You are on page 1of 85

Netapp.Actualtests.NS0-155.v2014-03-03.by.brown.

189q
Number: NS0-155
Passing Score: 700
Time Limit: 120 min
File Version: 16.5

Exam Code: NS0-155


Exam Name: NetApp Certified 7-Mode Data Administrator

Exam A
QUESTION 1
How can you "throttle" SnapValue updates and baseline transfers so that the primary or secondary is not
transmitting data as it can?
A.
B.
C.
D.

Use the -k option in the snapvault start or snapshot modify commands.


SnapVault does not support throttling of network throughout.
Use the snapvault throttle command.
Use the -k option in the snapvault initialize command.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_snapvault.1.html The snapvault subcommands are:
start [ -r ] [ -k n ] [ -t n ] [ -w ] [-p {inet | inet6 unspec}] [ -o options ] [ -S [primary_filer:]primary_path ]
secondary_qtree
modify [ -k n ] [ -t n ] [-p {inet | inet6 | unspec}] [ -o options ] [ -S primary_filer:primary_path ] sec_ondary_qtree
The -k option sets the maximum speed at which data is transferred in kilobytes per second. It is used tothrottle
disk, CPU, and network usage. If this option is not set, the filer transmits data as fast as it can. Thesetting
applies to the initial transfer as well as subsequent update transfers from the primary.
QUESTION 2
Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is still up, but it
cannot see one of its disk shelves. However, the partner node, Node 2, can see all of the Node 1's disk
shelves. Which feature will cause Node 2 to monitor this error condition for a period of three minutes by default,
and then forcibly take over Node 1 if the error condition persists?
A.
B.
C.
D.

Auto enable of giveback


Negotiated Fail Over
Takeover on panic
Cf.quickloop.enable

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.wafl.co.uk/cf/
http://wafl.co.uk/options/
Negotiated failover is a general facility which supports negotiated failover on the basis of decisionsmade by
various modules.
cf.takeover.on_disk_shelf_miscompare
This option allows negotiated takeover to be enabledwhen the cluster nodes detect a mismatch in disk
shelfcount. By default, this option is set to off.
This option is available only when cluster is licensedand changing the value on one filer automaticallychanges
the value on the partner filer.
QUESTION 3

In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)
A.
B.
C.
D.
E.

User quotas
Tree quotas
Root quotas
Group quotas
File quotas

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas,however, do apply even to root and the Windows Administrator account.
QUESTION 4
Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)
A.
B.
C.
D.

Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bit


Data ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bit
Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.1 64-bit
Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.0.2 64-bit

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation: Volume SnapMirror Interoperability Matrix.

Reference: SnappMirror Async Overview and Best Practices guide.


QUESTION 5
An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are
available. Data ONTAP will then perform what action.
A.
B.
C.
D.

Chooses a 72-Gigabyte disk and use it as is.


Chooses a 72-Gigabyte disk and right-size it.
Halts after 24 hour of running in degraded mode.
Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-8A91F6A2-61B8-42C3- Network Appliance
NS0-155 Exam
AEAB7D5AA9BBE9CF.html
If a disk fails and no hot spare disk that exactly matches the failed disk is available, Data ONTAP uses the
bestavailable spare. Understanding how Data ONTAP chooses an appropriate spare when there is no
matchingspare enables you to optimize your spare allocation for your environment.
Data ONTAP picks a non-matching hot spare based on the following criteria (and more; in the link above):
If the available hot spares are not the correct size, Data ONTAP uses one that is the next size up, ifthere is one.
The replacement disk is downsized (aka right sized) to match the size of the disk it is replacing; theextra
capacity is not available.
QUESTION 6
Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?
A.
B.
C.
D.

All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1 upgrade.
The expansion is triggered by an aggr convert command.
The expansion is triggered by adding disks to exceed 16 TB.
The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit aggregates with
Data ONTAP 8.1 upgrade.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html To upgrade an aggregate in-place, the
only available method is to add disks to expand the aggregate to>16TB.
QUESTION 7
What utility on the storage system will allow you to capture network packet information?
A.
B.
C.
D.

Snoop
Netstats
Pktt
Traceroute

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The pktt command controls a simple on-filer packet tracing facility. Packets can be captured into a tracebuffer
then dumped to a file, or the captured data can be logged to a file. The data is stored in "tcpdump"format, and
can be directly viewed with tcpdump, ethereal, and perhaps other viewers. The output can also beconverted
using the editcap(1) program to a variety of other formats, including Sniffer, NetMon, and snoop.
QUESTION 8
The root admin on the UNIX box receives an "Access Denied" message when he attempts to access a newly
mounted qtree. What's the most likely cause of this error?
A. The qtree is missing from the /etc/hosts file.

B. NFS is turned off on the storage system.


C. The qtree is set to ntfs security style.
D. The qtree has not been exported.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBAB0BDA63560FECEFF.html
https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-F6304830-B124-40A5-95D6C646AA85E9E0.html
Only hostnames and IPs are referenced in /etc/hosts, so A is incorrect. Thequestionstates that the qtree
wasmounted, and B and D would preclude this so they are incorrect. You need to set a qtree to mixed or unix
security style to support UNIX users.
QUESTION 9
Which two modes support using SnapMirror over multiple network paths?

A.
B.
C.
D.
E.

Standalone
Partner
Multi
Failover
Give back

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-75BD4540-A103-4E2B-8B0AE6BBC0D3F43F.html
http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html
Two multipath methods are supported:
The multiplexing mode causes snapmirror to use both paths at the same time. If one should fail, it will switchto
use the remaining path only and use both again should the failing path be repaired. Failover mode causes
snapmirror to use the first path as the desired path and only use the second pathshould problems arise with the
first path.
QUESTION 10
Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two)
A.
B.
C.
D.

Options snapmirror.access on
Options snapmirror.resync on
Snapmirror initialize
Snap mirror resync

Correct Answer: CD

Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html snapmirror initialize [ -S
source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destinationStarts an initial transfer over the
network. An initial transfer is required before update transfers can take place.
The initialize command must be issued on the destination node. If the destination is a volume, it must
berestricted (see na_vol(1) for information on how to examine and restrict volumes). If the destination is a
qtree, itmust not already exist (see na_qtree(1) for information on how to list qtrees). If a qtree already exists, it
mustbe renamed or removed (using an NFS or CIFS client), or snapmirror initialize to that qtree will not work.
snapmirror resync [ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ]
destinationResynchronizes a broken-off destination to its former source, putting the destination in the
snapmirrored stateand making it ready for update transfers. The resync command must be issued on the
destination node.
QUESTION 11
Which two operations can be performed with the SnapDrive for windows graphical user interface?
A.
B.
C.
D.

Create volume
Create Snapshot copies
Create File
Create Disk

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278920
What SnapDrive does
SnapDrive software integrates with the Windows Volume Manager so that NetApp filers can serve as
virtualstorage devices for application data in Windows 2000 Server and Windows Server 2003 environments.
SnapDrive is dependent on the virtual disk service. The virtual disk service must be started on the host prior
toinstalling SnapDrive. SnapDrive manages virtual disks (LUNs) on a NetApp filer, making these virtual
disksavailable as local disks on Windows hosts. This allows Windows hosts tointeract with the virtual disks just
as if they belonged to a directly attached redundant array of independentdisks (RAID).
SnapDrive provides the following additional features:
It enables online storage configuration, virtual disk expansion, and streamlined management. It integrates
NetApp Snapshot technology, which creates point-in-time images of data stored on virtualdisks.
It works in conjunction with SnapMirror software to facilitate disaster recovery from either asynchronouslyor
synchronously mirrored destination volumes.

QUESTION 12
Which storage system command would display the WWPNs of hosts that have logged into storage system
using a Fibre Channel connection?
A. fcp config
B. fcp initiator show
C. fcp show i

D. fcp show initiator


Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html
fcp show initiator [ -v ] [ adapter ]
If no adapter name is given, information about all initiators connected to all adapters are shown. The command
displays the portname of initiators that are currently logged in with the Fibre Channel targetadapters. If the
portname is in an initiator group setup through the igroup command, then the group name isalso displayed.
Similarly, all aliases set with the fcp wwpn-alias command for the portname are displayed aswell.
If the -v flag is given, the command displays the Fibre Channel host address and the nodename/portname ofthe
initiators as well.
QUESTION 13
In a Fiber Channel configuration, the host's HBA is referred to as the ___________, and the storage system's
HBA to as the _____________.
A.
B.
C.
D.

Target, initiator
Primary, secondary
Initiator, target
Secondary, primary

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 14
Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?

A.
B.
C.
D.

Running snapmirroe update on the source storage system.


Running snapmirror release on the source storage system.
Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html https://library.netapp.com/
ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html snapmirror update [ -S source ] [ -k kilobytes ]
[ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination
For asynchronous mirrors, an update is immediately started from the source to the destination to update
themirror with the contents of the source.
For synchronous mirrors, a snapshot is created on the source volume which becomes visible to clients of
thedestination volume.

The snapmirror update command must be issued on the destination filer. snapmirror release source
{ filer:volume | filer:qtree } Tell SnapMirror that a certain direct mirror is no longer going to request updates. If a
certain destination is no longer going to request updates, you must tell SnapMirror so that it will no longerretain
a snapshot for that destination. This command will remove snapshots that are no longer needed forreplication
to that destination, and can be used to clean up SnapMirror- created snapshots after snapmirrorbreak is issued
on the destination side.
The source argument is the source volume or qtree that the destination is to be released from. The
destinationargument should be either the destination filer and destination volume name or the destination filer
anddestination qtree path. You can use a line from the output of the snapmirror destinations command as the
setof arguments to this command.The /etc/snapmirror.conf file exists on the node containing the mirror used for
SnapMirror.
QUESTION 15
You are trying to do a single file SnapRestore for a file, but you are receiving an error message that the
directory structure no longer exists. Which is the most likely explanation?
A. Once the directory structure has been deleted, you cannot restore the file using single file SnapRestore.
You must now SnapRestore the volume.
B. Snapshot copies have been created since the original directory structure was deleted.
C. You must recreate the directory structure before trying to restore the file.
D. You cannot restore a file to an alternate location.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366698C1299E29D.html
You can restore a file only to the volume where it was originally located. The directory structure to which a fileis
to be restored must be the same as that specified in the path. If this directory structure does not exist, youmust
create it before restoring the file.
QUESTION 16
Which mechanism allows you to make LUNs available to some initiators and unavailable to others?
A.
B.
C.
D.

LUN masking
LUN grouping
LUN cloning
LUN hiding

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/Logical_Unit_Number_masking Logical Unit Number Masking or LUN masking is an
authorization process that makes a Logical Unit Numberavailable to some hosts and unavailable to other hosts.
QUESTION 17
An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within a
______________ you can have one or more ____________.

A.
B.
C.
D.

session, session, connections


connection, session, connections
connection, connection, sessions
session, connection, sessions

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://scst.sourceforge.net/mc_s.html
http://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf
Meme: Remember the acronym: MCS or MC/S - Multiple Connections per Session. Microsoft Windows
2008'sMPIO driver supports MC/S.
QUESTION 18
Which NetApp Virtual Storage Tier component works at the host level?
A.
B.
C.
D.
E.

Flash Pool
Flash Disk
Flash Accel
Flash Cache
Flash IO

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3366.pdf&cc=us Flash Accel utilizes server-based
flash storage as cache for the host.
QUESTION 19
When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX server,
which three valid objects to include in the data set? (Choose three)
A.
B.
C.
D.

The entire client


A directory
A file
A qtree

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 20
What does it signify if the disks are "not owned" in a FAS2020 system?
A. The disks are mailbox disks.

B. The disks are spare disks.


C. The disks are data disks.
D. The disks are not used.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Disks must be assigned to an aggregate to be used as raid group members or spares.
Unassigned disks aredisplayed as "not owned".
QUESTION 21
For each Open Systems platform directory to be backed up to the SnapVault secondary storage
system you must execute _____________.
A.
B.
C.
D.

An initial baseline copy


A temporary copy
An incremental copy
A scheduled update copy

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-EEBC8B52-BEA9-4B49-874F7EC78D3F602E.html
Each open systems platform, when prompted by the secondary system, transfers initial base images
ofspecified directories to qtree locations on the secondary system. Note: There are no primary-side Snapshot
copies in Open Systems SnapVault.
QUESTION 22
What is the maximum distance between a standard clustered pair at 2Bbps?
A.
B.
C.
D.

100 meters
10 meters
50 meters
500 meters

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 23
Which exportfs command will temporally export the resource while ignoring the options specified in the /etc/
exports file?

A.
B.
C.
D.

exportfs v <path>
exportfs u <path>
exportfs a <path>
exportfs i <path>

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_exportfs.1.html exportfs [ -v ] [ -io options ]
path-i Ignores the options specified for a file system path in the /etc/exports file. If you do not specify theIoption
with the -o option, Data ONTAP uses the options specified for the file system path in the /etc/exports file instead
of the options you specify on the command line.
QUESTION 24
Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?
A.
B.
C.
D.

No, but you can file a PVR to request support.


