[Free] Download New Updated (December) Network Appliance NS0-155 Exam Questions 21-30

Ensurepass

QUESTION 21

For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must do what?

 

A.

Enter the CIFS user in the NIS database.

B.

Enter the user names in the /etc/hosts.equiv file.

C.

Use both a NIS server and a Domain Controller in the network.

D.

Nothing: mapping will occur if user name authentication is available.

 

Correct Answer: D

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-EAB803E7A8EB.html

If the user names in the UNIX password database are identical to the Windows names, you need not providethe mapping information in the /etc/usermap.cfg file.

 

 

QUESTION 22

You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the directory structure no longer exists. Which is the most likely explanation?

 

A.

Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore. You must now SnapRestore the volume.

B.

Snapshot copies have been created since the original directory structure was deleted.

C.

You must recreate the directory structure before trying to restore the file.

D.

You cannot restore a file to an alternate location.

 

Correct Answer: C

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-698C1299E29D.html

You can restore a file only to the volume where it was originally located. The directory structure to which a fileis to be restored must be the same as that specified in the path. If this directory structure does not exist, youmust create it before restoring the file.

 

 

QUESTION 23

If the security style is set to UNIX, CIFS client file access is determined by ___________.

 

A.

NT ACLs

B.

the last client to set permissions

C.

the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions

D.

This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

 

Correct Answer: C

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-EAB803E7A8EB.html

For Data ONTAP to obtain the UID and GIDs for a CIFS user, it must first determine the user’s UNIX-stylename. It does this through user mapping.

 

 

QUESTION 24

Which two are Data ONTAP commands for displaying performance information? (Choose two.)

 

A.

nfsstat

B.

perfstat

C.

sio_ntap_soll

D.

sysstat

 

Correct Answer: AD

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html

https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html

 

nfsstat and sysstat are OnTap commands used for performance information.

sio_ntap_soll is not an OnTap command.

 

Perfstat is a GUI performance tool, not an OnTap command. Think of PerfMon for Windows to remind you thatPerfStat is a Windows tool. Note how many of the ONTAP performance commands end in stat.

 

 

QUESTION 25

Which three tools present statistics from the Data ONTAP counter manager? (Choose three)

 

A.

Operations manager

B.

Window perfmon

C.

Sysstat

D.

Stats

 

Correct Answer: ABD

Explanation:

OnTap Administration

https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html

https://communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5-34635/TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf

https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performance-stats-withoutperfstat-or-ops-mgr

 

Note in the diagram below how the performance tools integration with Data OnTap. statit and sysstatinterface directly with the performance counters while the other tools – including stats, a command line tool -integrate with the Counter Manager.

 

clip_image002

 

 

QUESTION 26

What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)

 

A.

Snap Autodelete

B.

iGroup throttle

C.

LUN reset

D.

Volume AutoSize

 

Correct Answer: AD

Explanation:

https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional-reservation–lunoverwrite

From the article:

“If you reduce the Fractional Reservation to 0, you need to make sure the rate of change is within the volumesize, or you need to make sure the volume can auto-grow when required or even snap auto-delete to reducethe reserved blocks and free up space (although I am not a huge fan of snap auto-delete for various reasons).”

 

 

QUESTION 27

Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths to a LUN.

 

A.

Token ring, physical

B.

FC SAN, virtual

C.

FC or IP SAN, virtual

D.

FC or IP SAN, Physical

 

Correct Answer: D

Explanation:

http://en.wikipedia.org/wiki/Multipath_I/O

Fiber Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI further encapsulate the transportwithin IP; hence the term IP SAN.

 

In computer storage, multipath I/O is a fault-tolerance and performance enhancement technique whereby thereis more than one physical path between the CPU in a computer system and its mass storage devices throughthe buses, controllers, switches, and bridge devices connecting them.

 

A simple example would be a SCSI disk connected to two SCSI controllers on the same computer or a diskconnected to two Fibre Channel ports. Should one controller, port or switch fail, the operating system can routeI/O through the remaining controller transparently to the application, with no changes visible to the applications,other than perhaps incremental latency.

 

 

QUESTION 28

A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of the ____________ at the time the snapshot was created.

 

A.

qtrees

B.

volume

C.

directory

D.

storage system

 

Correct Answer: B

Explanation:

http://backdrift.org/man/netapp/man1/na_snap.1.html

Snapshots can be made of volumes or aggregates; most commonly the former. Thequestionrefers to a filesystem, or more specifically a volume.

You cannot snapshot directories or qtrees alone.

 

 

 

 

 

 

 

QUESTION 29

Which command on the storage system allows you to display statistics on the performance of system resource such as CPU, NVRAM, network interfaces, and disks?

 

A.

netstat

B.

netdiag

C.

pktt

D.

sysstat

 

Correct Answer: D

Explanation:

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html

sysstat reports aggregated filer performance statistics such as the current CPU utilization, the amount ofnetwork I/O, the amount of disk I/O, and the amount of tape I/O.

 

 

QUESTION 30

Which two cp types would indicate a busy storage system? (Choose two).

 

A.

cp_from_log_full

B.

cp_from_busy

C.

cp_from_cp

D.

cp_from_timer

 

Correct Answer: AC

Explanation:

http://backdrift.org/man/netapp/man1/na_sysstat.1.html

http://redhunter.com/blog/2010/02/11/netapp-consistency-points-in-cacti/

cp_from_log_full (log full) – the current NVRAM bank is full and the system switches to the other one andstarts writing this to disk. Very heavy write activity.

 

cp_from_cp (aka Back to Back) – filer is overloaded. The write traffic is coming in faster than it can be writtenand the filer is running out of NVRAM capacity in one bank before the data in the other bank can be written.

 

cp_from_busy is not a real cp type

cp_from_timer – 10 seconds since the last CP – it means the system is pretty idle write-wise.

 

Free VCE & PDF File for Network Appliance NS0-155 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …