NetApp Certified 7-Mode Data Administrator Exam: NS0-155 Exam
NS0-155 Questions & Answers
Exam Code: NS0-155
Exam Name: NetApp Certified 7-Mode Data Administrator Exam
Q & A: 175 Q&As
Which mechanism allows you to make LUNs available to some initiators and unavailable to
A. LUN masking
B. LUN grouping
C. LUN cloning
D. LUN hiding
An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within
a ______________ you can have one or more ____________.
A. session, session, connections
B. connection, session, connections
C. connection, connection, sessions
D. session, connection, sessions
Which NetApp Virtual Storage Tier component works at the host level?
A. Flash Pool
B. Flash Disk
C. Flash Accel
D. Flash Cache
E. Flash IO
When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX
server, which three valid objects to include in the data set? (Choose three)
A. The entire client
B. A directory
C. A file
D. A qtree
What does it signify if the disks are “not owned” in a FAS2020 system?
A. The disks are mailbox disks.
B. The disks are spare disks.
C. The disks are data disks.
D. The disks are not used.
For each Open Systems platform directory to be backed up to the SnapVault secondary storage
system you must execute _____________.
A. An initial baseline copy
B. A temporary copy
C. An incremental copy
D. A scheduled update copy
What is the maximum distance between a standard clustered pair at 2Bbps?
A. 100 meters
B. 10 meters
C. 50 meters
D. 500 meters
Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?
A. No, but you can file a PVR to request support.
B. No. it is targeted for a future release of Data ONATP.
C. Yes, only with a special license installed.
D. Yes, it has been supported since 8.0.1.
Which three attributes would you specify when creating a LUN? (Choose three)
A. The host operating system of the system attached to LUN.
B. The version of Data ONTAP
C. The size of the LUN.
D. The path to the LUN.
Which three items are NFS resources for export? (Choose three.)
In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore
operations on the file or volume cannot rely on the timestamps to determine what data needs to be
backed up or restored. Which course of action ensures correct incremental backups?
A. Perform a base-level backup of the volume after you restore it.
B. Reboot the storage system to reset timestamps back to their original times before the reversion.
C. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup.
D. Take a new snapshot of the volume to create new base-level timestamps for the incremental backup,
and then perform a base-level backup of the volume after you restore it.
Which changes the NDMP password on the Open System SnapVault agent?
Which three licenses are required for fabric-attached MetroCluster? (Choose three.)
Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)
A. A LUN can be converted into a VLD.
B. LUNs can be accessed using the FCP protocol.
C. LUNs can be accessed using the iSCSI protocol.
D. Block services are associated with an iSCSI or FCP SAN environment.
To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
_______ utility. (Choose two.)
B. Bugs Online
C. NetApp Diagnostics
D. Release Comparison
E. System Configuration Guide
Which two commands on the storage system allow you to gather detailed statistics about network
interfaces, including basic information about network connections? (Choose two.)
A. ifstat -a
B. netdiag -n
C. netstat -i
D. sysstat 1
For automatic user name mapping to occur for a CIFS and UNIX user name that are the same,
you must do what?
A. Enter the CIFS user in the NIS database.
B. Enter the user names in the /etc/hosts.equiv file.
C. Use both a NIS server and a Domain Controller in the network.
D. Nothing: mapping will occur if user name authentication is available.
If the security style is set to UNIX, CIFS client file access is determined by ___________.
A. NT ACLs
B. the last client to set permissions
C. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
D. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX
…go to http://www.lead2pass.com/ns0-155.html to download the full version Q&As.