

Incorrect Answers:C, D: Postprocess compression can compress both recently written data and data that existed on disk prior to enabling compression.

References: http://community.netapp.com/t5/Tech-OnTap-Articles/Back-to-Basics-Data-Compression/ta-p/86691

QUESTION 16Click the Exhibit button.

Referring to the exhibit, the write operations would be compacted into how many WAFL blocks?

A. 4

B. 2

C. 3

D. 5

Correct Answer: CSection: (none)Explanation

Explanation/Reference:4k is the block size that WAFL uses to write on each disk.

From the exhibit: 0.5 + 1 + 2 + 1.3 + 1 + 0.5 + 0.5 + 1 + 2 KB equals 9.8 KB, which would fit in 3 WAFL blocks.

References: http://community.netapp.com/t5/Network-Storage-Protocols-Discussions/WAFL-questions-blocks-and-stripes/td-p/31555

QUESTION 17Which command prompt is displayed when a cluster named cl1 is in Advanced privilege mode?

Page 15: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

http://www.gratisexam.com/

A. cl1::>

B. cl1::*>

C. cl1-01>

D. SP cl1-01>

Correct Answer: BSection: (none)Explanation

Explanation/Reference:The following example sets the privilege level to advanced and then to admin:

vs1::> set -privilege advancedWarning: These advanced commands are potentially dangerous; use them only when directed to do so by technical support.Do you wish to continue? (y or n): yvs1::*> set -privilege admin

References: https://library.netapp.com/ecmdocs/ECMP1196807/html/GUID-FBB48AE8-C74D-4472-A5CD-799D46ED2E85.html

QUESTION 18Click the Exhibit button.

Page 16: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

The maximum RAID group size of the RAID-DP aggr1 shown in the exhibit is 18. You expand the aggregate by 20 disks.

How many of the new disks are used for data?

A. 20

B. 16

C. 14

D. 18

Correct Answer: CSection: (none)Explanation

Explanation/Reference:RAID 6 extends RAID 5 by adding another parity block; thus, it uses block-level striping with two parity blocks distributed across all member disks.

Figure: Diagram of a RAID 6 setup, which is identical to RAID 5 other than the addition of a second parity block

Page 17: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Incorrect Answers:D: RAID0 does not use parity,

References: https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_6

QUESTION 19Click the Exhibit button.

Which two data protection deployment configurations shown in the exhibit are supported? (Choose two.)

A. configuration D

B. configuration C

C. configuration A

Page 18: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

D. configuration B

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:You can use SnapVault to protect a volume SnapMirror destination. You can perform SnapVault transfers from the volume SnapMirror destination when you want toretain the data for a longer period.

References: https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-CD48796E-5FD1-4C2E-B0B2-5773B1A6203C.html

QUESTION 20Click the Exhibit button.

On the first LUN entry shown in the exhibit, a hyphen (-) appears under reporting-nodes.

What are two reasons why the hyphen appears? (Choose two.)

A. The hyphen indicates that no nodes are reporting paths to the LUN.

B. The hyphen indicates that all nodes are reporting paths to the LUN.

C. The hyphen is the default for SLM on LUNs create in ONTAP 8.3 and later.

D. The hyphen is the default for SLM on LUNs create before ONTAP 8.3.

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Verify that the LUN map contains four nodes by using the lun mapping show -fields reporting-nodes command.Examplecluster1::> lun mapping show -vserver SVM1 -volume vol1 -fields reporting-nodesvserver path igroup reporting-nodes

Page 19: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

-------- ----------- -------- ---------------------------------------------SVM1 /vol/vol1 ig1 cluster1-1,cluster1-2,cluster1-3,cluster1-4If the cluster contains only four nodes and all four are included as reporting-nodes, the reporting-nodes field displays a dash (-).

References: https://library.netapp.com/ecm/ecm_download_file/ECMP12425790

QUESTION 21You have a SnapLock Compliance volume that needs to be replicated to a different cluster at a disaster recovery site.

Which two statements concerning the SnapMirror destination volume are true? (Choose two.)

