Which exportfs command will temporally export the resource while ignoring the options specified in the / etc/exports file?
A. exportfs v
B. exportfs u
C. exportfs a
D. exportfs i
Host multi-pathing describes a ____________ solution that has at least two distinct ______________ paths to a LUN.
A. Token ring, physical
B. FC SAN, virtual
C. FC or IP SAN, virtual
D. FC or IP SAN, Physical
How does the NetApp Remote Agent (RSA) connect to NetApp Support?
A. NetApp Support initiates a non-secure connection to the RSA.
B. NetApp Support initiates a secure connection to the RSA.
C. The RSA initiates a secure connection to NetApp Support.
D. The RSA initiates a non-secure connection to NetApp support.
Which NetApp Storage Tier component works aggregate-wide on a FAS controller?
A. Flash Pool
B. Flash Disk
C. Flash Cache
D. Flash Accel
E. Flash IO
The two copies SyncMirror volume are called ____________, which are physical copies of the same file system and consist of one or more RAID groups.
A. Snapshot copies
B. Aggregates
C. Plexes
D. Volumes
Before running lun setup on the storage system, you must first create the igroup to which the initiator will be attached.
A. True
B. False
Which three statements apply to NearStore Personality license? (Choose three.)
A. It increases the storage capacity.
B. It converts the destination storage system to a NearStore system.
C. It requires the nearstore_option license on the destination storage system.
D. It provides increased concurrent streams when the storage systems are used as destinations for SnapMirror and SnapVault transfers.
When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX server, which three are valid objects to include in the data set? (Choose three.)
A. A file
B. A qtree
C. A directory
D. The entire client
In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)
A. file quotas
B. group quotas
C. root quotas
D. tree quotas
E. user quotas
You receive an error message from an iSCSI host stating that there is an authentication error. Which command would troubleshoot the failure?
A. iscsi security show
B. iscsi security generate
C. iscsi show authentication
D. iscsi security authentication