NS0-157 Premium Bundle

NS0-157 Premium Bundle

NetApp Certified Data Administrator, Clustered Certification Exam

4.5 
(20880 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
September 29, 2024Last update

Network-Appliance NS0-157 Free Practice Questions

Q1. - (Topic 1) 

What must be configured to support inter-cluster Snapmirror relationships? 

A. Cluster peer relationship 

B. Intercluster port role 

C. Junction path for the mirrored volume 

D. Minimum transfer size 

Answer:

Q2. - (Topic 1) 

How many disks reside in a DS4246 shelf? 

A. 46 

B. 42 

C. 14 

D. 24 

Answer:

: http://www.netapp.com/uk/products/storage-systems/disk-shelves-and-storage-media/disk-shelves-tech-specs.aspx(See the Table). 

Q3. - (Topic 1) 

What is the maximum number of nodes allowed in an FAS8000 series with a SAN configuration? 

A. 24 

B. 8 

C. 4 

D. 2 

Answer:

Explanation: SAN: Up to 8 cluster nodes Reference: http://cloudcarib.com/pdf/NetApp-8000.pdf 

Q4. - (Topic 3) 

Which two methods expose volumes to NAS clients? (Choose Two) 

A. Mount directories of a volume in a namespace 

B. Mount the required namespaces in a volume 

C. Mount the required namespaces in an aggregate D. Mount the required volumes in a namespace 

Answer: A,D 

Q5. - (Topic 2) 

Which parameter must the cluster administrator properly define when configuring an iSCSI logical interface in Data ONTAP 8.1 Cluster-Mode and later? 

A. data-access 

B. data-address 

C. data-protocol 

D. data-routing 

E. No parameter needs to be defined as no additional parameter is required. 

Answer:

Explanation: 

http://webobjects.cdw.com/webobjects/media/pdf/netapp/clustered-data-ontap-introduction.pdf? cm_sp=NAPShowcase-_-Cat7Link3-_-Clustered+Data+ONTAP+Intro 

Q6. - (Topic 3) 

When a client transverses a junction, the client has entered: 

A. a different Vserver 

B. a different volume 

C. a different junction 

D. a different cluster 

Answer:

Q7. - (Topic 2) 

What is considered when selection LS mirror copy? (choose three) 

A. If an LS mirror copy is on the same node as the network module that fields the request, the network module uses that LS mirror copy 

B. If a write request goes to LS mirror, It forward it to flexvol 

C. if no LS mirror copy is on the same node as the network module that fields the request, the network module uses an up-to-date LS mirror copy on another node. 

D. If a write request goes to LS mirror, it returns error. 

Answer: A,C,D 

Q8. - (Topic 1) 

At which two levels would you be able to create a SnapMirror policy? (Choose two.) 

A. aggregate 

B. cluster 

C. volume 

D. SVM 

Answer: A,C 

Reference: https://library.netapp.com/ecmdocs/ECMP1610202/html/snapmirror/create.html 

Q9. - (Topic 2) 

Which two features are supported in clustered Data ONTAP 8.2? (Choose two) 

A. External USB support 

B. MetroCluster 

C. Infinite volume 

D. Flash cache 

E. Infiniband data interface F. SnapLock 

Answer: C,D 

Explanation: 

https://communities.netapp.com/docs/DOC-27777 

Q10. - (Topic 2) 

Identify two synchronous Fpolicy applications (choose two) 

A. quota management 

B. file-access and audit logging 

C. storage resource management 

D. compression and decompression services 

Answer: A,D 

Explanation: 

Output from NetApp "Clustered Data ONTAP 8.2 File Access Management-Guide" 

Asynchronous applications are ones where the external FPolicy server does not alter access to files or directories or modify data on the Storage Virtual Machine (SVM). For example: 

. File access and audit logging 

. Storage resource management Synchronous applications are ones where data access is altered or data is modified by the external FPolicy server. For example: 

. Quota management 

. File access blocking 

. File archiving and hierarchical storage management 

. Encryption and decryption services 

. Compression and decompression services 

Q11. - (Topic 1) 

An administrator creates an account for a new user, and wants this user to have limited capabilities accessing SSH. The administrator defined the account, but the user still has full control. 

Which two settings would the administrator use to correct this problem? (Choose two.) 

A. the user account settings in OnCommand system Manager 

B. the user account settings of the admin account 

C. the user account settings in Windows Active Directory Users and Computers 

D. the user account settings in the clustershell 

Answer: A,D 

Q12. - (Topic 3) 

The Catalyst 2960 can be used only on the management network for clusters that have _____nodes. 

A. 12 

B. 16 

C. 18 

D. 20 

E. 24 

Answer:

Q13. - (Topic 3) 

What are the LIF roles that can be assigned to ports in clustered ONTAP? (choose all that apply) 

A. Data 

B. Cluster management 

C. Cluster 

D. Node management 

E. Intercluster 

Answer: A,B,C,D,E 

Q14. - (Topic 1) 

What will the storage aggregate create –aggregate aggr0_rg0 –diskcount 40 –maxraidsize 20 –nodes cl-01 –disktype SAS command do? 

A. It creates a new aggregate named aggr0_rg0 with two RAID-DP RAID groups of 20 SAS drives on cl-01. 

B. It creates a new aggregate named aggr0_rg0 with one RAID-DP RAID group of 40 SAS drives on cl-01. 

C. It creates a new aggregate named aggr0_rg0 with two RAID4 RAID groups of 20 SAS drives on cl-01. 

D. It creates a new aggregate named aggr0_rg0 with two RAID4 RAID groups of 20 SAS drives on cl-02. 

Answer:

Q15. - (Topic 1) 

In the storage failover command, what does the bypass-optimization option do? 

A. It takes over the partner node without performing aggregate relocation. 

B. It migrates all logical interfaces during takeover. 

C. It takes over without migrating all logical interfaces. 

D. It takes over the partner node performing aggregate relocation. 

Answer:

Explanation: 

Take over the partner node without performing aggregate relocation storage failover takeover -bypass-optimization.true 

Reference: https://library.netapp.com/ecmdocs/ECMP1367947/html/GUID-4B814447-521D-43B7-846D-AB4EF86A25A1.html 

Q16. - (Topic 3) 

To operate DATA ONTAP 8.1 Cluster Mode SAN, what must be configured on both the initiator and the target? 

A. Logical Unit Access Initialization 

B. Physical Unit Access Initialization 

C. Symmetric Logical Unit Access 

D. Asymmetric Logical Unit Access 

E. SAN Access Initialization Protocol 

Answer:

Explanation: Explanation/Reference: http://maben.homeip.net/static/computers/backup/storage/NetApp/SnapMirror%20Best%20 Practices%20Guide.pdf 

START NS0-157 EXAM