A. The destination volume type must be SnapLock Enterprise.

B. The destination volume type must be SnapLock Compliance.

C. The destination cluster does not require a SnapLock license.

D. The destination cluster requires a SnapLock license.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:B: To create an end-to-end relationship between SnapLock Compliance volumes by using SnapMirror, you need to create both the source and the destinationvolumes as SnapLock Compliance volumes and then initialize the mirroring relationship by using the snapmirror initialize command. The other commands you usediffer depending on whether you are creating a volume SnapMirror relationship for a traditional volume or a FlexVol volume.

D: A SnapLock license entitles you to use both SnapLock Compliance mode and SnapLock Enterprise mode. SnapLock licenses are issued on a per-node basis.You must install a license for each node that hosts a SnapLock aggregate.

References: https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-8ACE3CAB-D338-4AFC-A530-0D0FEC3B9F94.htmlhttps://library.netapp.com/ecm/ecm_download_file/ECMLP2507748

QUESTION 22What are three volume-level storage efficiency features of ONTAP? (Choose three.)

A. deswizzle

B. space reclamation

C. compaction

D. compression

E. deduplication

Page 20: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Correct Answer: ADESection: (none)Explanation

Explanation/Reference:DE: NetApp deduplication is an integral part of the NetApp Data ONTAP operating environment and the WAFL file system, which manages all data on NetAppstorage systems.

NetApp data compression, introduced in Data ONTAP 8.0.1, is highly complementary to deduplication.

A: Data within a FlexVol has both a logical location within the volume and a physical location within the containing aggregate. When reading data from a FlexVol, thephysical location of that data must be known to perform the read. Under normal circumstances, reads use a fast-path to translate a logical address into a physicaladdress. When SnapMirror transfers a FlexVol to a different aggregate, however, the relationship between logical and physical addresses is changed. Thedestination aggregate lays out the volume into different physical blocks. Immediately after the SnapMirror transfer, reads to the destination volume will use adifferent process to translate logical addresses into physical addresses. This slow-path is less efficient and may require an additional disk read to access a block ofdata. As soon as a FlexVol SnapMirror update finishes, the destination storage controller will launch a scanner to recreate the fast-path metadata. Once the scanfinishes, reads to the SnapMirror destination will use the normal fast-path. This process is known as deswizzling.

References: http://community.netapp.com/t5/Tech-OnTap-Articles/Back-to-Basics-Deduplication/ta-p/84888https://kb.netapp.com/support/s/article/ka21A0000000arxQAA/what-is-deswizzler-or-deswizzling?language=en_US

QUESTION 23You create a FlexVol volume to host files for a Windows-based application. The administrator of the application is a Windows user. The application does not supportfiles access by Linux users.

Which security style should you assign to the volume?

A. mixed

B. unified

C. NTFS

D. UNIX

Correct Answer: CSection: (none)Explanation

Explanation/Reference:You can manage NTFS file security and audit policies on Vservers with FlexVol volumes by using the CLI. This removes the need to use a remote client to managefile security.

References: https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-3D32772D-B4E8-4497-A7FA-D03BA58AF96E.html

Page 21: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

QUESTION 24Click the Exhibit button.

An administrator installed UTA2 PCIe cards into an existing FAS8200 HA pair. The new cards will be used for native FC traffic. The administrator wants to configurethe UTA2 ports for FC client access.

Referring to the exhibit, which two actions address the requirement? (Choose two.)

A. Use the network fcp adapter modify command to bring the adapter online.

B. Reboot the node to bring the adapter online after final configuration.

C. Use the system hardware unified-connect command to verify that the port mode is set to initiator.

D. Use the ucadmin modify command to set the adapter mode to FC.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:B: Ports must be converted in pairs, for example, 0c and 0d, after which, a reboot is required, and the ports must be brought back to the up state.

D: CNA ports can be configured into native Fibre Channel (FC) mode or CNA mode.

If the current configuration does not match the desired use (here we want to change from CNA mode to FC mode), enter the following commands to change theconfiguration as needed:system node hardware unified-connect modify -node node_name -adapter adapter_name -mode fc|cna -type target|initiator-mode is the personality type, fc or 10GbE cna.-type is the FC4 type, target or initiator.

