Q1. - (Topic 3)
Which two clustered Data ONTAP clone technologies will lock volume snapshot? (Choose two)
A. Vol Clone
B. LUN Clone
C. AggrClone
D. FlexClone
E. SnapClone
Answer: B,D
Explanation: Explanation/Reference: http://examcramnotes.blogspot.nl/
Q2. - (Topic 2)
What are the LIF roles that can be assigned to ports in Data ONTAP Cluster-Mode? (Choose all that apply)
A. Data
B. Cluster management
C. Cluster
D. Node management
E. Intercluster
Answer: A,B,C,D,E
Q3. - (Topic 2)
Which feature is NOT supported by clustered Data ONTAP 8.2?
A. Synchronous SnapMirror
B. Data Protection Mirrors
C. Load Sharing Mirrors
D. Non-disruptive upgrades
Answer: A
Q4. - (Topic 1)
A customer cannot enable storage failover. You have verified that the cabling is correct, the HA partners can communicate with each other, and cluster HA is configured.
What must you do to resolve the problem?
A. Set the HA state in the maintenance boot menu.
B. Select option 4 in the boot menu.
C. Set switchless cluster in privilege advanced mode.
D. Modify epsilon in privilege advanced mode.
Answer: D
Q5. - (Topic 3)
Which three NFS versions foes Data ONTAP 8.1 Cluster-Mode support? (Choose three)
A. NFSv.0
B. NFSv.1
C. NFSv.1.1
D. NFSv3.0
E. NFSv4.1
F. NFSv5.0
Answer: D,E,F
Explanation:
http://www.globbtv.com/microsite/18/Adjuntos/TR-4067%20NFSV3V4%20IN%20DATA%20ONTAP%208.1%20OPERATING%20IN%20CLU STER-MODE%20IMPLEMENTATION%20GUIDE.PDF
Q6. - (Topic 3)
Which logical interface does not have migration nor failover migration capabilities?
A. cluster management
B. node management
C. data
D. target
Answer: B
Q7. - (Topic 2)
Which two Data ONTAP Cluster-Mode clone technologies will lock a Snapshot copy? (Choose two.)
A. FlexClone
B. LUN Clone
C. Snap Clone
D. Vol Clone
E. Aggr Clone
Answer: A,B
Q8. - (Topic 1)
Your company is told that it must follow strict requirements for auditing purposes when creating user accounts for each department.
Which feature in clustered Data ONTAP accomplishes this task?
A. LDAP integration
B. workgroup access
C. role-based access control
D. mixed-mode security
Answer: C
Q9. - (Topic 1)
Which hidden directory points to a Snapshot copy from an SMB client?
A. /snapshot
B. .snapshot
C. snapshot
D. %snapshot
Answer: C
Explanation: hidden.~snapshot.directory is accessible.Reference: https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-6D832809-1E60-4041-BF08-D390CB6B3D89.html
The method that you use to access the ~snapshot directory from Windows clients using SMB
https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-6D832809-1E60-4041-BF08-D390CB6B3D89.html
Q10. - (Topic 3)
Which feature makes it possible for a storage administrator to add more than storage systems to a cluster?
A. Scale horizontal
B. Scale out
C. Scale up
D. Scale vertical
Answer: B
Q11. - (Topic 3)
Netapp Remote Support Agent (RSA) is supported which two FAS module types? (Choose two)
A. BMC
B. ILO
C. RLM
D. RTC
E. SP
Answer: C,E
Q12. - (Topic 3)
What are two capabilities of Vserver setup? (Choose two)
A. It licenses Vserver functionality
B. It joins an exisiting Vserver to the cluster.
C. it creates a new Vserver that can host FCP LUNs.
D. It creates a new cluster Vservers
E. It configures an existing Vserver
Answer: D,E
Explanation: https://library.netapp.com/ecmdocs/ECMP1196798/html/GUID-68CC383E-06E6-48AF-B7F5-8B510750EDDE.html
Q13. - (Topic 3)
The root volume of a node in the cluster is named
A. vs_root
B. mhost
C. rootvol
D. vol0
Answer: D
Q14. - (Topic 1)
What are two FPolicy methods for applications? (Choose two.)
A. asynchronous
B. semi-synchronous
C. direct
D. synchronous
Answer: A,D
Reference: https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-CFED10C9-311A-444C-8684-D7BBAF0BFADC.html
Q15. - (Topic 1)
A customer wants to use a UTA2 PCIe card in a new FAS8000 system.
Which three steps must be completed before the customer is able to use the ports for Fc access to an FCP switch? (Choose three.)
A. Use the system hardware unified-connect modify command to change the personality from initiator to target.
B. Verify the WWPN of the UTA2 so that these can be used in the igroup to map the LUNs for host access.
C. Verify that the correct SFP+ is installed for FC.
D. Verify the card’s hardware configuration by running the system hardware unified-connect show command.
E. Verify that Data ONTAP iSCSI, GIFS, and NFS are licensed on the system.
Answer: A,C,D
Reference: https://library.netapp.com/ecmdocs/ECMP1368525/html/GUID-EC0DDAEE-1178-48EF-B90D-0A7DF498F71B.html
Q16. - (Topic 2)
Which command configures the Remote Support Agent (RSA)?
A. rsa init
B. system services web
C. system services rsa
D. vserver services rsa
Answer: A
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMP1200040 https://library.netapp.com/ecm/ecm_download_file/ECMP1200040 which states "Steps
1. Connect to the SP/RLM with your SSH client by entering the applicable command: %> ssh admin@sp-IP %> ssh newly-created-account@sp-IP
2. Use the SP/RLM version command to verify that the service processor is using the latest firmware.
3. Start an interactive configuration session by using the rsa setup command."