No. it is targeted for a future release of Data ONATP.
Yes, only with a special license installed.
Yes, it has been supported since 8.0.1.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/03/netapp-storage-encryption-available.html March, 2011: "With the recent
release of Data ONTAP 8.0.1, NetApp now offers full disk encryption to preventunauthorized access to data at
rest."
QUESTION 25
Which two cp types would indicate a busy storage system? (Choose two).
A.
B.
C.
D.

cp_from_log_full
cp_from_busy
cp_from_cp
cp_from_timer

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html http://redhunter.com/blog/2010/02/11/netappconsistency-points-in-cacti/ cp_from_log_full (log full) - the current NVRAM bank is full and the system switches
to the other one andstarts writing this to disk. Very heavy write activity.
cp_from_cp (aka Back to Back) - filer is overloaded. The write traffic is coming in faster than it can be
writtenand the filer is running out of NVRAM capacity in one bank before the data in the other bank can be
written.

cp_from_busy is not a real cp type


cp_from_timer - 10 seconds since the last CP it means the system is pretty idle write-wise.
QUESTION 26
There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct sequence of these
phases?
A.
B.
C.
D.

Setup Phase, Mirror Phase, Cutover Phase


Initialization phase, Copy Phase, Migrate Phase
Begin Phase, Move Phase, Complete Phase
Setup Phase, Data Copy Phase, Cutover Phase

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1- 17848/
PDF_Tips_Data_Motion_0211.pdf
Non-disruptive Volume Movement is called DataMotion. DataMotion uses SnapMirror for volume migration.
A DataMotion migration occurs in three phases:
1. Setup
2. Data copy
3. Cutover
QUESTION 27
Which statement describes the results of the SnapMirror resynce command?
A. Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and removes all
newer information on the storage system on which the command is run.
B. Resynchronization will cause the loss of all data written to the destination after the original base
snapshot was made.
C. Resynchronization will update the snapshot on the destination filer.
D. Resynchronization will update the snapshot on the source filer.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
snapmirror resync
[ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination
Resynchronizes a broken-off destination to its former source, putting the destination in the snapmirrored
stateand making it ready for update transfers. The resync command must be issued on the destination node.
The resync command can cause data loss on the destination. Because it is effectively makingdestination a
replica of the source, any edits made to the destination after the break will be undone.
For formerly mirrored volumes, the resync command effectively performs a SnapRestore (see na_vol
(1)) on the destination to the newest snapshot which is common to both the source and thedestination. In most
cases, this is the last snapshot transferred from the source to the destination, butit can be any snapshot which
is on both the source and destination due to SnapMirror replication. Ifnew data has been written to the
destination since the newest common snapshot was created, thatdata will be lost during the resync operation.

QUESTION 28
If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to these files?
A.
B.
C.
D.

/vol/vol0/etc/log/snaplog/
/vol/vol0/etc/snapmirror/
/vol/vol0/etc/snaplog/
/vol/vol0/etc/log/

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
The root volume is always vol0 and etc is contained therein. When exporting the root volume via NFS, thepath
is/vol/vol0; so the full path to snapmirror log files is /vol/vol0/etc/log.
/etc/log/snapmirror.
This file logs SnapMirror activity. Log file for current week. /etc/log/snapmirror.[0-5]SnapMirror log files for
previous weeks.
QUESTION 29
Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths to a
LUN.
A.
B.
C.
D.

Token ring, physical


FC SAN, virtual
FC or IP SAN, virtual
FC or IP SAN, Physical

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/Multipath_I/O
Fiber Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI further encapsulate the
transportwithin IP; hence the term IP SAN.
In computer storage, multipath I/O is a fault-tolerance and performance enhancement technique whereby
thereis more than one physical path between the CPU in a computer system and its mass storage devices
throughthe buses, controllers, switches, and bridge devices connecting them.
A simple example would be a SCSI disk connected to two SCSI controllers on the same computer or a
diskconnected to two Fibre Channel ports. Should one controller, port or switch fail, the operating system can
routeI/O through the remaining controller transparently to the application, with no changes visible to the
applications,other than perhaps incremental latency.
QUESTION 30
Which two will allow you to read and analyze a packet trace file generated by the storage system? (Choose
two)

A.
B.
C.
D.

WireShark
Pktt
Netmon
Eternal View

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
pktt is part of the Data OnTap command set.
The output of pktt is not very human-readable, but it utilizes the tcpdump format which many traffic
analyzerscan read or import. Only two such analyzers have been offered here.
Wireshark is the successor of Etherreal, and available for several platforms. Netmon is a Microsoft
project,available for Windows, soon to be deprecated by the Microsoft Message Analyzer project.
QUESTION 31
How does the NetApp Remote Agent (RSA) connect to NetApp Support?
A.
B.
C.
D.

NetApp Support initiates a non-secure connection to the RSA.


NetApp Support initiates a secure connection to the RSA.
The RSA initiates a secure connection to NetApp Support.
The RSA initiates a non-secure connection to NetApp support.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMP1200040
Remote Support Agent is the facility to provide NetApp Support Engineers with the ability to remotely
triggerAutoSupport.
Remote Support Agent uses HTTP or HTTPS to communicate with the storage controller to initiate
commandsand to collect files. It uses HTTPS to send system logs and core files from the Data ONTAP root
volumeto Remote Support Enterprise on the NetApp Support side. NetApp RSA is not related to the RSA public
key encryption algorithm.
QUESTION 32
Which two commands can be used to enable LUN reservations? (Choose two)
A.
B.
C.
D.

lun set reservation


lun reservation set
lun map
lun create

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun set reservation lun_path [ enable | disable ]
Enables or disables the space reservation on the LUN. If no arguments are supplied after the lun_path, thenthe
space reservation status of the given lun_path is displayed. lun create -s size -t ostype [ -o noreserve ] [ -e
space_alloc ] lun_path This usage of the lun create command should be employed to create a new LUN of
given size, with initiallyzero contents. The LUN is created at the lun_path given. No file should already exist at
the given lun_path. Thedirectory specified in the lun_path must be a qtree root directory.
The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be used: c
(1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m).
The size of the created LUN could be larger than the size specified, in order to get an integral number
ofcylinders while reporting the geometry using SAN protocols.
The size of the LUN actually created is reported if it is different from that specified in the command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a
singleslicepartition), windows (the LUN will be used to store a raw disk device in a single- partition Windows
diskusing the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX data),
aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the LUN will
beused to store a Linux raw disk without any partition table), netware (the LUN will be used to store
NetWaredata), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to
storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be
used tostore Windows data for Windows 2008 systems), openvms (the LUN will be used to store Open-VMS
data),xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),
solaris_efi
By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.
"Pass Any Exam. Any Time." - www.actualtests.com 21
Network Appliance NS0-155 Exam
Using this option will create a LUN without any space being reserved. Provisioning threshold events can
beenabled by specifying -e space_alloc option. This option has to be used in conjunction with -o noreserve.
lun map [ -f ] lun_path initiator_group [ lun_id ]
Maps a LUN to all the initiators in the supplied group. If a LUN ID is not specified, the smallest number that
canbe used for the various initiators in the group is automatically picked. Note that this command can be
usedmultiple times to configure multiple maps for a LUN, or for an initiator group. Once created, you can use
lunshow -m to list all the LUN mappings. The optional -f argument disables checking with the HA partner for
LUN mapping conflicts.
QUESTION 33
Which Data ONTAP option sets system-wide for all transfers?
A.
B.
C.
D.

Options transfers.wide.enable
Options transfer.throttle.enable.
Option replication.wide.enable
Options replication.throttle.enable

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

replication.throttle.enableEnables global network throttling of SnapMirror and SnapVault transfers.


The default value for this option isoff.
replication.throttle.incoming.max_kbs
This option specifies the maximum total bandwidth used by all the incoming (applied at destination)
SnapMirrorand SnapVault transfers, specified in kilobytes/sec. The default value for this option is unlimited,
which meansthere is no limit on total bandwidth used. This option is valid only when the option
replication.throttle.enable ison.
replication.throttle.outgoing.max_kbs
This option specifies the maximum total bandwidth used by all the outgoing (applied at source) SnapMirror
andSnapVault transfers specified in kilobytes/sec. The default value for this option is unlimited, which means
thereis no limit on total bandwidth used. This option is valid only when the option replication.throttle.enable is
on.
QUESTION 34
What is the correct format for the scheduling component of a SnapVault schedule?
A.
B.
C.
D.

cnt[@day_list][@hour_list]
YYYY-MM-DD
Crontable format
List of dates in ISO Date format

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html http://www.geekyfacts.com/
index.php?option=com_content&view=article&id=64:snapvault snapvault snap sched [ -f ] [ -x ] [ -o options ]
[ volname [ snapname [ schedule]]] schedule is cnt[@day_list][@hour_list] or cnt[@hour_list][@day_list] In the
schedule, cnt tells SnapVault how many of the snapshots to keep for primaries and for nonSnapLocksecondary volumes. The snapshots will be numbered newest to oldest from 0 to cnt-1. When creating
a newsnapshot, SnapVault will delete the oldest snapshots, increment by one the number on the
remainingsnapshots and then create a new number 0 snapshot. If a snapshot is missing from the sequence
(e.g. sv.0,sv.1, and sv.3 exist but sv.2 does not), only snapshots that need to be renumbered to make room for
the newsv.0 snapshot will be renumbered. In the example, sv.0 and sv.1 would be renamed to sv.1 and sv.2,
but sv.3would remain unchanged.
The cnt in the schedule is interpreted differently for SnapVault secondary SnapLock volumes. For
SnapLocksecondary volumes, snapshots are created with a name that includes an encoded date and time of
when thesnapshot is created. These snapshots are never renamed and they are never automatically deleted.
Thesesnapshots may be deleted using snap delete after the retention period of the snapshot has expired. If cnt
is 0,no snapshots will be taken. If cnt is any non-zero value, snapshots will be taken and no snapshots will
beautomatically deleted.
If specified, the day_list specifies which days of the week the snapshot should be created. The day_list is
acomma-separated list of the first three letters of the day: mon, tue, wed, thu, fri, sat, sun. The names are
notcase sensitive. Day ranges such as mon-fri can also be given. The default day_list is mon-sun, i.e. every
day.
If specified, the hour_list specifies which hours of the day the snapshot should be created, on each
scheduledday. The hour_list is a comma-separated list of the hours during the day, where hours are integers
from 0 to23. Hour ranges such as 8-17 are allowed. Also, step values are allowed in conjuction with ranges.
Forexample, 0-23/2 means "every two hours". The default hour_list is 0, i.e. midnight on the morning of
eachscheduled day.
QUESTION 35

When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?
A.
B.
C.
D.

When the 64-bit volumes has Volume Guarantee disabled


When the 64-bit volume has compression enabled
When the 64-bit volume has FlexShare enabled
When the 64-bit volume has ASIS enabled

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-87340429-8F4A-4AA6-B0810F5040089C78.html
Data compression requires 64-bit aggregates.
QUESTION 36
UNIX allows file access based on___________.
A.
B.
C.
D.

NT ACLs and UNIX permissions.


NT ACLs and SID.
GID or UID and UNIX permissions.
GID or UID and ACLs.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBAB0BDA63560FECEFF.html
In OnTap 8.0, when UNIX security style is selected, only UNIX security objects can be used. The correctanswer
is GID, UID and UNIX permissions.
Basic UNIX permissions are organized into three classes: user, group, and others. UNIX operating systems
identify users with a numerical value: a user identifier, also known as a UID or UserID. Each user is a member
of a group of the same name as the user. Like UIDs, groups (GIDs) are alsospecified using a numerical value.
QUESTION 37
Which NetApp Storage Tier component works controller-wide on a FAS controller?
A.
B.
C.
D.
E.

Flash Pool
Flash Disk
Flash Accel
Flash Cache
Flash IO

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:

Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us http://www.netapp.com/us/
products/storage-systems/flash- cache/index.aspx?ref_source=ntp141p359372brg-c-26967a63-442e-c7e96a73- 00002efa4dd6&gclid=CLLdsqWKrbkCFS4aOgodb1AAuA
Flash Cache is a controller-attached PCIe intelligent caching solution.
Flash Accel is a host-attached caching solution.
Flash Pool utilizes SSDs to enhance performance of disk aggregates (implicitly not controller- wide).
Flash Disk and Flash IO are ambiguous terms.
QUESTION 38
Which NetApp Storage Tier component works aggregate-wide on a FAS controller?
A.
B.
C.
D.
E.

Flash Pool
Flash Disk
Flash Cache
Flash Accel
Flash IO

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us
http://www.netapp.com/us/products/platform-os/flashpool.aspx Flash Pool utilizes SSDs to enhance
performance of disk aggregates. Flash Cache is a controller-attached PCIe intelligent caching solution.
Flash Accel is a host-attached caching solution.
Flash Disk and Flash IO are ambiguous terms.
QUESTION 39
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve
set to 0%? (Choose two)
A.
B.
C.
D.

Snap Autodelete
iGroup throttle
LUN reset
Volume AutoSize

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional- reservation-lunoverwrite
From the article:
"If you reduce the Fractional Reservation to 0, you need to make sure the rate of change is within the
volumesize, or you need to make sure the volume can auto-grow when required or even snap auto-delete to
reducethe reserved blocks and free up space (although I am not a huge fan of snap auto-delete for various
reasons)."
QUESTION 40

Which set of protocols provide block-level access to NetApp storage?


A.
B.
C.
D.

SNA and RPC


iSCSI and FCP
HTTP and FTP
CIFS and NFS

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonlyreferred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP and
FTP provide file access not block access.
QUESTION 41
An iSCSI or FC SAN implementation provides ____________ access to LUNs.
A.
B.
C.
D.