References: https://library.netapp.com/ecmdocs/ECMP1151595/html/GUID-1D06A7C4-F354-4793-A331-68A2CD916084.html

QUESTION 25You have a read-only volume that needs protection within the cluster, but you do not have a SnapMirror license.

Page 22: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Which mirror type would you use to protect the volume?

A. DP

B. LS

C. TDP

D. XDP

Correct Answer: BSection: (none)Explanation

Explanation/Reference:A load-sharing mirror reduces the network traffic to a FlexVol volume by providing additional read-only access to clients. You can create and manage load-sharingmirrors to distribute read-only traffic away from a FlexVol volume.

References: https://library.netapp.com/ecmdocs/ECMP1368017/html/GUID-4931A901-D6D0-458B-8D3A-A92427FDD8B8.html

QUESTION 26An administrator enabled the iSCSI protocol on an SVM and created a LUN for a Windows 2016 system. After rescan, the LUN is not visible on the host.

Which two steps must the administrator take to solve this problem? (Choose two.)

http://www.gratisexam.com/

A. Create an initiator group (igroup), add the WWPN of the host initiator, and then map the igroup to the LUN.

B. Disable the ALUA support from the host for the LUN.

C. Configure the iSCSI service on the Windows 2016 system.

D. Create an initiator group (igroup), add the iSCSI IQN, and map the igroup to the LUN.

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:D: An iSCSI qualified name (IQN) identifier is a worldwide unique name that each iSCSI initiator and iSCSI target must have. The IQN for an iSCSI initiator isavailable in Microsoft iSCSI Software Initiator or other iSCSI initiators. Typically the IQN is used by the iSCSI target to identify the iSCSI initiator.

Page 23: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Incorrect Answers:A: A World Wide Port Name, WWPN, or WWpN, is a World Wide Name assigned to a port in a Fibre Channel fabric. Used on storage area networks, it performs afunction equivalent to the MAC address in Ethernet protocol, as it is supposed to be a unique identifier in the network.

B: Asymmetric Logical Unit Access (ALUA), also known as Target Port Groups Support (TPGS), is a set of SCSI concepts and commands that define pathprioritization for SCSI devices.

References: https://technet.microsoft.com/en-us/library/gg232633(v=ws.10).aspx

QUESTION 27Click the Exhibit button.

Page 24: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

After logging into an SVM using the vsadmin user account, you are able to see existing volumes, but are unable to create new volumes.

Referring to the configuration shown in the exhibit, what is the problem?

A. The vsadmin user is not assigned the correct application access.

B. No aggregates have been assigned to the SVM.

C. Aggregate SAS_01 is out of space.

D. The vsadmin role does not have the create volumes privilege.

Page 25: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 28Click the exhibit button.

Referring to the exhibit, you have a FlexGroup volume that is 250 TB with 10 constituents. You apply the volume modify –vserver fg1_vs –volume fg1 –size 350TB command.

What affect does the command have on the FlexGroup volume and its constituents?

A. It grows the FlexGroup volume to 600 TB by adding 14 new constituents.

B. It grows the FlexGroup volume to 350 TB by adding four new constituents

C. It grows the FlexGroup volume to 350 TB by increasing the size of each constituent to 35 TB.

D. It grows the FlexGroup volume to 600 TB by increasing the size of each constituent to 60 TB.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:If you want to add more space, you can increase the FlexGroup volume collective size.Increasing the size of the FlexGroup volume resizes the existing constituents of the FlexGroup.

Page 26: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

If you want to increase the capacity by resizing the existing constituents then use the command:volume modify -vserver vserver_name -volume fg_name -size new_size

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.pow-fg-mgmt%2FGUID-79766621-ECFF-4A1A-A218-197BB73E985B.html

QUESTION 29A customer has a 1,000 GB volume used as a NAS share that has 3x 100 GB files and has no existing Snapshot copies. The customer creates a Snapshot copy ofthe volume, adds a 500 Gb file to the volume, and then deletes one of the 100 GB files from the volume.

How much free space is in the volume in this scenario?

A. 500 GB

B. 200 GB

C. 300 GB

D. 600 GB

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Snapshot copies minimize disk consumption by preserving individual blocks rather than whole files. Snapshot copies begin to consume extra space only when filesin the active file system are changed or deleted. When this happens, the original file blocks are still preserved as part of one or more Snapshot copies.

