You have a 2-node NetApp cluster with CIFS volumes and SAN LUNs on both nodes. The FC hosts have MPIO correctly configured and see LUN paths through both NetApp nodes.
During a node failover, which two statements are true? (Choose two.)
A. FC hosts will not experience an outage.
B. FC hosts will experience an outage.
C. CIFS users will not experience any outage.
D. Some CIFS users may experience a brief share outage.
In an aggregate with only thick-provisioned volumes, you need to split a FlexClone volume from its parent volume. There are other volumes in the aggregate.
In this scenario, how much space must be available within the containing aggregate?
A. You need enough space for twice the size of the parent volume.
B. The split FlexClone volume must be created in a new aggregate.
C. You need enough space for half the size of the parent volume.
D. You need to double the space in the existing aggregate.
Which privilege is assigned to the vsadmin-backup role?
A. managing volumes
B. managing Snapshot copies
C. configuring LIFs for cluster peering
D. configuring SnapMirror relationships between clusters
You configure a new LUN on a NetApp cluster, and you can successfully access it from the host. An application using the new LUN is having storage performance problems, and ONTAP is reporting misalignment on the LUN.
In this scenario, what is causing the performance and misalignment problems?
A. The LUN was created with the incorrect OS type.
B. The host does not support ALUA.
C. The igroup is configured without Selective LUN Mapping (SLM).
D. The host is using a non-optimized SAN path.
You need to create a new LIF on WLAN 10. The port-channel configuration on the upstream switch has VLAN 10 set to the native (untagged) VLAN.
In this scenario, what should be set as the LIF's home port?
A. a0a
B. a0a-10
C. e0c-10
D. e0c
A user cannot delete the files in a volume's Snapshot copy. In this scenario, what is the problem?
A. A retention period was configured for the Snapshot copy.
B. Snapshot copies are read only.
C. The files are being used by another user.
D. The user does not have the required permission.
You have a 4-node cluster and want to ensure that a new NAS LIF can fail over to any node. In this scenario, which two actions are required to configure the LIF? (Choose two.)
A. Add ports from all nodes to the LIF's broadcast domain.
B. Configure the failover policy tobroadcast-domain-wide.
C. Add ports from all nodes to the LIF's home port list.
D. Configure the failover policy tosystem-defined.
Which three configurations does ONTAP Select support? (Choose four.)
A. 2-node cluster hosting NAS and iSCSI
B. 3-node cluster hosting NAS and iSCSI
C. single-node cluster hosting NAS and iSCSI
D. 4-node cluster hosting NAS and iSCSI
E. 6-node cluster hosting NAS and iSCSI
Your company requires storage administrators to use a second authentication method when accessing OnCommand System Manager and OnCommand Unified Manager. After entering their user name and password, administrators must enter a Personal Identity Verification (PIV) code from a smart card or a mobile device.
With which resource would you accomplish this objective?
A. an Active Directory server
B. a third-party key manager
C. a third-party identity provider
D. the ONTAP onboard key manager
You want to configure a local cluster to accept SnapMirror transfers from two remote clusters. The two remote clusters have overlapping IP networks and cannot change their IP addressing scheme.
In this scenario, which action you perform to allow both remote clusters to replicate to the local cluster?
A. Configure two ONTAP subnets with distinct IP address allocations.
B. Configure network address translation (NAT) on the network.
C. Create separate IPspaces on the local cluster.
D. Configure the SnapMirror relationships as type XDP.