VLD
VIIP
File
Block

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonlyreferred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP and
FTP provide file access not block access.
QUESTION 42
Which command on the storage system allows you to display statistics on the performance of system resource
such as CPU, NVRAM, network interfaces, and disks?
A.
B.
C.
D.

netstat
netdiag
pktt
sysstat

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html sysstat reports aggregated
filer performance statistics such as the current CPU utilization, the amount ofnetwork I/O, the amount of disk I/
O, and the amount of tape I/O.
QUESTION 43
Which three protocols can coexist on a NetApp storage system? (Choose three)

A.
B.
C.
D.
E.

DAFS
CIFS
DFS
FCP
NFS

Correct Answer: BDE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
Data OnTap can simultaneously serve NAS and SAN protocols. CIFS, NFS, and FC protocol are examples
ofNAS and SAN protocols respectively.
Data OnTap 7.1 or later does not support DAFS.
DFS provides location transparency and redundancy by allowing shares in multiple different locations to
belogically grouped under one folder, or DFS root. While practically a CIFS server shared by a Data OnTap
filercan be a DFS target, DFS namespaces can only be hosted on Windows systems.
QUESTION 44
Which three tools present statistics from the Data ONTAP counter manager? (Choose three)
A.
B.
C.
D.

Operations manager
Window perfmon
Sysstat
Stats

Correct Answer: ABD


Section: (none)
Explanation
Explanation/Reference:
Explanation: Section: OnTap Administration
Explanation
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html https://communities.netapp.com/
servlet/JiveServlet/previewBody/18684-102-5- 34635/TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performancestats-withoutperfstat-or-ops-mgr
Note in the diagram below how the performance tools integration with Data OnTap. statit and sysstatinterface
directly with the performance counters while the other tools - including stats, a command line tool -integrate with
the Counter Manager.

QUESTION 45
What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a
SnapVault secondary system?
A.
B.
C.
D.

MD5 authentication between SnapVault primary and secondary, with changeable password
Contents inside file called access and located in OSSV /snapvault/etc
QSM access list modifiable via svconfigurator
Via /etc/hosts.equiv file

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf In order to
restrict the NetApp secondary systems that are allowed to initiate backups from an OSSV host, theQSM Access
List field can be populated with the hostname of the secondary using the OSSVConfigurator utility. When using
this option, make sure the "Check QSM Access List" box is enabled.
The snapvault.access option on the NetApp secondary can be used to restrict the OSSV hosts that areallowed
to initiate restores from that secondary system. This option can be populated with a list of hostnamesfor each
OSSV host. For example:
options snapvault.access host=ossv1,ossv2,ossv3
Screenshot of the svconfigurator GUI; note the QSM access list checkbox and field.

QUESTION 46
Which command disables client access to Snapshot copies on a volume called flexvoll?
A.
B.
C.
D.
E.

cifs shares change flxvoll nosnap


snap access flexvoll off
vol options flexvoll nonsnapdir on
vol options flexvoll snapdir off
vol options flexvoll snapdir on

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html vol options nosnapdir [on|off]
If this option is on, it disables the visible .snapshot directory that is normally present at client
mount points, andturns off access to all other .snapshot directories in the volume. The default setting is off.

QUESTION 47
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster
site node. (Choose two)
A.
B.
C.
D.
E.

Use manual fencing


Use the cf giveback f command.
Use the cf forcetakeover d command.
Turn off power to the disaster site node.
Isolate the failed node from the surviving node.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://vipulvajpayeestorage.blogspot.com/2012/01/manually-failover-activity-in-netapp.html
In order to test or effect a Disaster Recovery operation, you must restrict access to the disaster site nodeto
prevent the node from resuming service. If you do not, you risk the possibility of data corruption.
Access to the disaster site note can be restricted in the following ways:
Turn off the power to the disaster site nodeUse "manual fencing" (Disconnect VI interconnects and fiber
channel cables; either physically or throughconfiguration changes on the fabric switches.) Isolating the failed
node from the surviving node could still lead to the possibility of a split brain, so this is not acorrect answer.
QUESTION 48
The two copies SyncMirror volume are called ____________, which are physical copies of the same file system
and consist of one or more RAID groups.
A.
B.
C.
D.

Snapshot copies
Aggregates
Plexes
Volumes

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA8FEE619EEF1D.html
SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for realtimemirroring of data to matching aggregates physically connected to the same storage system.
SyncMirror provides for synchronous mirroring of data, implemented at the RAID level. You can use
SyncMirrorto create aggregates that consist of two copies of the same WAFL file system. The twocopies,
known asplexes, are simultaneously updated. Therefore, the copies are always identical. The two plexes are
directlyconnected to the same system.
The following provides information about the activities of SyncMirror:
SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume isessentially an
aggregate with a single volume that spans the entire aggregate.) SyncMirror cannot be used to mirror FlexVol
volumes. However, FlexVol volumes can be mirrored as part ofan aggregate.
SyncMirror is different from synchronous SnapMirror.

QUESTION 49
You want to create an automated test environment that performs a single file SnapRestore time you run the
procedure, however, SnapRestore prompts you to confirm your decision to revert the file. How can you
automate this step?
A.
B.
C.
D.

Use the -f option with the snap restore command.


Enable the options snaprestore_noprompts enable = on option.
These prompts are for data protection and auditing and cannot be overridden.
Enter the priv set advanced mode on the storage system and prompt will not appear.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snap.1.html
snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name | restore_from_path
Reverts a volume to a specified Snapshot copy, or reverts a single file to a revision from a specified
Snapshotcopy.
Before reverting the volume or file, the user is requested to confirm the operation. The -f optionsuppresses this
confirmation step.
QUESTION 50
When viewing the output of the sysstat f command, which three fields are part of the output? (Choose three)
A.
B.
C.
D.
E.

FCP
FTP
CIFS
NFS
iSCSI

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html
sysstat [ -c count ] [ -s ] [ -u | -x | -m | -f | -i | -b ] [ -d ] [ interval ] -f For the default format display FCP statistics.
The FCP default output format is as follows:
CPU NFS CIFS FCP Net kB/s Disk kB/s FCP kB/s Cache
in out read write in out age
###% ##### ##### ##### ##### ##### ##### ##### ##### ##### >##
QUESTION 51
Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS users are now
complaining about getting "stale file handles" for the file. Which is the most likely cause of this problem, and the
best procedure to correct it?
A. This might be due to an NFS storage system and client mismatch. Check to see that these users have the
same version of the NFS client that existed at the time the snapshot was taken.
B. NFS users why try to access a reverted file without first reopening it might get a
handle" error message. Have the users try to reopen the file and see if the problem is resolved.

C. After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot their systems.
D. These users are on a different subnet from the others. Start troubleshooting by checking their subnet.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366698C1299E29D.html
Reverting a file to a selected Snapshot copy
Using snap restore to revert a single file to a selected Snapshot copy is practical when the file is so large
thatyou cannot copy the previous file version from the Snapshot copy to the active file system.
Before you beginEnsure that you notify the network users before reverting a file so that they know that the
current data in the filewill be replaced by that of the selected Snapshot copy.
Note: NFS users who try to access a reverted file without first reopening it might get a stale filehandle error
message after the volume reversion.
QUESTION 52
Using the output below, a co-worker determined that these are types "Solaris" LUNs. What would your
destination be?
lun show m LUN patch mapped to LUN ID ------------------------------------------------------/vol/vol1/lun0 solaris igroup0 0 /vol/vol1/lun solaris- igroup1
0 /vol/vol1/qtree1/lun2 solaris igroup2 0 /vol/vol1/qtree1/lun3 solaris igroup3 0
A.
B.
C.
D.

These are type "Solaris" LUNs.


Not enough information is given here. Run the lun status command to get the information requested.
Not enough information is given here. Run the lun show v command to get the information requested.
Not enough information is given here. Run the lun map command to get the information requested.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
Which statement is true about ASIS deduplication license with Data ONTAP 8.1?
A.
B.
C.
D.

The existing 8.0 license key is used.


A new license key is generated.
The license is capacity-based.
The license no longer exists.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:

https://library.netapp.com/ecmdocs/ECMP1120690/html/frameset.html
Changes to deduplication in 8.1 7-mode
Starting with Data ONTAP 8.1, you can enable the deduplication feature without adding a license.
For
deduplication, no limit is imposed on the supported maximum volume size. The maximum volume sizelimit
isdetermined by the type of storage system regardless of whether deduplication is enabled.
QUESTION 54
Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in
a level-0 resynchronization state when it failed?
A.
B.
C.
D.

Determine which volumes are at the remote and disaster sites.


Re-create the synchronous mirror.
Rejoin the two volumes.
Turn on power to the cluster node at the disaster site.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1210206/html/GUID-A865DB95-9418-4ED2-A99374F347F674A0.html
1. Validate that you can access the remote storage by entering the following command:
aggr status -r
Note: A (level-0 resync in progress) message indicates that a plex cannot be rejoined.
2. Turn on the power to the node at the disaster site. After the node at the disaster site boots up, it displays
thefollowing:
Waiting for giveback...(Press Ctrl-C to abort wait)
3. If the aggregates at the disaster site are online, take them offline by entering the following command for
eachaggregate that was split:
aggr offline disaster_aggr
disaster_aggr is the name of the aggregate at the disaster site. Note: An error message appears if the
aggregate is already offline.
4. Destroy every target plex that is in a level-0 resync state by entering the following command:
aggr destroy plex_name
5. Re-create the mirrored aggregates by entering the following command for each aggregate that was split:
aggr mirror aggr_name -v disaster_aggr
aggr_name is the aggregate on the surviving site's node. disaster_aggr is the aggregate on the disaster site's
node. The aggr_name aggregate rejoins the disaster_aggr aggregate to reestablish the
MetroClusterconfiguration.
6. Enter the following command at the partner node:
cf giveback
The node at the disaster site reboots.
QUESTION 55
When running deduplication on SnapVault destinations, which three statements are true?
A. The target SnapVault controller deduplicates inline.
B. The source SnapVault data is deduplicated inline on the target before it is written to disk.

C. Deduplication internally synchronizes with the SnapVault schedule on the destination.


D. The source (primary) system sends duplicated data even if the source data is deduplicated.
E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the snapshot
toeffectively deduplicate savings.
"Pass Any Exam. Any Time." - www.actualtests.com 36
Network Appliance NS0-155 Exam
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-E5AD37DE-2F44-47DB-90A3C8E115FCBFB7.html
SnapVault replicates at the file level not the block level. Deduplication is always a post-processed activity for
Data OnTap, while compression is an inline process.
The deduplication schedule depends on the SnapVault update schedule on the destination system.
A new Snapshot copy replaces the archival Snapshot copy after deduplication finishes running on
thedestination system. (The name of this new Snapshot copy is the same as that of the archival copy, but
theSnapshot copy uses a new timestamp, which is the creation time.) The SnapVault update recognizes the
deduplicated blocks as changed blocks. Thus, when deduplication is runon an existing SnapVault source for
the first time, all saved space is transferred to the destination system.
QUESTION 56
If you believe you create FC SAN performance problem, which NatApp utility would gather both your Solaris
host and storage system data for analysis?
A.
B.
C.
D.

sio_ntap.exe
prestart
poststat
perfstat

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/docs/DOC-1059
Performance and Statistics Collector (perfstat) is a data collection tool with several key properties:
Perfstat comes in exactly two flavors:
Supported platforms:
QUESTION 57
Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous SnapMirror?
A.
B.
C.
D.

FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms, cksum=crc32 syns


FilerA:source_vol FilerB:destination_vol 0-55/5 * * *
FilerA:source_vol FilerB:destination_vol sync
FilerA:source_vol FilerB:destination_vol outstanding=3s sync

Correct Answer: ACD

Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html Each relationship
entry of the /etc/snapmirror.conf file is a single line containing space-separated fields.
The entry has this format:
Source destination arguments scheduleschedule
This is the schedule used by the destination node for updating the mirror. It informs the SnapMirror
schedulerwhen transfers will be initiated. The schedule field can contain the word sync to specify fully
synchronousmirroring, semi-sync to specify semi-synchronous mirroring, or a cron-style specification of when to
update themirror.
visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h
(hours). If a suffix is not specified, value is interpreted as seconds. This argument controls the amount of
timebefore an automatic snapshot is created on the source volume that is synchronously mirrored. The value is
thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A small
numberhere can negatively affect the performance of the mirror. This argument is ignored for asynchronous
mirrors.
Outstanding (deprecated)
This argument controls the performance versus synchronicity trade-off for synchronous mirrors. The value
forthis argument is a number followed by the suffixes: ops (operations), ms (milliseconds) or s (seconds).
Settinga value less than 10s configures the mirror to run in fully synchronous mode. Setting a value greater
than orequal to 10s configures the mirror to run in semi-synchronous mode. This argument is ignored
forasynchronous mirrors. Please note that this is a deprecated option. Use the schedule field to specify
thesynchronous mode for the mirror.
cksum
This controls which checksum algorithm is used to protect the data transmitted by SnapMirror.
Currentlysupported values are "none", "crc32c", and "crc32c_header_only". The value
"crc32c_header_only" has beenadded only for volume SnapMirror and is not supported for synchronous
SnapMirror and qtree SnapMirror.
QUESTION 58
Which three are valid LUN commands? (Choose three)
A.
B.
C.
D.
E.

lun clone
lun copy
lun move
lun rename
lun snap

Correct Answer: ACE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:

QUESTION 59
Which three attributes would you specify when creating a LUN? (Choose three)
A.
B.
C.
D.

The host operating system of the system attached to LUN.


The version of Data ONTAP
The size of the LUN.
The path to the LUN.