Page 27: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

References: https://library.netapp.com/ecmdocs/ECMP1368826/html/GUID-CF9E77A6-BDD9-4138-A281-FC0E7BEA4C6D.html

QUESTION 30Which two features provide physical path resiliency from a Windows 2016 server to an iSCSI LUN on a 12-node ONTAP cluster? (Choose two.)

A. broadcast domains

B. MPIO

C. failover groups

D. ALUA

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:Microsoft Multipath I/O (MPIO) is a Microsoft-provided framework that allows storage providers to develop multipath solutions that contain the hardware-specificinformation needed to optimize connectivity with their storage arrays. These modules are called device-specific modules (DSMs). The concepts around DSMs arediscussed later in this document.

Page 28: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

MPIO is protocol-independent and can be used with Fibre Channel, Internet SCSI (iSCSI), and Serial Attached SCSI (SAS) interfaces in Windows Server.

Asymmetric Logical Unit Access (ALUA), also known as Target Port Groups Support (TPGS), is a set of SCSI concepts and commands that define pathprioritization for SCSI devices.

References: https://kb.netapp.com/support/s/article/ka21A0000000d32QAA/asymmetric-logical-unit-access-alua-support-on-netapp-storage-frequently-asked-questions?language=en_US

QUESTION 31Click the Exhibit button.

You manage a multi-tenant NetApp storage system. You start configuring an SVM for a new customer and receive the error shown in the exhibit when you attemptto create a LIF. You verify that the IP address is correct and that the customer LIF does not already exist. However, you see that another customer is using thesame IP address in their SVM.

How would you correct this problem?

A. Create a new VLAN for the new customer.

B. Create the LIF with a different IP address.

C. Create an IPspace for the new customer.

D. Create a broadcast domain for the new customer.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:The IPspace feature enables a single storage system to be accessed by clients from more than one disconnected network, even if those clients are using the sameIP address.

References: https://library.netapp.com/ecmdocs/ECMP1155585/html/GUID-4C8A392E-290E-4F9C-91E8-EBF3E2047B06.html

QUESTION 32NetApp ONTAP uses Snapshot copies for which two features? (Choose two.)

Page 29: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

A. cluster peering

B. FlexClones

C. FlexArray FLI

D. SMTape

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:You can create FlexClone files and FlexClone LUNs from an existing Snapshot copy of the parent files and parent LUNs contained in a FlexVol volume.

SMTape is a high performance disaster recovery solution from Data ONTAP that backs up blocks of data to tape. It is a Snapshot copy-based backup to tapefeature.

References:https://library.netapp.com/ecmdocs/ECMP1610211/html/GUID-24CDDAB0-0EC8-40C5-9422-00458EB70607.htmlhttps://library.netapp.com/ecmdocs/ECMP1368865/html/GUID-6C4C53F6-0543-45E1-B03A-891E60F6A109.html

QUESTION 33Click the Exhibit button.

While reviewing the port health shown in the exhibit, you notice that port e0c on node1 is degraded.

What would cause this problem?

A. The port is not plugged into a switch.

Page 30: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

B. The port is in the wrong broadcast domain.

C. The port does not have an IP address.

D. The port has been flapping.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:L2 reachability health monitor: Monitors whether all ports configured in the same broadcast domain have L2 reachability to each other.This health monitor reports L2 reachability issues in all IPspaces; however, it marks only the ports in the cluster IPspace as degraded.

Incorrect Answers:D: Link flapping is monitored by a separate health monitor.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.dot-cm-nmg%2FGUID-F5B26B93-3FE9-4C6D-97AF-BF742301AE57.html

QUESTION 34An administrator is designing an ONTAP solution that consists of eight FAS8200 nodes in a single cluster. Each node will use four ports for cluster connections.

Which cluster interconnect switch model should be used in this scenario?

A. Nexus 5596UP

B. Nexus 5010

C. CN1610

D. CN1601

Correct Answer: ASection: (none)Explanation

Explanation/Reference:The following cluster switches are supported: NetApp CN1610, Cisco Nexus 5596UP and 5596T.The cluster switches use the following Inter-Switch Link (ISL) ports:

Cisco Nexus 5596UP and 5596T: ports 41 through 48NetApp CN1610: ports 13 through 16

References: https://library.netapp.com/ecm/ecm_download_file/ECMP1140532

QUESTION 35

Page 31: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

What is an array LUN?

