Q1. - (Topic 2)
What are some of the benefits to customers when using clustered Data ONTAP? (Choose all that apply)
A. Scalability
B. Transparency
C. Flexibility
D. Non-disruptive operations
Answer: A,B,C,D
Q2. - (Topic 3)
Which logical interface does not have migration nor failover migration capabilities?
A. cluster management
B. node management
C. data
D. target
Answer: B
Q3. - (Topic 3)
New systems are shipped with the root volume in a 64-bit aggregate starting with which Data ONTAP release?
A. 8.0.0
B. 8.0.1
C. 8.0.2
D. 8.1
Answer: D
Explanation: Explanation/Reference: https://library.netapp.com/ecmdocs/ECMP1196798/html/GUID-A60F4F83-0034-4DB8-838B-06E9D4BEF9A4.html
Q4. - (Topic 1)
A customer enables Storage Efficiency on a volume, intending to use compression only as data is written. The customer observes that compression is working, but deduplication processes are still running on a scheduled basis. The customer wants to use compression without deduplication as the data is written to the volume.
Which action will accomplish this task?
A. Enable post compression on the volume.
B. Create a custom efficiency policy and attach to the SVM.
C. Attach the default efficiency policy to the volume.
D. Attach the inline-only efficiency policy to the volume.
Answer: D
Q5. - (Topic 2)
Which of the following statements are true about data protection mirrors? (Choose all that apply)
A. A data protection source volume supports up to 4 destination mirrored volumes
B. A data protection source volume supports up to 1 destination volume per node
C. A volume must be created before it can be used as a mirror destination
D. Creating a mirror relationship also creates the destination volume
Answer: A,C
Q6. - (Topic 1)
A customer has two SVMs joined to separate Active Directory domains. SVM1 is joined to domain AD1 and SVM2 is joined to domain AD2. The administrator enables Active Directory access to allow certain domain users access to the cluster using their Active Directory credentials. After enabling, some users report the inability to log into the cluster using their Active Directory credentials.
What are three reasons this happened? (Choose three.)
A. The user account belongs to the domain that is not used for cluster access authentication.
B. The cluster time is off by two minutes from the Active Directory time server.
C. The authentication tunnel was deleted and access sessions were disconnected.
D. The Active Directory user account is not added to the cluster as a user.
E. The user is not a member of an Active Directory group that is allowed access to the cluster.
Answer: A,D,E
Q7. - (Topic 1)
A customer wants to retire a broadcast domain called bcast1 from the cluster. All network ports and data LIFs previously using bcast1 have been moved to another broadcast domain. When the administrator attempts to delete the broadcast domain, the deletion fails.
What is causing the problem?
A. TheIPspace, that the broadcast domain uses, still exists.
B. The cluster ports are using the bcast1 broadcast domain.
C. There are still subnets associated with the broadcast domain.
D. The SVM has not been deleted.
Answer: A
Q8. - (Topic 3)
The Catalyst 2960 can be used only on the management network for clusters that have _____nodes.
A. 12
B. 16
C. 18
D. 20
E. 24
Answer: E
Q9. - (Topic 3)
In Data ONTAP 8.1.1 Cluster-Mode, what is the maximum node size for SAN protocols? (Choose three)
A. 24 nodes
B. 12 nodes
C. 8 nodes
D. 6 nodes
E. 4 nodes
F. 2 nodes
Answer: D,E,F
Q10. - (Topic 1)
Which data protocol is available to use on an SVM?
A. FTP
B. CIFS
C. HTTP
D. TFTP
Answer: B
Explanation: You can configure CIFS and NFS protocols on the.Storage Virtual Machine (SVM).to provide file-level data access for NAS clients. To enable CIFS protocol, you must create the data LIFs and the CIFS server. To enable NFS protocol, you can specify the NIS details in addition to the data LIFs.
Reference:https://library.netapp.com/ecmdocs/ECMP1354558/html/GUID-75523E3A-839A-4530-919D-29F98AB6C2E7.html
Q11. - (Topic 2)
For Vserver-aware NDMP backups, the ______________ must be enabled with cluster-aware backup extensions.
A. vServer management LIF
B. DMA server
C. Data LIF
D. Node management LIF
Answer: C
Explanation: Explanation/Reference: https://library.netapp.com/ecm/ecm_download_file/ECMP1196874
Q12. - (Topic 2)
The VLDB is out-of-quorum on the node serving as the master of the VLDB ring. Which four statements are true? (Choose four.)
A. A new VLDB ring master is elected.
B. Clients can write to volumes on that node.
C. Volumes cannot be moved to or from that node.
D. Clients can read from volumes hosted on that node.
E. New volumes can be created on aggregates hosted on that node.
Answer: A,B,C,D
Q13. - (Topic 2)
Which storage system combination is supported in a 4-node cluster?
A. A pair of FAS3270s and a pair of FAS3020s
B. A pair of FAS3270s with a FAS3240 and a FAS6240
C. A pair of FAS6280s and a pair of E7900s
D. A pair of FAS6280s and a pair of FAS3240s
Answer: D
Explanation:
http://www.slideshare.net/netapp/ar-scinetappontap811scaleoutv016-copy (See page 3, 4)
Q14. - (Topic 2)
What are the characteristics of Snapmirror? (choose three)
A. Provides data protection for disaster recovery
B. If the source FlexVol volume is lost, clients can restore data from the secondary to primary storage
C. Can asynchronously copy the source FlexVol volume to a disaster recovery replica
D. If the source FlexVol volume is lost or destroyed, clients can connect to the mirror image of the source data
Answer: A,C,D
Q15. - (Topic 3)
Identify two asynchronous Fpolicy applications. (Choose two)
A. Quota management
B. File-access and audit logging
C. Storage resource management
D. Compression and decompression services
Answer: B,C
Explanation: Explanation/Reference: http://pdf.it-exams.com/NS0-156.pdf
Q16. - (Topic 1)
Which two backup engines are supported within clustered Data ONTAP? (Choose two.)
A. SMT ape
B. dump
C. tape
D. xcopy
Answer: A,B
Reference: https://library.netapp.com/ecm/ecm_download_file/ECMP1196874