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The usage for lun create is shown below. Options not in brackets are mandatory. lun create -s size -t ostype [ -o
noreserve ] [ -e space_alloc ] lun_path This usage of the lun create command should be employed to create a
new LUN of given size, with initiallyzero contents. The LUN is created at the lun_path given. No file should
already exist at the given lun_path. Thedirectory specified in the lun_path must be a qtree root directory.
The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix can be used: c
(1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m). The size of the created LUN could be larger than the size
specified, in order to get an integral number ofcylinders while reporting the geometry using SAN protocols.
The size of the LUN actually created is reported if it is different from that specified in the command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk in a
singleslicepartition), windows (the LUN will be used to store a raw disk device in a single- partition Windows
diskusing the MBR (Master Boot Record) partitioning style), hpux (the LUN will be used to store HP-UX data),
aix(the LUN will be used to store AIX data), vld (the LUN contains a SnapManager VLD), linux (the LUN will
beused to store a Linux raw disk without any partition table), netware (the LUN will be used to store
NetWaredata), vmware (the LUN will be used to store VMware data), windows_gpt (the LUN will be used to
storeWindows data using the GPT (GUID Partition Type) partitioning style), windows_2008 (the LUN will be
used tostore Windows data for Windows 2008 systems), openvms (the LUN will be used to store Open-VMS
data),xen (the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),
solaris_efi(the LUN will be used to store Solaris_EFI data).
By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be specified.
Using this option will create a LUN without any space being reserved. Provisioning threshold events can
beenabled by specifying -e space_alloc option. This option has to be used in conjunction with -o noreserve.

Exam B
QUESTION 1
Which three items are NFS resources for export? (Choose three.)
A.
B.
C.
D.
E.

aggregate
directory/qtree
file
subnet
volume

Correct Answer: BCE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can export any file path. Implicitly file paths are filesystem objects. You can export a directory, a qtree,
avolume or even a file.
QUESTION 2
Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3740.pdf&cc=us
SMB 2.0 support was included in Data OnTap 8.1.
QUESTION 3
In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore operations
on the file or volume cannot rely on the timestamps to determine what data needs to be backed up or restored.
Which course of action ensures correct incremental backups?
A.
B.
C.
D.

Perform a base-level backup of the volume after you restore it.


Reboot the storage system to reset timestamps back to their original times before the reversion.
Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.
Take a new snapshot of the volume to create new base-level timestamps for the incremental backup, and
then perform a base-level backup of the volume after you restore it.

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
A baseline (aka "full") backup is always required before valid incremental backups can be made.

QUESTION 4
Which changes the NDMP password on the Open System SnapVault agent?
A.
B.
C.
D.

password
password <new_password>
svpasswd <new_password>
svpassword <new_password>

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://kb.netapp.com/support/index?
Page=content&id=2010134&actp=LIST_RECENT&viewlocale=en_US&searchid=1296570465177 The
svpassword command is available on the OSSV host as part of the agent binaries in the path
<INSTALL_PATH>\netapp\snapvault\bin.
QUESTION 5
Which three licenses are required for fabric-attached MetroCluster? (Choose three.)
A.
B.
C.
D.
E.

Cluster
Cluster_remote
Syncmirror_local
Syncmirror_fabric
Syncmirror_remote

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf http://
backdrift.org/man/netapp/man1/na_license.1.html In preparation for a fabric attached metrocluster
configuration, the following licenses must be installed:
Clustersyncmirror _local
cluster_remote
syncmirror_fabric and syncmirror_remote are not valid license types.
QUESTION 6
Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)
A.
B.
C.
D.

A LUN can be converted into a VLD.


LUNs can be accessed using the FCP protocol.
LUNs can be accessed using the iSCSI protocol.
Block services are associated with an iSCSI or FCP SAN environment.

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
Explanation:

Sadly, you cannot convert a LUN into a Vulcan Language Dictionary.


QUESTION 7
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utility.
(Choose two.)
A.
B.
C.
D.
E.

AutoSupport
Bugs Online
NetApp Diagnostics
Release Comparison
System Configuration Guide

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Thisquestionis out of date, but its still on the exam as of Sept2013! NOW has been replaced with
support.netapp.com.
You should be very familiar with what AutoSupport does. Also if you have done any research, you know thatthe
System Configuration Guide is an invaluable tool that you will use regularly. Neither of those are related tobugs.
Bugs Online (BOL) is located at http://support.netapp.com/NOW/cgi-bin/bol/ Bugs Online provides a suite
oftools to help manage and resolve your bug issues.
The Release Bug Advisor is located at
http://support.netapp.com/NOW/cgi-bin/relrec
There is also a Version Comparison tool available at
https://communities.netapp.com/docs/DOC-8168/diff?secondVersionNumber=8
QUESTION 8
Which two commands on the storage system allow you to gather detailed statistics about network interfaces,
including basic information about network connections? (Choose two.)
A.
B.
C.
D.

ifstat -a
netdiag -n
netstat -i
sysstat 1

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
ifstat -a provides detailed statistics (multiple pages) about all network interfaces. netstat -i provides a list of
connections and open network sockets (listeners). netdiag -n will perform a diagnostic but does not provide
detailed statistics about networking. sysstat 1 will provide performance statistics but not detailed statistics about
networking.
QUESTION 9
To configure a storage system as a member of a Windows active directory domain, the time on the storage
system must be set to be within plus or minus five minutes of the time on the domain controller.
A. True

B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 10
For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must do
what?
A.
B.
C.
D.

Enter the CIFS user in the NIS database.


Enter the user names in the /etc/hosts.equiv file.
Use both a NIS server and a Domain Controller in the network.
Nothing: mapping will occur if user name authentication is available.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79EAB803E7A8EB.html
If the user names in the UNIX password database are identical to the Windows names, you need not
providethe mapping information in the /etc/usermap.cfg file.
QUESTION 11
If the security style is set to UNIX, CIFS client file access is determined by ___________.
A.
B.
C.
D.

NT ACLs
the last client to set permissions
the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79EAB803E7A8EB.html
For Data ONTAP to obtain the UID and GIDs for a CIFS user, it must first determine the user's UNIXstylename. It does this through user mapping.
QUESTION 12
NTFS allows file access based on ___________.
A. NT ACLs and SID.
B. NT ACLs and UNIX permissions.
C. SID and password.

D. UNIX permissions.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBAB0BDA63560FECEFF.html
In OnTap 8.0, when NTFS security style is used, only Windows style security objects are used. For CIFS
clients, security is handled using Windows NTFS ACLs. For NFS clients, the NFS UID (user id) is mapped to a
Windows SID (security identifier) and its associatedgroups. Those mapped credentials are used to determine
file access, based on the NFTS ACL.
QUESTION 13
UNIX allows file access based on __________.
A.
B.
C.
D.

GID or UID and ACLs.


GID or UID and UNIX permissions.
NT ACLs and SID.
NT ACLs and UNIX permissions.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
* Unix-like operating systems identify users within the kernel by an unsigned integer value called a user
identifier, often abbreviated to UID or User ID. The range of UID values varies amongst different systems; at
the very least, a UID represents a 15-bit integer, ranging between 0 and
The UID value references users in the /etc/passwd file. Shadow password files and Network Information
Service also refer to numeric UIDs. The user identifier has become a necessary component of Unix file
systems and processes.
* In POSIX-compliant environments the command-line command id gives the user's user identifier number as
well as more information on the user account like the user name, primary user group and group identifier (GID).

* Files and directories are owned by a user. The owner determines the file's owner class. Distinct permissions
apply to the owner.
Files and directories are assigned a group, which define the file's group class. Distinct permissions apply to
members of the file's group members. The owner may be a member of the file's group. Users who are not the
owner, nor a member of the group, comprise a file's others class. Distinct permissions apply to others.
The effective permissions are determined based on the user's class. For example, the user who is the owner of
the file will have the permissions given to the owner class regardless of the permissions assigned to the group
class or others class.
QUESTION 14
Executing this command will have what effect?
Options wafl.default_security_style ntfs

A.
B.
C.
D.

It will set the security style of all files to be ntfs.


It will change the security style of all qtrees to be ntfs.
It will change the security style of all existing volumes to be ntfs.
It will set the security style of all newly created volumes to ntfs.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
wafl.default_security_style
Specifies the default security style assigned to a new volume. All qtrees created on the volume get this as
theirsecurity style. Legal values for this option are `unix', `ntfs', or `mixed'. The default value for this option is
`unix',unless the node is an NTFS-only node, in which case the default is `ntfs'. Note: if cifs setup is run after
setting wafl.default_security_style, the filer will become an NTFS security stylefiler.
QUESTION 15
Which two statements apply to an entry in the /etc/exports file regarding exporting directories/qtrees and
volumes? (Choose two.)

A.
B.
C.
D.

Each volume must be exported separately.


Exports are accessible only to hosts with names.
User names used in an export must be resolvable.
Exports can access multiple paths on the same volume.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html
IP addresses and wildcards can be used when specifying host targets in exports. User names are not valid
exports options, save for the anon option which utilizes a local system UID or username (i.e. no user name
mapping or resolution is performed.) The highest level in the filesystem that can be specified for an export is
the volume level. Implicitly this meansthat each volume must be exported separately. An export provides
access to paths below the export, implying that multiple paths on the same volume can beexported from an
export.
QUESTION 16
To automatically export volumes and directories on storage system reboot, include them in the /etc/exports file.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

The /etc/exports file contains a list of export entries for all file system paths that Data ONTAP
exportsautomatically when NFS starts up.
QUESTION 17
Which exportfs command will temporarily export the resource while ignoring the options specified in the /etc/
exports file?

A.
B.
C.
D.

exportfs -a
exportfs -i
exportfs -u
exportfs -v

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 18
Which two are Data ONTAP commands for displaying performance information? (Choose two.)
A.
B.
C.
D.

nfsstat
perfstat
sio_ntap_soll
sysstat

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html https://library.netapp.com/
ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html
nfsstat and sysstat are OnTap commands used for performance information.
sio_ntap_soll is not an OnTap command.
Perfstat is a GUI performance tool, not an OnTap command. Think of PerfMon for Windows to remind you
thatPerfStat is a Windows tool. Note how many of the ONTAP performance commands end in stat.
QUESTION 19
Which statement best describes the output of this command? sysstat -s 5
A.
B.
C.
D.

Display the default output every five seconds and terminate after five counts.
Display extended output every five seconds and print a summary after five counts.
Display extended output every five seconds and print a summary upon termination.
Display the default output every five seconds and print a summary upon termination.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html -s
Display a summary of the output columns upon termination, descriptive columns such as `CP ty' will nothave
summaries printed. Note that, with the exception of `Cache hit', the `Avg' summary for percentage valuesis an
average of percentages, not a true mean of the underlying data. The `Avg' is only intended as a grossindicator
of performance. For more detailed information use tools such as na_nfsstat, na_netstat, or statit.
QUESTION 20
To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set on.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html
nfs.per_client_stats.enable
Enables/disables the collection and display of perclient NFS statistics, as described in na_nfsstat(1).
Validvalues for this option are on or off. The default value for this option is off.
QUESTION 21
Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)
A.
B.
C.
D.

lun create
lun config
lun make
lun setup

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:

Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
QUESTION 22
In a Fibre Channel configuration, the host's HBA is referred to as the ___________, and the storage system's
HBA is referred to as the __________ .
A.
B.
C.
D.

initiator, target
primary, secondary
secondary, primary
target, initiator

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://en.wikipedia.org/wiki/SCSI_initiator_and_target
QUESTION 23
Before running lun setup on the storage system, you must first create the igroup to which the initiator will be
attached.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun setup
Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
QUESTION 24
These are three methods of creating a LUN:
* lun create
* lun map
* lun setup
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html The following commands are
available in the lun suite:

Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping configuration.
lun map [ -f ] lun_path initiator_group [ lun_id ]
Maps a LUN to all the initiators in the supplied group
"Pass Any Exam. Any Time." - www.actualtests.com 52
Network Appliance NS0-155 Exam
QUESTION 25
Which set of commands should be used for troubleshooting Ethernet connectivity problems from the storage
system console?
A.
B.
C.
D.

ifstat, netdiag
perfstat, tracert
sysconfig - cr, sysstat
dish shm_stats, sysstat

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html http://backdrift.org/man/netapp/
man1/na_netdiag.1.html
ifstat - display device-level statistics for network interfaces netdiag - perform network diagnostics
QUESTION 26
Which command displays the statistics for Ethernet network interfaces?
A.
B.
C.
D.

ifconfig
ifstat
sysconfig
sysstat

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html ifstat - display device-level
statistics for network interfaces
QUESTION 27
Which command is used to set the configuration of an Ethernet network interface?
A.
B.
C.
D.

ifconfig
ifstat
netstat - i
sysconfig - v

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_ifconfig.1.html
ifconfig - Configures network interface parameters.
QUESTION 28
What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose three.)
A.
B.
C.
D.
E.

Use reallocate -p pathname to run the physical reallocate.


Use aggr reallocate -p pathname to run the physical reallocate.
Reinitialize any SnapMirror relationship for the new physical geometry.
Volume Snapshots do not need to be deleted for the reallocate to run effectively.
Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP earlier than
7.2.

Correct Answer: ADE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html
The -p option requests that reallocation of user data take place on the physical blocks in the aggregate, but
thelogical block locations within a flexible volume are preserved. Aggregate reallocation is not supported on
aggregates created prior to Data ONTAP 7.2. Using the -p option may reduce the extra storage requirements in
a flexible volume when reallocation is run ona volume with snapshots. It may also reduce the amount of data
that needs to be transmitted by SnapMirror onits next update after reallocation is performed on a SnapMirror
source volume.
QUESTION 29
Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for the next
SnapMirror update.