A. a LUN provisioned in ONTAP that is mounted by a connected host

B. a LUN provisioned on third-party storage that ONTAP will use as a passthrough LUN

C. a LUN that is used only as a part of a volume group

D. a LUN provisioned on third-party storage that ONTAP will use in a RAID group

Correct Answer: ASection: (none)Explanation

Explanation/Reference:The Data ONTAP software-based scheme provides ownership control only for storage systems running Data ONTAP; it does not prevent a different type of hostfrom overwriting data in an array LUN owned by a system running Data ONTAP. Therefore, if multiple hosts are accessing array LUNs through the same storagearray port, be sure to use LUN security on your storage array to prevent the systems from overwriting each other's array LUNs.

References: https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-D5079042-EA9A-4052-9B00-670B3728FFAA.html

QUESTION 36Click the Exhibit button.

Referring to the exhibit, which two statements are true? (Choose two.)

Page 32: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

http://www.gratisexam.com/

A. A default tree quota is set on volume svm1_data1.

B. An explicit quota is set on qtree1, and a derived quota is set on qtree2.

C. A derived quota is set on qtree1, and an explicit quota is set on qtree2.

D. A default user quota is set on volume svm1_data1.

Correct Answer: BDSection: (none)Explanation

Explanation/Reference:A quota enforced as a result of a default quota, rather than an explicit quota (a quota with a specific target), is referred to as a derived quota. To see derived quotas,you can generate a quota report. In the report, a derived user or group quota is indicated by a Quota Specifier that is either blank or an asterisk (*).A derived treequota, however, has a Quota Specifier; to identify a derived tree quota, you must look for a default tree quota on the volume with the same limits. Since they are notmanually configured quota rules, derived quotas do not appear in the output of the quota policy rule show command.

References: https://library.netapp.com/ecmdocs/ECMP1368017/html/GUID-C2CC0C07-9CB6-4891-BEB4-9EF87145DAA3.html

QUESTION 37What is a characteristic of a single-node cluster?

A. It only hosts a single SVM.

B. It does not have a node management LIF.

C. It does not have any cluster interconnect LIFs.

D. It is unsupported in a production environment.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Incorrect Answers:A, B: The following table lists the recommended number of SVMs in a cluster based on the number of LIFs configured:

Page 33: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

D: A single node cluster is a special implementation of a cluster running on a standalone node. You can deploy a single node cluster if your workload only requires asingle node, but does not need nondisruptive operations.

References: https://library.netapp.com/ecmdocs/ECMP1368701/html/GUID-425E17E6-B342-4AFC-A855-33CE5A998E2E.html

QUESTION 38A storage administrator wants to recover a file from a snapshot. The rest of the data in this volume should be preserved.

In this scenario, which command would you use?

A. volume snapshot compute-reclaimable

B. volume snapshot restore

C. volume snapshot rename

D. volume snapshot restore-file

Correct Answer: DSection: (none)Explanation

Explanation/Reference:The volume snapshot restore-file command enables you to restore a single file to a version saved in the Snapshot copy.

References: https://library.netapp.com/ecmdocs/ECMP1610202/html/volume/snapshot/restore-file.html

QUESTION 39Users report that they are unable to connect to home directories stored on a NetApp cluster. You are using Active Directory-based Kerberos authentication.

Which two actions would correct the problem? (Choose two.)

A. Verify that the CIFS server in running in the SVM.

Page 34: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

B. Verify that the Network Time Protocol service is in sync.

C. Verify that an Active Directory domain admin account is configured in ONTAP.

D. Verify that domain tunneling is configured in ONTAP.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Kerberized NFS in Cluster-Mode for use with Active Directory Pre-requisites include:

Domain admin access to a domain controller (for initial setup).vServer with data LIFs, NFS and CIFS servers created

Note: The CIFS server is not required for basic NFS Kerberos access, but is required for multiprotocol access or when using AD as an LDAP server for namemappings.

