A customer has a 4-node cluster. Two nodes have FlashCache and the other two nodes have Flash Pools. The customer is interested in deploying and OLTP application with a workload that consists of an extreme number of small random writes on four LUNs spread across four volumes.
What should the customer do to improve performance for the OLTP application?
A. Place all volumes for the application on the nodes with Flash Pools.
B. Deploy all volumes for the application on the two nodes with the FlashCache installed.
C. Split the volumes between the two nodes with FlashCache and two of the nodes with Flash Pools.
D. Place the volume with the highest read load on the Flash Pool nodes and place the other volumes on the FlashCache nodes.
A customer has two SVMs joined to separate Active Directory domains. SVM1 is joined to domain AD1 and SVM2 is joined to domain AD2. The administrator enables Active Directory access to allow certain domain users access to the cluster using their Active Directory credentials. After enabling, some users report the inability to log into the cluster using their Active Directory credentials.
What are three reasons this happened? (Choose three.)
A. The user account belongs to the domain that is not used for cluster access authentication.
B. The cluster time is off by two minutes from the Active Directory time server.
C. The authentication tunnel was deleted and access sessions were disconnected.
D. The Active Directory user account is not added to the cluster as a user.
E. The user is not a member of an Active Directory group that is allowed access to the cluster.
A NetApp cluster is connected to two network switches for resiliency. One of the network switches loses power. Most LIFs on the cluster automatically recover from the switch failure to and are reachable through the network. One LIF used for CIFS access is not reachable through the network until power is restored to the failed switch.
Which two areas should be investigated to determine the problem? (Choose two.)
A. The protocols allowed on the LIFs.
B. The LIFs failover-group configuration.
C. The LIFs home port.
D. The broadcast domain's member ports.
What are two FPolicy methods for applications? (Choose two.)
A. asynchronous
B. semi-synchronous
C. direct
D. synchronous
What communication link is necessary in order to establish cluster peer relations between two clusters?
A. The cluster interface on each node must be able to communicate with the intracluster interface on each node in the peer cluster.
B. The cluster interface on each node must be able to communicate with the node-mgmt interface on each node in the peer cluster
C. The intracluster interface on each node must be able to communicate with the intracluster interface on each node in the peer cluster.
D. The intercluster interface on each node must be able to communicate with the intercluster interface on each node in the peer cluster.
Which logical interface is created when you create a single-node clustered Data ONTAP system during cluster setup?
A. Two cluster LIFs
B. An intercluster LIF
C. A data LIF
D. A cluster management LIF
Which are types of failover groups? (choose all that apply)
A. System-defined
B. User-defined
C. Next Available
D. Priority
E. Clusterwide
Which SnapMirror type identifies backup vault relationships?
A. SV
B. DP
C. BV
D. LS
E. XDP
The Catalyst 2960 can be used only on the management network for clusters that have _____nodes.
A. 12
B. 16
C. 18
D. 20
E. 24
Which Data ONTAP Cluster-Mode clone technology will lock a Snapshot copy?
A. LUN Clone
B. Snapshot Clone
C. Volume Clone
D. Aggr Clone