A. True
B. False
Correct Answer: B
Section: (none)

Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html Using the -p option may
reduce the extra storage requirements in a flexible volume when reallocation is run ona volume with snapshots.
It may also reduce the amount of data that needs to be transmitted by SnapMirror onits next update after
reallocation is performed on a SnapMirror source volume.
QUESTION 30
A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects the state of
the ____________ at the time the snapshot was created.
A.
B.
C.
D.

qtrees
volume
directory
storage system

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_snap.1.html
Snapshots can be made of volumes or aggregates; most commonly the former. Thequestionrefers to a
filesystem, or more specifically a volume.
You cannot snapshot directories or qtrees alone.
QUESTION 31
Data ONTAP uses inodes in an active file system to reference ___________.
A.
B.
C.
D.

qtrees
disk blocks
file segments
Snapshot copies

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
All data, whether file or block-based, resides in 4KB blocks on disk. A group of related blocks make up a file.To
accommodate different file sizes, the WAFL filesystem describes each file with reference pointers calledinodes.
https://communities.netapp.com/servlet/JiveServlet/previewBody/5027-102-1- 6953/PS%20Tech%20Note%
20018%20-%20maxfiles.pdf
Topic 2, Volume B
QUESTION 32
Which command disables client access to Snapshot copies on a volume called flexvol1?
A. cifs shares -change flexvol1 -nosnap
B. snap access flexvol1 off

C. vol options flexvol1 nosnapdir on


D. vol options flexvol1 snapdir off
E. vol options flexvol1 snapdir on
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 33
When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list
command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n, the
_________ the snapshot.
A.
B.
C.
D.

older
newer
more important
least important

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
where n is an integer. The most recent weekly Snapshot copy is weekly.0, weekly.1 is the next most
recentweekly Snapshot copy, and so on.
https://library.netapp.com/ecmdocs/ECMP1113957/html/GUID-1D3B0C7D-D94E-43A3-90915E76003E16EB.html
QUESTION 34
A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.
A.
B.
C.
D.

125
251
255
Depends on capacity and number of disk drives

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 35
Which three are pre-requisites for using SnapRestore? (Choose three.)
A. The volume to be reverted must be offline.
B. The volume to be reverted must not be a SnapMirror destination.
C. You must enter the SnapRestore license code before you can use it.

D. Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You must meet certain prerequisites before using SnapRestore:
- SnapRestore must be licensed on your storage system.
- There must be at least one Snapshot copy on the system that you can select to revert.
- The volume to be reverted must be online.
- The volume to be reverted must not be in use for data replication. http://hd.kvsconsulting.us/
netappdoc/733docs/html/ontap/onlinebk/GUID-A14081A3-9270-47EE- A1C1-EC52D3ABDBD0.html
QUESTION 36
Which command or procedure would you use to undo a volume SnapRestore operation?
A.
B.
C.
D.

snap restore -r vol


snap revert -s vol
snap restore undo vol
You cannot undo a SnapRestore operation at the volume level.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SnapRestore overwrites all data in the file or volume. After you use SnapRestore to revert to a selected
Snapshot copy, you cannot undo the reversion.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-80FEDAF8-75FA-4E43- B68358C1F66B61E2.html
QUESTION 37
What happens after you use SnapRestore to revert a volume to a specific snapshot?
A.
B.
C.
D.

You must bring the volume back online.


The storage system automatically performs a snapshot for that volume.
The Snapshot copies that are older than the snapshot you used are deleted.
The Snapshot copies that are more recent than the snapshot you used are deleted.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
After you revert a volume to a selected Snapshot copy, you lose all the Snapshot copies that were taken
afterthe selected Snapshot copy.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-80FEDAF8-75FA-4E43-B68358C1F66B61E2.html

QUESTION 38
Which three statements are true when using SnapRestore? (Choose three.)
A.
B.
C.
D.

The volume must be online.


SnapRestore must be licensed before you can use it.
The snap restore enable on option must be enabled.
The volume to be reverted must not be a SnapMirror destination mirror.

Correct Answer: ABD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 39
Which objects can be restored by a single SnapRestore command? (Choose three)
A.
B.
C.
D.
E.

file
LUN
qtree
volume
directory

Correct Answer: ABD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
SnapRestore on a file and volume:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-1E99ACB2-5C69-4FFC-B1159D2951D109E9.html
SnapRestore on a LUN:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F0455E736962FD1.html
Hint: snaprestore at the volume level or at the file level. LUNs are effectively files.
QUESTION 40
Which option of the snap restore command allows you to specify a different directory, as long as the directory
already exists?

A.
B.
C.
D.

snap restore -c
snap restore -d
snap restore -r
snap restore s

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:

snap restore [ -A | -V ] [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name |


restore_from_path
See more at:http://wafl.co.uk/snap/#sthash.nJiEwxGV.dpuf
QUESTION 41
A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago.
Which command continues the relationship?
A.
B.
C.
D.
E.

SnapMirror initialize
SnapMirror quiesce
SnapMirror resume
SnapMirror resync
SnapMirror update

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You can use the snapmirror resync command to reestablish the connection between the source and
thedestination. This command is applied after the SnapMirror relationship between the source and destination
isbroken.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-5D846D24-0903-4982-A42971AE5C0F9033.html
QUESTION 42
When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)
A. The source volume must be offline.
B. SnapMirror must be licensed for each storage system.
C. If you are replicating a volume, you must create a restricted volume to be used as the SnapMirror.
"Pass Any Exam. Any Time." - www.actualtests.com 60
Network Appliance NS0-155 Exam
D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the source
destination volume.
Correct Answer: BCD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You need to fulfill a set of prerequisites before you can use SnapMirror:
- You must purchase and enable the SnapMirror license. If the SnapMirror source and destination are
ondifferent systems, you must enable the SnapMirror license on each system.
- For SnapMirror volume replication, you must create a restricted volume to be used as the destination volume.
SnapMirror does not automatically create a volume. For information about how to create volumes, see
thesection on organizing data using volumes and qtrees in the Data ONTAP Storage Management Guidefor 7Mode.
- For SnapMirror volume replication, the destination system must use a version of Data ONTAP that is thesame
as or later than that of the SnapMirror source system.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-ED9C09EF-3F61-41FE-B8F136356C5FEC5F.html

QUESTION 43
Which command would you use to verify that the iSCSI service is running?
A.
B.
C.
D.

iscsi protocol
iscsi service
iscsi show
iscsi status

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
iscsi status - displays current status of the iSCSI service.
http://wafl.co.uk/iscsi/#sthash.GzOHA2Tj.dpuf
QUESTION 44
Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two.)
A.
B.
C.
D.

snapmirror resync
snapmirror release
snapmirror initialize
options snapmirror.access on

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 45
You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled updates?
A.
B.
C.
D.

snapmirror restart
snapmirror resume
snapmirror resync
snapmirror update

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
snapmirror resume destination
Resumes transfers to destination. The snapmirror resume command can be used either to abort a snapmirror
quiesce in progress or undo a previously completed snapmirror quiesce. The command restoresthe state of the
destination from quiescing or quiesced to whatever it was prior to the quiesce operation.
http://wafl.co.uk/snapmirror/#sthash.5u3eilbK.dpuf
QUESTION 46
In a volume SnapMirror relationship, the source and destination volumes must be the same size.

A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In an active volume SnapMirror relationship, the size of the source and destination file systems is identical.
However, the size of the destination volume can be larger than or equal to the size of the source volume.
Thesize of the file systems must be identical to allow the source to be restored from the destination.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE5EE692-81CF-4569-A70300B4E283CE99.html
QUESTION 47
Which two statements apply to the fs_size_fixed volume option? (Choose two.)
A.
B.
C.
D.

The default setting is on.


This option is automatically set to be on when a volume becomes a SnapMirrored volume.
This option turns to off after the snapmirror break command is issued for the relationship.
This option causes the SnapMirror destination volume to remain the same size and not grow or shrink when
a SnapMirrored volume relationship is broken.

Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
This option causes the file system to remain the same size and not grow or shrink when a SnapMirroredvolume
relationship is broken, or when a vol add is performed on it. This option is automatically set to be onwhen a
volume becomes a SnapMirrored volume. It will remain on after the snapmirror break command isissued for the
volume. This allows a volume to be SnapMirrored back to the source without needing to adddisks to the source
volume. If the volume size is larger than the file system size, turning off this option will forcethe file system to
grow to the size of the volume. The default setting is off.
http://wafl.co.uk/vol-2/#sthash.DbEHR4YS.dpuf
QUESTION 48
Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)
A.
B.
C.
D.

The default interval value is five minutes.


The smallest interval value supported is 30 seconds.
This variable controls the view of the data on the destination system.
By setting a value, you specify the amount of time before an automatic snapshot is created on the source
volume that is synchronously mirrored.

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/media/tr-3326.pdf

http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html http://hd.kvsconsulting.us/netappdoc/733docs/
html/ontap/onlinebk/GUID-47724B21-7C7E-4AC9- A497-9505B42C27AF.html
With SnapMirror Sync and SnapMirror Semi-Sync, changes to the source volume do not show upimmediately
on the destination volume, even though the changes have been replicated. The changesare first shown after
the source system creates an automatic Snapshot copy of the source volume.
Snapshot copies created on the source volume are immediately propagated to the destination volume.
Theautomatic Snapshot copies are created every three minutes by default.
To change the interval for automatic Snapshot copies, change the visibility_interval in the snapmirror.conf file;
however, performance can degrade if set to a smaller interval because frequent
Snapshot copies cause additional processing such as cache consistency checking on the destination system.
There is also a disadvantage in setting this to a large value. When the connection between the systems has
anoutage and SnapMirror goes into asynchronous mode, SnapMirror uses the last common Snapshot copy
totransition into synchronous mode. This means that all data from the last valid common Snapshot copy will
needto be replicated from the source to the destination storage system. If the visibility_interval is set to alarge
value, a large amount of data might have to be transferred and itmight take longer time for SnapMirror
totransition into synchronous mode. For these reasons, keep the default value of three minutes.
visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m (minutes) or h
(hours). If a suffix is not specified, value is interpreted as seconds. This argument controls the amount of
timebefore an automatic snapshot is created on the source volume that is synchronously mirrored. The value is
thenumber of seconds between automatically created snapshots. The default value is 3 minutes. A small
numberhere can negatively affect the performance of the mirror. This argument is ignored for asynchronous
mirrors.
"Pass Any Exam. Any Time." - www.actualtests.com 64
Network Appliance NS0-155 Exam
visibility_interval={xs | xm | xh}
Determines the amount of time before an automatic Snapshot copy is created on the source volume that
isbeing replicated using synchronous or semi-synchronous SnapMirror. When replicating synchronously or
semisynchronously,using SnapMirror, changes to the source volume do not show immediately on the
destinationvolume, even though the changes have been replicated. The changes are shown only after the
source systemtakes an automatic Snapshot copy of the source volume. This event occurs every three minutes
by default.
You can change the interval for automatic Snapshot copies, but performance can degrade if you set
smallerintervals because Snapshot copies are taken more often. The smallest interval you can set is 30
seconds.
Note: The s, m, and h suffixes specify seconds, minutes, and hours, respectively.
QUESTION 49
SnapMirror will automatically try to restart a transfer after ___________.
A.
B.
C.
D.

an initial transfer is interrupted


a manual update is interrupted
a transfer interrupted by reboot
a scheduled incremental update is interrupted

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
If a scheduled transfer fails (for example, due to network failure), SnapMirror automatically retries the

transferthe next minute.


http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-511EAA86-069A-42E8- B62E3168C7F0A83D.html
QUESTION 50
Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a synchronous
SnapMirror relationship?
A.
B.
C.
D.

sync
cksum
src_con
outstanding

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
To convert an asynchronous SnapMirror relationship to a synchronousSnapMirror relationship, on
theadministration host, edit the snapmirror.conf file on the destination system to change the schedule to sync.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-A78BDBC9-610B-4555-A2DECE6861D92614.html
QUESTION 51
Which option will allow a storage system to SnapMirror from this source system?
A.
B.
C.
D.

snapmirror.access
snapmirror.destination
options snapmirror.allow host =
options snapmirror.access host =

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The snapmirror.access option is the preferred method for controlling snapmirror access on a snapmirrorsource
filer.
http://www.wafl.co.uk/snapmirrorallow/#sthash.4Cb8IqqN.dpuf
QUESTION 52
Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?
A.
B.
C.
D.

Running snapmirror update on the source storage system


Running snapmirror release on the source storage system
Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Explanation:
QUESTION 53
Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)
A.
B.
C.
D.

throttle
visibility interval
outstanding=3s in DOT 7.2
using option semi-sync in DOT 7.3 and higher

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 54
A NearStore license increases the amount of concurrent replication streams.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 55
Which is true of the SnapVault backup of a NetApp storage system?
A.
B.
C.
D.

The file is the basic unit for SnapVault backup destination.


The qtree is the basic unit for SnapVault backup destination.
The volume is the basic unit of SnapVault backup destination.
The directory is the basic unit for SnapVault backup destination.

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140EB147B941BDA.html
The data structures that are backed up and restored through SnapVault depend on the primary system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore. SnapVault
backs up specified qtrees on the primary system to associated qtrees on the SnapVaultsecondary system. If
necessary, data is restored from the secondary qtrees back to their associated primaryqtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup. SnapVault backs
upspecified directories from the native system to specified qtrees in the SnapVault secondary system.
If necessary SnapVault can restore an entire directory or a specified file to the open systems platform.
The destination system uses a slightly more disk space and directories than the source system.