References: https://kb.netapp.com/support/s/article/ka31A0000000uYJQAY/how-to-set-up-kerberized-nfs-in-cluster-mode-with-active-directory?language=en_US

QUESTION 40Click the Exhibit button.

Page 35: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

You have a 2-node NetApp cluster. You perform a storage failover and notice that IP address 10.1.100.21 is unreachable while omegana1-01 is rebooting. Afteromegana1-01 is back online, the IP address becomes reachable again. However, IP address 10.1.100.20 was still reachable during the reboot. The commandsshown in the exhibit were executed before the storage failover.

In this scenario, why was IP address 10.1.100.21 unreachable?

A. The LIF for 10.1.100.21 has an incorrect failover setting.

B. The failover group for 10.1.100.21 is misconfigured.

C. The node management LIFs cannot fail over to other nodes.

D. The Address Resolution Protocol (ARP) cache needs to be cleared on the upstream switch.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 36: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

The purpose and the default behavior of a LIF is indicated by the role associated with that LIF. Each LIF is assigned a default failover group and failover policy whenyou create the LIF. These settings automatically configure the LIF with a list of failover targets from the ports available in the failover group, so you need tounderstand the relationship between LIF roles and failover groups.

References: https://library.netapp.com/ecm/ecm_get_file/ECMP1636021

QUESTION 41Click the Exhibit button.

An administrator has a 4-node FAS8200 cluster, as shown in the exhibit. A failover process is initiated to reboot node cl1-02.

Regarding storage failover giveback processes, which statement is true?

Page 37: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

A. During giveback, node cl1-01 simultaneously returns ownership of both root and data aggregates to cl1-02.

B. During giveback, node cl1-01 returns ownership of all aggregates to cl1-02, before reverting the data LIFs back to the home ports.

C. During giveback, node cl1-01 returns ownership of the root aggregate to cl1-02 before returning ownership of the data aggregates.

D. During giveback, node cl1-01 moves ownership of the root aggregate to cl1-04 and ownership of the data aggregates to cl1-04.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:The following process takes place in a normal giveback. In this discussion, node A has taken over node B. Any issues on Node B have been resolved and it is readyto resume serving data.1. Any issues on node B have been resolved and it is displaying the following message:

Waiting for giveback2. The giveback is initiated by the storage failover giveback command or by automatic giveback if the system is configured for it.3. This initiates the process of returning ownership of the node B's aggregates and volumes from node A back to node B.4. Node A returns control of the root aggregate first.5. Node B proceeds to complete the process of booting up to its normal operating state.6. As soon as Node B is at the point in the boot process where it can accept the non-root aggregates, Node A returns ownership of the other aggregates one at atime until giveback is complete.

References: https://library.netapp.com/ecmdocs/ECMP1196905/html/GUID-E8DC7475-49ED-4397-9F00-AC5CB2875CA5.html

QUESTION 42Which NetApp management tool verifies the disk-shelf cabling of an existing NetApp cluster?

A. System Setup

B. Config Advisor

C. OnCommand Unified Manager

D. OnCommand System Manager

Correct Answer: BSection: (none)Explanation

Explanation/Reference:NetApp Config Advisor is a tool that will allow you to check the health and ensure your NetApp infrastructure is adhering to NetApp best practices.

Once the Config Advisor query finishes, view the results and take corrective action on any configuration issues:

Page 38: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

References: http://bestpracticetips.com/tag/config-advisor/

QUESTION 43Click the Exhibit button.

Page 39: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Referring to the exhibit, which statement is true?

A. The node’s aggregates have been underutilized on average for the past one hour.

B. The node’s CPU has been underutilized on average for the past one hour.

C. The node’s CPU has been overutilized on average for the past one hour.

D. The node’s aggregates have been overutilized on average for the past one hour.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:You compute the available performance capacity by subtracting the optimal_point_counter from the current_counter. In this example, the utilization capacity forCPU_sti2520-213 is -14% (72%-86%). This suggests that the node's CPU has been overutilized on average for the past one hour.

References: http://docs.netapp.com/ontap-9/index.jsp?topic=%2Fcom.netapp.doc.pow-perf-mon%2FGUID-50CA6406-8C7A-46C0-8251-D1605CEF0D96.html

QUESTION 44You want to permanently reassign ownership of an aggregate to a node’s partner.

