Which SVM configuration is needed before the customer creates LUNs on the new nodes?

A customer recently added two nodes with FC ports to a 4-node cluster. Which SVM configuration is needed before the customer creates LUNs on the new nodes?A . The FC service needs to be enabled on the data SVC . The existing LIFs need to be migrated to the new...

August 22, 2021 No Comments READ MORE +

Which two solutions would alleviate the QFull errors and performance problems?

A 4-node ONTAP FAS9000 cluster was used to serve I/O from six RedHat 7.3 servers. The servers were configured with maximum, queue depth. For production purposes, an additional 60 similarly configured hosts were added to the environment. Later, the hosts started reporting random QFull errors, and the aggregated performance degraded....

August 22, 2021 No Comments READ MORE +

Referring to the exhibit, which two Fibre Channel names should you zone on the FC switch to provide connectivity to the LUN?

Click the Exhibit button. Referring to the exhibit, which two Fibre Channel names should you zone on the FC switch to provide connectivity to the LUN? (Choose two.)A . 50:0a:09:82:9c:16:cc:00B . 50:0a:09:82:9c:7a:4e:00C . 20:00:00:50:56:9c:16:ccD . 20:01:00:50:56:9c:16:ccView AnswerAnswer: CD

August 22, 2021 No Comments READ MORE +

Which information-gathering command should you use to gather logs for troubleshooting switch information for your Brocade switches?

Which information-gathering command should you use to gather logs for troubleshooting switch information for your Brocade switches?A . cfgshowB . fabricshowC . configshowD . supportsaveView AnswerAnswer: D

August 22, 2021 No Comments READ MORE +

Which resource has this information?

An administrator needs to determine the maximum volume size that is supported per operating system. Which resource has this information?A . Interoperability Matrix Tool (IMT)B . OneCollectC . Config AdvisorD . Hardware Universe (HWU)View AnswerAnswer: A

August 21, 2021 No Comments READ MORE +

UNIX allows file access based on ____.

UNIX allows file access based on ____.A . NT ACLs and UNIX permissions.B . NT ACLs and SID . GID or UID and UNIX permissions.E . GID or UID and ACLs.View AnswerAnswer: C

August 21, 2021 No Comments READ MORE +

Which command provides information on Snapshot copy auto delete variables?

Which command provides information on Snapshot copy auto delete variables?A . -volume modify -space-mgmt-try-first autodelete-B . -volume snapshot autodelete show-C . -volume show-D . -volume file clone autodelete-View AnswerAnswer: B

August 21, 2021 No Comments READ MORE +

What is the correct sequence in performing, these steps?

Add the AFF A700 HA pair to the reporting-nodes list. What is the correct sequence in performing, these steps?A . 1, 2, 3, 4B . 4, 1, 2, 3C . 4, 3, 2, 1D . 3, 2, 1, 4View AnswerAnswer: B

August 21, 2021 No Comments READ MORE +

In this scenario, which front end configuration is required for non-disruptive host LUN failover between sites?

You are testing iSCSI LUN failover across a 4-node FAS9000 fabric-attached MetroCluster configuration. In this scenario, which front end configuration is required for non-disruptive host LUN failover between sites?A . an intercluster LIFB . a stretched Layer 2 networkC . Ipv6D . a stretched VSANView AnswerAnswer: A

August 21, 2021 No Comments READ MORE +

Which Data ONTAP option sets system-wide throttling for all transfers?

Which Data ONTAP option sets system-wide throttling for all transfers?A . options transfer.wide.enableB . options transfer.throttle.enableC . options replication.wide.enableD . options replication.throttle.enableView AnswerAnswer: D

August 21, 2021 No Comments READ MORE +