QUESTION 56
Which system is recommended as a secondary system for SnapVault?
A.
B.
C.
D.

IS1200
DataFort
NearStore VTL
FAS with NearStore license

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 57
Which statement applies to the Open Systems SnapVault Free Space Estimator utility?
A.
B.
C.
D.

This utility runs automatically after each transfer.


This utility must be enabled on the secondary storage system.
This utility determines if there is sufficient disk space available on the primary to perform an OSSV transfer.
This utility determines if there is sufficient disk space available on the secondary to perform an OSSV
transfer.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 58
The snapvault snap sched -x command is used to ____________.
A.
B.
C.
D.

schedule full backups


cancel scheduled backups
schedule baseline transfer
schedule incremental backups

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 59
The snapvault snap create volume snapname command can be executed on the ___________.
A.
B.
C.
D.

open systems
primary system only
secondary system only
secondary or primary systems

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 60
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your
primary system.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 61
Which three statements apply to NearStore Personality license? (Choose three.)
A.
B.
C.
D.

It increases the storage capacity.


It converts the destination storage system to a NearStore system.
It requires the nearstore_option license on the destination storage system.
It provides increased concurrent streams when the storage systems are used as destinations for
SnapMirror and SnapVault transfers.

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
Explanation:

Exam C
QUESTION 1
Which Data ONTAP option sets system-wide throttling for all transfers?
A.
B.
C.
D.

options transfer.wide.enable
options transfer.throttle.enable
options replication.wide.enable
options replication.throttle.enable

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 2
The qtree specified for ____ must not exist on the secondary system before you run the ____ command.
A.
B.
C.
D.

pri_qtree_path, snapvault start


sec_qtree_path, snapvault start
pri_qtree_path, snapvault initialize
sec_qtree_path, snapvault initialize

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
snapvault initialize is not a valid command
http://backdrift.org/man/netapp/man1/na_snapvault.1.html snapvault start -r [options] -S [prim_system:]
prim_qtree_path [sec_system:] sec_qtree_path
pri_qtree_path is not a valid command
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-DB31E1F4-60A8-4F34- A1C48F79754E4DE2.html
QUESTION 3
The snapvault restore command is run on the _________.
A.
B.
C.
D.

secondary system to push data to the primary system


primary system to pull data from the secondary system
secondary system to pull data from the primary system
secondary system to push data to the primary storage system

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html

The snapvault command has a number of subcommands. The set of subcommands differs on the primaryand
secondary.
On the primary, the subcommands allow users to configure and manage a set of snapshots for
potentialreplication to the secondary, to abort replication transfers to the secondary, to check status, to restore
datafrom the secondary, and to release resources when a primary qtree will no longer be replicated to
asecondary.
On the secondary, the subcommands allow users to configure and manage the replication of primary paths
tosecondary qtrees, to configure and manage the snapshot schedules which control when all the qtrees in
asecondary volume are updated from their respective primary paths and how many snapshots to save, to
aborttransfers, to check status, and to release resources preserved to restart backups from a restored qtree.
QUESTION 4
To restore a qtree protected with SnapVault from the secondary storage system to the primary
storage system, you can ______________. (Choose two.)
A.
B.
C.
D.

restore to a non existing qtree with DOT 7. 2


add the new qtree to the primary storage system with DOT 7.2
overwrite the existing qtree on the primary storage system with DOT 7.3
delete the existing qtree from the secondary storage system with DOT 7.3

Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DB31E1F4-60A8-4F34-A1C48F79754E4DE2.html
You use the snapvault restore command to restore a backed-up qtree saved to the secondary system.
Startingwith Data ONTAP 7.3, you can restore the data to an existing qtree on the primary system using
baselinerestore or incremental restore.
QUESTION 5
The snapvault update command is only available on the secondary system.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html snapvault update [ -k n ] [ s snapname ] [ -w ] sec_ondary_qtree Available on the secondary only. Immediately starts an update of the
specified qtree on the secondary.
QUESTION 6
The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.
A. True
B. False

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf
Pg 17
OSSV hosts listen for communications from NDMP manager applications on port 10000 by default.
QUESTION 7
What security mechanism can an administrator use on an OSSV client to set permissions allowing backups to
a SnapVault secondary system?
A.
B.
C.
D.

Via /etc/hosts.equiv file


QSM access list modifiable via svconfigurator
Contents inside a file called access and located in OSSV /snapvault/etc
MD5 based authentication between SnapVault primary and secondary, with changeable password

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 8
Which tool is available on an OSSV client to assist in starting or stopping the OSSV service, modifying NDMP
settings, enabling debugging, and capturing trace files?
A.
B.
C.
D.

Operations Manager
Protection Manager
Svconfigurator GUI
svdebug.exe

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://synergy-ds.com/netapp/tr-3466.pdf

QUESTION 9
Which three statements are true about SnapLock volumes? (Choose three.)
A.
B.
C.
D.

SnapMirror supports SnapLock volumes.


There are two types of SnapLock volumes.
SnapLock volumes support per-file retention periods.
In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V- Series
controller with NetApp Storage.

Correct Answer: ABC


Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-8ACE3CAB-D338-4AFC-A5300D0FEC3B9F94.html
The snaplock command manages compliance related functionality on the system. A volume created using
thevol command (see na_vol(1)) is a snaplock volume when either the enterprise or compliance option is
chosen.
Enterprise and compliance SnapLock volumes allow different levels of security assurance. https://
library.netapp.com/ecmdocs/ECMP1196889/html/GUID-D4533C47-441D-41AB-A8A2- 272A2BFC431C.html
SnapLock operates fundamentally at the file level.
QUESTION 10
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the
Snapshot schedule.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-83A15F85-92A1-4EA8-A9ECB9E0E2269E37.html
QUESTION 11
A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination
volume has unexpired WORM files.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-4B97B80F-D208-4154-95BFD7FF9F5BEE11.html
A volume SnapMirror relationship is not allowed between two SnapLock Compliance volumes if
the destinationvolume has unexpired files.
QUESTION 12
What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
A.
B.
C.
D.

1
2
4
6

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Explanation:
You can cable a maximum of two disk shelves on each loop https://library.netapp.com/ecm/ecm_download_file/
ECMP1210206
QUESTION 13
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
A.
B.
C.
D.

disk own -s
disk show -v
vol status -r
disk display r

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
disk show [ -o <ownername> | -s <sysid> | -n | -v | -a]
Used to display information about the ownership of the disks. Available only on systems with softwarebaseddisk ownership. -o lists all disks owned by the filer with the name <ownername> -s lists all disks owned
bythe filer with the serial number <sysid> -n lists all unassigned disks. -v lists all disks. -a lists all assigneddisks.
QUESTION 14
To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
For a detailed breakdown of the procedure see the following KB https://kb.netapp.com/support/index?
page=content&id=1011576
QUESTION 15
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both
storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file
on the NFS mount point for the inaccessible system, but you get the following error:

NFS server filer2 not responding still trying.


When not in takeover mode, both storage systems operate normally and you do not get the error. You perform
a "cf giveback" and you can now create a file over NFS on both systems. What should you do first to resolve
this issue?
A.
B.
C.
D.

Replace the NIC adapter.


Submit a new bug report.
Use the cluster-config-checker.cgi to identify the problem and corrective action.
Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Thisquestionimplies that there is an issue with the clustering of the two controllers. Since this is the case youwill
want to run the cluster configuration checker to identify and resolve any issues.
https://library.netapp.com/ecmdocs/ECMM1278349/html/upgrade/upgrading/concept/c_oc_upg_b
4_active2.html
QUESTION 16
Each storage system in a cluster must have network access to the __________.
A.
B.
C.
D.

Internet
cluster partner
same administration
host same collection of subnets

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
All the network ports should be assigned correct port roles, and all the network ports should be in the
samesubnet.
https://library.netapp.com/ecm/ecm_download_file/ECMP1196907
QUESTION 17
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the
command line. To make this configuration persistent across reboots, you must enter this information in the
_____ file for each system.
A.
B.
C.
D.

/etc/rc
/etc/hosts
/vol/vol0/home
/vol/vol0/mount

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

Explanation:
Startup commands for your storage system are stored in the /etc/rc file. The /etc/rc file
containscommands that the storage system executes at boot time to configure the system.
Commands in the /etc/rc file configure the storage system to:
Communicate on your network
Use the NIS and DNS services
Save the core dump that might exist if the storage system panicked before it was booted
https://library.netapp.com/ecmdocs/ECMM1278265/html/sysadmin/accessing/concept/c_oc_accs_
systemstartup-etc-rc-file.html#c_oc_accs_system-startup-etc-rc-file
QUESTION 18
What is the maximum distance between a standard clustered pair at 2Gbps?
A.
B.
C.
D.

10 meters
50 meters
100 meters
500 meters

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
The maximum cable length supported for 2Gbps is 500m, the same as the max cable length between a
NetAppstorage system and a FC switch.
Stretch MetroCluster(sometimes referred to as nonswitched) is simply an active-active configuration that can
extend up to 500mdepending on speed and cable type. It also includes synchronous mirroring (SyncMirror)
and the ability to doa site failover with a single command. See Figure 2. Additional resiliency can be provided
through the use ofmultipathing.

QUESTION 19
In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity of
the ________.
A.
B.
C.
D.

local interfaces only


failed partner interfaces only
local and failed partner interfaces
interfaces as defined in the /etc/rc file

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
In takeover mode, this network interface assumes the identity of the network interface on the partner
http://www.wafl.co.uk/tag/ifconfig/#sthash.3rsjaDZD.dpuf
For the partner interface configuration to be persistent across reboots, you must include the ifconfig

commandin the /etc/rc file


http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/nag/GUID-525FCF4E-109D-4E6F-9256C6E56438CA9A.html
QUESTION 20
When using SnapRestore to restore a single LUN, the LUN must be ___________.
A.
B.
C.
D.

exported and accessible


mapped to a Windows server
mounted on a host
taken offline or unmapped

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F0455E736962FD1.html
Always unmount the LUN before you run the snap restore command on a volume containing the LUN or
beforeyou run a single file SnapRestore of the LUN. For a single file SnapRestore, you must also take the
LUNoffline.
QUESTION 21
For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex should be
identical with regard to ____________.
A.
B.
C.
D.

NVRAM
Mirrored Snapshot copies
RAID groups and disk sizes
NDMP and Snapshot copies

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
SyncMirror is essentially a RAID-1 mirror; hence the name. The best practice is to mirror storage of
equalperformance; i.e. identical RAID groups and disk sizes (number of spindles, IOPS). If you were to mirror
twostorage devices of different performance, the slower device would be the limiting factor.
QUESTION 22
What happens when two aggregates are rejoined?
A.
B.
C.
D.
E.

It is not possible to rejoin aggregates.


Data ONTAP will always retain data from the newest aggregate.
Both aggregates revert to the last common snapshot before the split.
You will have a large new aggregate containing all volumes from both aggregates.
One of the aggregates will be overwritten and you will lose any data changed on it after the split.

Correct Answer: E
Section: (none)

Explanation
Explanation/Reference:
Explanation:
When you rejoin split aggregates, Data ONTAP mirrors the data from one aggregate to the other and
destroysdata that existed on that aggregate before the rejoin.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-B9CB3DA8-E1AF-4BAC-A85B64C009010F4A.html
QUESTION 23
You cannot remove the SyncMirror license if one or more mirrored volumes exist.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
You cannot disable the SyncMirror license if mirrored aggregates exist and are online.
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-5058FDA7-68AE-4693- B3430E9FFEDFC86C.html
QUESTION 24
A mirrored volume has a failed disk, but there are no available spares in the pool from which the degraded plex
was built. Data ONTAP will __________.
A.
B.
C.
D.

halt all operations to volumes in that pool


choose spare disks to reconstruct from the opposite pool
warn you that there are no available spares from the proper pool
"halt" after 24 hours if spare disks are not added to the proper pool

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Both `warn you that there are no available spares from the proper pool' and `halt after 24 hours if spare disk
arenot added to the proper pool' are correct answers. However, since Data ONTAP alerts you first, 'warn you
thatthere are no available spares' is the best answer. https://library.netapp.com/ecm/ecm_download_file/
ECMP1196912
QUESTION 25
The required hardware to add SyncMirror to an existing system would be ____________.
A.
B.
C.
D.

disk shelves and cluster interconnect


disk shelves and termination switches
disk shelves, Ethernet adapters, and cabling
disk shelves, Fibre Channel adapters, and cabling

Correct Answer: D

Section: (none)
Explanation
Explanation/Reference:
Explanation:

QUESTION 26
Which two are true when creating a SyncMirror volume? (Choose two.)
A.
B.
C.
D.

The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.
The disks selected for Plex 0 and Plex 1 must come from the same disk pools.
The number of disks added must be an even number and equally divided between the two plexes.
The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of the
size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger capacity disk and right-sizes
it.

Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The rules for the selection of disks or array LUNs, for using as mirrored aggregates, are as follows:
Disks or array LUNs selected for each plex must be in different pools. The same number of disks or array
LUNs must be in both the plexes. Disks are selected first on the basis of equivalent bytes per sector (bps) size,
then on the basis of the size ofthe disk.
If there is no equivalent-sized disk, Data ONTAP uses a larger-capacity disk, and limits the size to make
itidentically sized.
Data ONTAP names the plexes of the mirrored aggregate.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-F5F241AF-50C0-4FF3-8C0196958581C4D9.html
QUESTION 27
After issuing the aggr split aggr0/plex0 aggrNew command ____________.
A.
B.
C.
D.
E.

there is a new plex called aggrNew


there are two new plexes, plex0 and plexNew
there is a new mirrored aggregate called aggrNew
there are two unmirrored aggregates, aggr0 and aggrNew
flexible volumes are evenly split between aggr0 and aggrNew
Network Appliance NS0-155 Exam

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html aggr split aggrname/plexname
new_aggrname
Removes plexname from a mirrored aggregate and creates a new unmirrored aggregate named
new_aggrname that contains the plex. The original mirrored aggregate becomes unmirrored. The plex to besplit
from the original aggregate must be functional (not partial), but it could be inactive, resyncing, or out-ofdate.
Aggr split can therefore be used to gain access to a plex that is not up to date with respect to its partner
plex, if its partner plex is currently failed.
If the aggregate in which plexname resides is embedded in a traditional volume, aggr split behaves identicallyto
vol split. The new aggregate is embedded in a new traditional volume of the same name.
The aggregate in which plexname resides must contain exactly one flexible volume, aggr split will by
defaultrename the flexible volume image in the split-off plex to be the same as the new aggregate.
If the original aggregate is restricted at the time of the split, the resulting aggregate will also be restricted. If
therestricted aggregate is hosting flexible volumes, they are not renamed at the time of the split. Flexible
volumeswill be renamed later, when the name conflict is detected while bringing an aggregate online. Flexible
volumesin the aggregate that is brought online first keep their names. That aggregate can be either the
originalaggregate, or the aggregate resulting from the split. When the other aggregate is brought online later,
flexiblevolumes in that aggregate will be renamed.
If the plex of an aggregate embedded within a traditional volume is offline at the time of the split, the
resultingaggregate will be offline. When splitting a plex from an aggregate that hosts flexible volumes, if that
plex isoffline, but the aggregate is online, the resulting aggregate will come online, and its flexible volumes will
berenamed. It is not allowed to split a plex from an offline aggregate. A split mirror can be joined back together
via the -v option to aggr mirror.
QUESTION 28
Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and _______.
A.
B.
C.
D.

offline, quiesced
online, consistent
online, normal
restricted, offline

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Ensure that both plexes of the mirrored aggregate you are splitting are online and operational.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE08C404-6E9C-47F6-A72ECDEE2043408C.html
QUESTION 29
You can avoid data corruption when you issue the cf forcetakeover -d command if the remote node is
________.
A. in a giveback mode
B. fenced off manually

C. powered on and accessible


D. powered off and inaccessible
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 30
You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which command would
verify that disks are connected and have dual paths?
A.
B.
C.
D.

disk show
sysconfig -p
vol status -r
storage show disk -p

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The operator must ensure that the partner filer does not become operational at any time while a filer is in
atakeover mode initiated by the use of this command http://backdrift.org/man/netapp/man1/na_cf.1.html
QUESTION 31
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster
site node. (Choose two.)
A.
B.
C.
D.
E.

Use manual fencing.


Use the cf giveback -f command.
Use the cf forcetakeover -d command.
Turn off power to the disaster site node.
Isolate the failed node from the surviving node.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 32
In a fabric-attached MetroCluster, a "site failure" is described as a __________.
A.
B.
C.
D.

failure of the Inter-Switch-Links (ISL)


failure of the interconnect cable
complete failure of the primary controller and disk shelves
malfunction of the Fibre Channel adapter on the cluster node

Correct Answer: C

Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://argoat.net/Blog/?p=1466
QUESTION 33
Which two statements are true of the cf forcetakeover -d command? (Choose two.)
A.
B.
C.
D.

Mirrored volumes are implicitly split.


Partner mailboxes must be available.
The failed cluster node is powered off automatically.
The surviving cluster node takes over the functions of the failed partner.

Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
It is important to remember that this is the case only when a complete site is lost. In the case of a
failedcontroller at one of the sites, a normal cluster failover occurs. Due to the operation of SyncMirror, there is
alsoadded protection from multidrive or complete shelf failures. When a storage controller fails in an activeactiveconfiguration, the partner detects the failure and automatically (if enabled) performs a takeover of the
dataservingresponsibilities from the failed controller. Part of this process relies on the surviving controller
beingable to read information from the disks on the failed controller. If this quorum of disks is not available,
thenautomatic takeover won't be performed. In a MetroCluster configuration, manually executing a single
commandwill allow a takeover to occur in spite of the lack of a quorum of disks. This "forced takeover" process
breaksthe mirrored relationships in order to bring the failed controller's volumes on line.
forcetakeover -d is very dangerous. Not only can it cause data corruption, if not used carefully, it can alsolead to
a situation where both the node and its partner are operational (split brain). As such, it should only beused as a
means of last resort when the takeover and forcetakeover commands are unsuccessful inachieving a takeover.
The operator must ensure that the partner node does not become operational at any timewhile a node is in a
takeover mode initiated by the use of this command. In conjunction with RAID mirroring, itcan allow recovery
from a disaster when the two nodes in the HA pair are located at two distant sites.
QUESTION 34
Protection Manager is an optional component of the Operations Manager that can be licensed and accessed
from the NetApp Management Console (NMC).
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Operations Manager, Protection Manager and Provisioning Manager are all core products of the
UnifiedManager Platform suite.
QUESTION 35
Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp Host Agent

installed.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278642 If no Host Agent is installed, how can the
management tool query the host?
QUESTION 36
Which are three valid data protection solutions? (Choose three.)
A.
B.
C.
D.

SnapVault toVolume SnapMirror


SnapVault toVolume SnapMirror to SnapVault
SnapVault toVolume SnapMirror toVolume SnapMirror
Volume SnapMirror to SnapVault

Correct Answer: ACD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.redbooks.ibm.com/redpapers/pdfs/redp4268.pdf
When you are using SnapVault in combination with Volume SnapMirror, it is important to understand
theirrelationship with Snapshot. You cannot utilize SnapVault to protect a Volume SnapMirror destination,
becauseSnapVault and SnapMirror both use the same Snapshot copies; they cannot run simultaneously.
Schedulesmust be managed to accommodate the interlock that keeps SnapVault and SnapMirror from
stepping on eachother.
QUESTION 37
Protection Manager has policies that allow for tape-based protection as well as disk-based protection.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278633
QUESTION 38
When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server,
which three are valid objects to include in the data set? (Choose three.)
A. A file
B. A qtree

C. A directory
D. Theentire client
Correct Answer: ACD
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Open Systems Snap Vault runs on servers, so the objects that can be selected for backup will be host-based.
Qtrees are objects on the storage system.

QUESTION 39
XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html http://backdrift.org/man/netapp/
man5/na_stats_preset.5.html
Data ONTAP provides some XML files that output a predetermined set of statistics that you can use
withouthaving to construct a script or type in a complicated command on the command line.
The preset files are located in the /etc/stats/preset directory. To use a preset file, you add -p filename toyour
stats show or stats stop command line. You can also add counters on the

command line. If any optionsyou specify on the command line conflict with the preset file, your command line
options take precedence.
You can also create your own preset files.
QUESTION 40
When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional aggregates are
designated as ________.
A.
B.
C.
D.
E.

16-bit
32-bit
64-bit
Foreign
Unknown

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Aggregates are never converted as part of an upgrade. An upgrade will not touch your data!
QUESTION 41
To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create command must be
included?
A.
B.
C.
D.
E.

b 64
B 64
l 64
L 64
No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
The command to create a 64-bit aggregate is the same aggr create command that is present in Data
ONTAP7G for aggregate creation. The aggr create command has a new flag, -B, to specify
the type of aggregate tocreate. It takes a value of either 32 or 64 and creates the respective type of aggregate.
Therefore the aggrcreate command with -B 64 creates a 64-bit aggregate. The aggr create command without
the -B flag bydefault creates a 32-bit aggregate.
Here are some commands for creating different aggregate types in Data ONTAP 8.0:
Creating a 64-bit aggregate:
aggr create aggr_64 -B 64 5
Creating a 32-bit aggregate using B flag:
aggr create aggr_32 -B 32 5
Creating a 32-bit aggregate without using B flag:
aggr create default_aggr_32 5
Note: the man pages do not include this option in later versions of DOT because 64-bit is now the default.

QUESTION 42
After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit aggregates.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html
To upgrade an aggregate in-place, the only available method is to add disks to expand the aggregate to>16TB.
There is an obscure method using diag mode but that is not supported or mentioned in the exam content.
Theanswer is always add disks to grow past 16TB, or migrate.
QUESTION 43
With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is ____.

A.
B.
C.
D.

500
1000
6400
64000

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/products/storage-systems/fas3200/fas3200-tech-specs.aspx
There is no easily remembered reason why its 500. Some people like to remember that there is one
otherquestionon the exam that requires you to remember an arbitrary number and the answer is also 500
(distanceof a fiber interconnect at 2Gbps).
QUESTION 44
The largest volume that can be created on a 64-bit aggregate is ___.
A.
B.
C.
D.

10 TB
16 TB
64 TB
Equal to size of the aggregate

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
Trick question.... Depends on the array and the maximum shelves and disks and aggregate size, which

canchange over time. But a volume can never be greater than the aggregate - save for a new feature in 8.2
calledInfinite Volume that is not covered by this exam.
QUESTION 45
Which command will show the FCP target(s) on a storage system?
A.
B.
C.
D.

fcp show adapter


fcp show all
fcp show -t
fcp status

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html
fcp show adapter [ -v ] [ adapter ]
If no adapter name is given, information about all adapters are shown. This command displays information such
as nodename/portname and link state about the adapter. If the -v flag is given, this command displays
additional information about the adapters.
QUESTION 46
You are having problems accessing three recently-created LUNs. Given the output below, the reason is
because all of the LUNs are using the same LUN ID of 0.
lun show -m
LUN pathMapped to LUNID
--------------------------------------------------/vol/vol1/lun0 solaris-igroup0 0
/vol/vol1/lun1 windows-igroup 0
/vol/vol1/qtree1/lun2 aix-igroup 0
/vol/vol1/qtree1/lun3 linux-igroup 0
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The 'lun' in the path is irrelevant. The 0 at the end of each statement denotes the LUN ID.
LUN IDs must be unique per igroup.
QUESTION 47
Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would your
determination be?

A.
B.
C.
D.

These are type "Solaris" LUNs.


Not enough information is given here. Run the lun map command to get the information requested.
Not enough information is given here. Run the lun show -v command to get the information requested.
Not enough information is given here. Run the lun status command to get the information requested.

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging | -g initiator_group | -n node | -l
vol_name | lun_path ] Displays the status (lun_path, size, online/offline state, shared state) of the given LUN or
class ofLUNs. Withthe -v option supplied, additional information (comment string, serial number, LUN mapping,
HA Pair SharedVolume Information) is also displayed. With the -m option supplied, information about lun_path
toinitiator_group mappings is displayed in a table format. With the -c option supplied, information about
LUNcloning status is displayed.
A specific LUN can be indicated by supplying its lun_path. When an initiator_group is specified, status
isreported for all LUNs that are mapped to the initiator group. When a node is specified, status is reported for
allLUNs that are mapped to initiator groups which contain that node. When staging is specified, information
aboutthe temporary LUNs preserved in the staging area is reported. When vol_name is specified, status is
reportedfor all the LUNs in that volume. Mapped LUNs are ones with at least one map definition. A LUN is
online if it has not been explicitly madeoffline using the lun offline command.

"Pass Any Exam. Any Time." - www.actualtests.com 96


Network Appliance NS0-155 Exam
QUESTION 48
Which two commands would help you troubleshoot a LUN that cannot be accessed by a host? (Choose two.)
A. fcp show wwpn
B. fcp wwpn

C. igroup show
D. lun show -err
E. lun show -v
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_igroup.1.html
igroup show [ -v ] [ initiator_group ]Displays the nodes in an initiator group and their aliases, set with the fcp
wwpnalias command. If noinitiator_group is specified, the members of all initiator groups are displayed. You
can use the -v option to get averbose listing.
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging | -g initiator_group | -n node | -l
vol_name | lun_path ]Displays the status (lun_path, size, online/offline state, shared state) of the given LUN or
class of LUNs. Withthe -v option supplied, additional information (comment string, serial number, LUN
mapping, HA Pair SharedVolume Information) is also displayed. With the -m option supplied, information about
lun_path toinitiator_group mappings is displayed in a table format. With the -c option supplied, information
about LUNcloning status is displayed.
QUESTION 49
NetApp recommends that Fibre Channel switches that have both disk and tape connected to them should have
separate zones created for each.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.brocade.com/downloads/documents/white_papers/Zoning_Best_Practices_WP-00.pdf
Separating the disk and tape devices into separate zones prevents disk RSCNs from impacting tape
devices,which tend to be more sensitive to RSCNs. Best practice is to zone each initiator WWPN to each target
WWPN individually.
QUESTION 50
Which command shares out the directory /vol/vol2/home using the share name "netapp"?
A.
B.
C.
D.

cifs shares -add /vol/vol2 netapp


cifs shares -add /vol/vol2/home/netapp
cifs shares -add netapp vol/vol2
cifs shares -add netapp /vol/vol2/home

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_cifs_shares.1.html cifs shares -add
sharename path
QUESTION 51
The quota resize command only affects existing /etc/quotas file target entries, not new quota entries.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
quota resize volume
Adjusts currently active quotas in the specified volume to reflect changes in the /etc/quotas file. Forinstance, if
you edit an entry in /etc/quotas to increase a user's quota, quota resize will cause
thechange to take effect. The volume name may be omitted if the system has only one volume. quota resizecan
be used only when quotas are already on. Because it does not rescan the file system to compute usage,quota
resize is faster than turning quotas off and then on again. quota resize will apply all updatedentries in /etc/
quotas; however, it will generally ignore newly added entries. A newly added entry will onlytake effect if the
corresponding user or group has an active quota as a result of updating a file subject todefault quotas.
QUESTION 52
In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)
A.
B.
C.
D.
E.

file quotas
group quotas
root quotas
tree quotas
user quotas

Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 53
In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and group quotas,
but not from tree quotas.
A. True
B. False
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:

http://backdrift.org/man/netapp/man1/na_quota.1.html
User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas,however, do apply even to root and the Windows Administrator account.
QUESTION 54
What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume vol2?
A.
B.
C.
D.

lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent


lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent
lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://backdrift.org/man/netapp/man1/na_lun.1.html
lun clone create clone_lunpath [ -o noreserve ] -b parent_lunpath parent_snap
QUESTION 55
Which iSCSI security method encrypts data between the initiator and the target?
A.
B.
C.
D.