What should you do to accomplish this task?

A. Reassign ownership of each disk in the aggregate to the partner node.

B. Execute the storage aggregate relocation start command.

Page 40: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

C. Execute the storage failover command.

D. Move all volumes on the aggregate to an aggregate that is owned by the partner.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:To start the aggregate relocation process us the command: storage aggregate relocation start

References: https://library.netapp.com/ecmdocs/ECMP1196905/html/GUID-AE98144E-002D-405D-88C5-198DC4B05F55.html

QUESTION 45At which level of granularity would you back up data to tape using the SMTape command?

A. directory

B. qtree

C. volume

D. aggregate

Correct Answer: CSection: (none)Explanation

Explanation/Reference:You can use SMTape to perform volume backups to tapes.

References: https://library.netapp.com/ecmdocs/ECMP1368865/html/GUID-6C4C53F6-0543-45E1-B03A-891E60F6A109.html

QUESTION 46You are configuring an ONTAP solution for FC host connectivity.

In this scenario, how should the cluster be configured? (Choose two.)

A. The SVM must be configured for Ethernet LIFs.

B. FC ports must be configured as initiators.

C. FCP must be licensed on the cluster.

D. FC ports must be configured as targets.

Correct Answer: AC

Page 41: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

Section: (none)Explanation

Explanation/Reference:You can configure the FC and the FCoE protocols on the SVM for SAN hosts. LIFs are created on the most suitable adapters and assigned to port sets to ensuredata path redundancy. Based on your requirements, you can configure either FC, FCoE, or both the protocols.

Before you beginThe FCP license must be enabled on the cluster.All the nodes in the cluster must be healthy.Each node must have at least two correctly configured ports for each protocol (FC and FCoE).

Incorrect Answers:B, D: Onboard ports can be individually configured as either target or initiator FC ports

References: https://library.netapp.com/ecmdocs/ECMP1354558/html/GUID-A8D48BB6-ADBF-446D-A0B8-8F3A43D8FCF5.html

QUESTION 47When a two-node cluster is expanded, which cluster configuration would be supported?

A. a 4-node switched cluster

B. a 4-node switchless cluster

C. a 3-node switched cluster

D. a 3-node switchless cluster

Correct Answer: CSection: (none)Explanation

Explanation/Reference:If you are adding nodes to a two-node switchless cluster, you must have installed and configured the cluster management and interconnect switches before addingadditional nodes.The switchless cluster functionality is supported only in a two-node cluster.

References: https://library.netapp.com/ecmdocs/ECMP1636037/html/GUID-B13FF812-785E-4E62-9914-30E7A8F51A4C.html

QUESTION 48Click the exhibit button.

Page 42: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

In reference to the NFS export-policy rules shown in the exhibit, NFS clients mounted to /data1 from the 192.168.1.0/24, 192.168.2.0/24 and 192.168.3.0/24 subnetsare able to mount /data1 and read files but are unable to edit files or write new files. All other subnets require read-only access to /data1.

What must you do to allow write access to the three subnets while allowing read-only access to all other subnets in this scenario?

A. Set the index of ruleindex 2 to ruleindex 4.

B. Set the index of ruleindex 1 to ruleindex 4.

C. Set the index of ruleindex 3 to ruleindex 4.

D. Set the index of ruleindex 4 to ruleindex 1.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Make sure the rule with ruleindex 1 is applies last.

Note: You can use the vserver export-policy rule setindex command to manually set an existing export rule's index number. This enables you to rearrange the orderin which Data ONTAP processes export rules.

If a client makes an access request that is not permitted by the applicable export policy, the request fails with a permission-denied message. If a client does notmatch any rule in the export policy, then access is denied. If an export policy is empty, then all accesses are implicitly denied.

References: https://library.netapp.com/ecmdocs/ECMP1610208/html/GUID-52664AEE-B4EB-45A9-900F-ED504540366F.html

Page 43: Network-   · PDF fileYou want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage ... Tech-OnTap-Articles/Back-to-Basics-Data

http://www.gratisexam.com/

http://www.gratisexam.com/