In this scenario, how would the customer ensure that the new container-based application has access to the same data?

A customer was running a traditional application with the data being provided by an NetApp ONTAP NFSv3 export. The customer is now migrating that same application to run with a container in a Kubernetes environment using NetApp Trident.

In this scenario, how would the customer ensure that the new container-based application has access to the same data?
A . Use the rsync command to copy the data to a worker node in the Kubernetes cluster and allow the kubelet to auto-discover the storage for the container.
B. Import the volume using the tridentcti command and provide the corresponding persistent volume claim YAML.
C. Define a backend YAML in Trident and use the kubectl command to create the backend in the Trident namespace.
D. Define the connection information for the NFSv3 export in the storage class object and then reference the storage class in the persistent volume claim.

Answer: D

In this scenario, which keyword should you be looking for as you research various automation frameworks?

You are researching different automation frameworks. One of the main features that you are seeking is the ability to provide an end state of what a particular environment should look like versus needing to define each step that is required to get to the end state.

In this scenario, which keyword should you be looking for as you research various automation frameworks?
A . RESTful
B. declarative
C. interrogative
D. imperative

Answer: D

In this scenario, which two steps must you perform to communicate with an endpoint?

You are using REST APIs to deploy and manage storage that is provided by NetApp Cloud Volumes ONTAP in Microsoft Azure. You have written a Python script that contains a POST request to the following URL: http://localhost/occm/api/azure/vsa/working-environments. However, you receive a 401 response failure message that indicates that the user is not authenticated.

In this scenario, which two steps must you perform to communicate with an endpoint? (Choose two.)
A . Call an API endpoint with the JWT access token.
B. Acquire a JWT access token from the OAuth token endpoint.
C. Call an API endpoint with the refresh token.
D. Acquire a refresh token from the OAuth token endpoint.

Answer: C

Which two configurations are causing the error?

You have an AFF A400 system with NetApp ONTAP 9.8 installed. You want to configure the NetApp Cloud Tiering service to tier data to AWS object storage. The communication between your cluster and the AWS cloud needs to be encrypted. You have installed the FabricPool license, but your ONTAP cluster cannot reach the S3 bucket.

Which two configurations are causing the error? (Choose two.)
A . You have not configured the TLS encryption.
B. You have not configured your firewall to allow outbound traffic on port 443.
C. You have not configured a LIF with a public IP address.
D. You have not configured a LIF with the intercluster role.

Answer: C,D