IPSec
CHAP
LUN masking
Header and Data Digests

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
IPSec is an encryption transport that can be used to secure any IP traffic including iSCSI.
QUESTION 56
You receive an error message from an iSCSI host stating that there is an authentication error.
Which command would troubleshoot the failure?
A.
B.
C.
D.

iscsi security show


iscsi security generate
iscsi show authentication
iscsi security authentication

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_iscsi.1.html

iscsi security show


Display the default authentication and all the initiator specific authentication information. Hint: Remember that
the iscsi command is mostly structured "iscsi noun verb", unlike the fcp command whichis structure "fcp verb
noun". Example: iscsi initiator show, fcp show initiator.
QUESTION 57
Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a NFS mount
request on a Solaris system? (Choose three)
A.
B.
C.
D.
E.

check the client's fstab


check the /etc/sd.conf file on the client
check show mount -e to the storage system from the client
check for connectivity to the storage system from the client
check the output of the exportfs command on the storage system

Correct Answer: ADE


Section: (none)
Explanation
Explanation/Reference:
Explanation:
The fstab file reflects the defined filesystem mount paths (including NFS mounts). Always check network
connectivity when a problem arises with a network service. The exportfs command will display the active
exports on the storage system.
QUESTION 58
Which three configurations would increase data transfer rates in a volume SnapMirror environment for
traditional volumes?
A.
B.
C.
D.
E.

The destination volumes are flexible volumes.


The destination and source contain disks of the same size.
The destination and the source contain RAID groups of the same size.
The destination and source contain the same number of raid groups.
The destination and source storage systems are no father than 30 meters apart.

Correct Answer: BCD


Section: (none)
Explanation
Explanation/Reference:
Explanation:
By aligning the performance of the source and destination, optimal data transfer (aka replication) rates can
beattained. Flexvols don't matter, and there is no measurable difference between the performance of a
networkover a 30m or 3m cable.
QUESTION 59
Identify the two commands that could be entered on a system with a SnapMirror source. (Choose two)
A.
B.
C.
D.

snapmirror update
snapmirror status
snapmirror initialize
options snapmirror.access all

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
http://www.uow.edu.au/~blane/netapp/ontap/cmdref/man1/na_options.1.htm update [ -S source ] [ -k kilobytes ]
[ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination For asynchronous mirrors, an update is immediately
started from the source to the destination to update themirror with the contents of the source.
For synchronous mirrors, a snapshot is created on the source volume which becomes visible to clients of
thedestination volume.
The update command must be issued on the destination node.status [ -l | -t | -q ] [ volume | qtree ... ]
Reports status of all the SnapMirror relationships with a source and/or destination on this node. This
commandalso reports whether SnapMirror is on or off. If any volume or qtree arguments are given to the
command, onlythe SnapMirror relationships with a matching source or destination will be reported. If the
argument is invalid,there won't be any status in the output.initialize [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ c create_dest_snap ] [ -w ] destinationStarts an initial transfer over the network. An initial transfer is required
before update transfers can take place.
The initialize command must be issued on the destination node. If the destination is a volume, it
must berestricted (see na_vol(1) for information on how to examine and restrict volumes). If the destination is a
qtree, itmust not already exist (see na_qtree(1) for information on how to list qtrees). If a qtree already exists, it
mustbe renamed or removed (using an NFS or CIFS client), or snapmirror initialize to that qtree will not
work.snapmirror.access
This option determines which SnapMirror destination filers may initiate transfers, and over which
networkinterfaces. When set to "legacy", SnapMirror uses the older snapmirror.allow to determine access. The
optionvalue is a string containing an expression which provides the access filter. An example of the
optionscommand for snapmirror.access is options snapmirror.access host=toaster,fridge. The default value
is"legacy". See na_snapmirror(1) , na_snapmirror.allow(5) and na_protocolaccess(8) for more details.
The snapmirror.allow file exists on the source filer used for SnapMirror.
QUESTION 60
Which OSSV tool would you use to perform an OSSV unattended installation?
A.
B.
C.
D.

msipackage
svunattendossv
svconfigpackager
unattendpackager

Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
The reference for thisquestionis an old version of a TR. It is likely that thisquestionwill be removed from
theNSO-155 exam.
The svconfigpackager is a binary in the OSSV client which can be used to create an unattended
installationpackage using an answer file.
QUESTION 61
Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?
A. aggr create aggrX -d 12

B. aggr create aggrX -m 12


C. aggr mirror aggrX -m 12
D. aggr mirror aggrX -n 12
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html The following commands are
available in the aggr suite:

If you use the -d disk1 [ disk2 ... ] argument, the node creates the aggregate with the specified spare
disksdisk1, disk2, and so on. You can specify a space-separated list of disk names. Two separate lists must
bespecified if the new aggregate is mirrored. In the case that the new aggregate is mirrored, the indicated
disksmust result in an equal number of disks on each new plex.
The disks in a plex are not permitted to span spare pools. This behavior can be overridden with the -f option.
The same option can also be used to force using disks that do not have matching rotational speed. Thefoption
has effect only when used with the -d option specifying disks to use.
The -m option can be used to specify that the new aggregate be mirrored (have two plexes) upon creation.
Ifthis option is given, then the indicated disks will be split across the two plexes. By default, the new
aggregatewill not be mirrored.
aggr mirror aggrname
The -n option can be used to display the command that the system will execute without actually making
anychanges. This is useful for displaying the automatically selected disks, for example.
QUESTION 62
Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects the disk
drive?

A.
B.
C.
D.

aggr mirror aggrY


aggr mirror aggrY -m
aggr mirror aggrT -d 12@144
aggr mirror aggrY -m 12@144

Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:

Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
aggr mirror aggrname
[ -f ]
[ -n ]
[ -v victim_aggrname ]
[ -d disk1 [ disk2 ... ] ]
Turns an unmirrored aggregate into a mirrored aggregate by adding a plex to it. The plex is either
newlyformedfrom disks chosen from a spare pool, or, if the -v option is specified, is taken from another
existingunmirrored aggregate. Aggregate aggrname must currently be unmirrored. Use aggr create to make a
new,mirrored aggregate from scratch.
Disks may be specified explicitly using -d in the same way as with the aggr create and aggr add commands.
The number of disks indicated must match the number present on the existing aggregate. The disks
specifiedare not permitted to span disk pools. This behavior can be overridden with the -f option. The -f option,
incombination with -d, can also be used to force using disks that have a rotational speed that does not
matchthat of the majority of existing disks in the aggregate.
If disks are not specified explicitly, then disks are automatically selected to match those in the
aggregate'sexisting plex.
The -v option can be used to join victim_aggrname back into aggrname to form a mirrored aggregate. Theresult
is a mirrored aggregate named aggrname which is otherwise identical to aggrname before the operation.
Victim_aggrname is effectively destroyed. Victim_aggrname must have been previously mirrored with
aggrname, and then separated via the aggr split command. Victim_aggrname must be offline. Combined
withthe -v option, the -f option can be used to join aggrname and victim_aggrname without prompting the user.
The -n option can be used to display the command that the system will execute without actually making
anychanges. This is useful for displaying the automatically selected disks, for example.
"Pass Any Exam. Any Time." - www.actualtests.com 105
Network Appliance NS0-155 Exam
QUESTION 63
When troubleshooting a double disk failure with SyncMirror, you decide to remove and destroy a plex from a
mirrored aggregate. What steps remove a plex from a mirrored aggregate?
A.
B.
C.
D.

Take the aggregate offline and use the aggr destroy command
Take the aggregate offline and use the destroy -f command
Ensure the plex is online and use the aggr destroy plexname command.
Ensure the plex is offline and use the aggr destroy plexname command.

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
aggr destroy { aggrname | plexname } [ -f ]
Destroys the aggregate named aggrname, or the plex named plexname. Note that if the specified aggregate
istied to a traditional volume, then the traditional volume itself is destroyed as well. If an aggregate is specified,
all plexes in the aggregate are destroyed. The named aggregate must also notcontain any flexible volumes,
regardless of their mount state (online, restricted, or offline). If a plex is specified,the plex is destroyed, leaving
an unmirrored aggregate or traditional volume containing the remaining plex.

Before destroying the aggregate, traditional volume or plex, the user is prompted to confirm the operation. The-f
flag can be used to destroy an aggregate, traditional volume or plex without prompting the user.
The disks originally in the destroyed object become spare disks. Only offline aggregates, traditional
volumesand plexes can be destroyed.
QUESTION 64
When replicating data between 32-bit and 64-bit aggregates, which two are allowed? (Choose two)
A.
B.
C.
D.

NDMPcopy
QSM
vol copy
VSM

Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us
http://wafl.co.uk/ndmpcopy/
Because volume SnapMirror works at the block level, the source and destination must both be FlexVolvolumes
in the same aggregate type. The source and destination of a volume SnapMirror relationship musteither both be
FlexVol volumes in 32-bit aggregates or both be FlexVol volumes in 64-bit aggregates.
Therefore you cannot create a volume SnapMirror relationship from a FlexVol volume in a 32-bit aggregate to
aFlexVol volume in a 64-bit aggregate or vice versa.

"Pass Any Exam. Any Time." - www.actualtests.com 107


Network Appliance NS0-155 Exam
QUESTION 65
What types of migration are supported from 32-bit to 64-bit?
A.
B.
C.
D.
E.
F.

migration of qtrees via QSM


migration of volumes via ndmpcopy
migration of volumes via SnapMirror
Both A & B
Both B & C
Both A & C

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Volume SnapMirror operates at the physical block level. It replicates the contents of an entire volume,
includingall Snapshot copies, plus all volume attributes verbatim from a source (primary) volume to a target
(secondary)volume. Implicitly, the destination volume will be the same as the source volume. Since C is
incorrect, A & Bmust be correct.

Qtree snapmirror operates at the logical level, so it is unimportant that the destination system has a
differentvolume configuration.
ndmpcopy is similarly operating with data already read from the volume and so the destination volume type
isnot a consideration.
QUESTION 66
How do you migrate LUNs under volumes from 32-bit to 64-bit?
A.
B.
C.
D.

lrep
ndmpcopy
rsync
snapvault

Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
http://wafl.co.uk/ndmpcopy/
Think of ndmpcopy as a sort of ftp for SAN. You can use it to copy files from one volume to
another. Becausethe file is read from one volume and written to another, the constraints of volume types are
not an issue.
QUESTION 67
Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?
A. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup directory.
B. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process
continuesuninterrupted.
C. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source, destination,
orboth systems.
D. The fingerprint database and the change logs that the deduplication process uses are located outside
thevolume, in the aggregate.
E. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just like
thededuplication schedule for any volume.
Correct Answer: CDE
Section: (none)
Explanation
Explanation/Reference:
Explanation: Section: Data Protection
NetApp also recommends that if deduplication is used on the source volume, then it should also be used onthe
destination volume. However, you are not restricted using deduplication on the source volume only.
The deduplication schedule is not tied to the qtree SnapMirror update. In other words, the deduplicationprocess
does not automatically start at the completion of the qtree SnapMirror transfer.
The fingerprint database and the change log files that are used in the deduplication process are locatedoutside
of the volume in the aggregate and are therefore not captured in Snapshot copies http://www.netapp.com/us/
media/tr-3505.pdf
QUESTION 68
To manage SnapVault relationships with an NDMP management application, you must specify a:

A.
B.
C.
D.

directory path
volume and qtree
SnapVault license
username and password

Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation:
Add a new backup user to the Backup Operators useradmin group list. Enter the following command:
useradmin user add backupuser -g "Backup Operators"
Generate an NDMP password for the new user. Enter the following command:
ndmpd password backupuser
The NDMP password is used to authenticate the NetBackup media server to the storage system. Thispassword
is required for setup on the NetBackup management station. https://library.netapp.com/ecmdocs/
ECMM1278284/html/onlinebk/5snapv37.htm
QUESTION 69
For OSSV sources, the qtree is the basic unit of SnapVault backups.
A. True
B. False
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140EB147B941BDA.html
The data structures that are backed up and restored through SnapVault depend on the primary system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore. SnapVault
backs up specified qtrees on the primary system to associated qtrees on the SnapVaultsecondary system. If
necessary, data is restored from the secondary qtrees back to their associated primaryqtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup. SnapVaultbacks up
specified directories from the native system to specified qtrees in the SnapVault secondary system.
If necessary SnapVault can restore an entire directory or a specified file to the open systems platform.
The destination system uses a slightly more disk space and directories than the source system.

You might also like