You want to create an automated test environment that performs a single file SnapRestore time you run the procedure, however, SnapRestore prompts you to confirm your decision to revert the file. How can you automate this step?
A. Use the -f option with the snap restore command.
B. Enable the options snaprestore_noprompts enable = on option.
C. These prompts are for data protection and auditing and cannot be overridden.
D. Enter the priv set advanced mode on the storage system and prompt will not appear.
snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ] vol_name | restore_from_path Reverts a volume to a specified Snapshot copy, or reverts a single file to a revision from a specified Snapshot copy. Before reverting the volume or file, the user is requested to confirm the operation. The -f option suppresses this confirmation step.
Question 142:
The two copies SyncMirror volume are called ____________, which are physical copies of the same file system and consist of one or more RAID groups.
SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for real- time mirroring of data to matching aggregates physically connected to the same storage system. SyncMirror provides for synchronous
mirroring of data, implemented at the RAID level. You can use SyncMirror to create aggregates that consist of two copies of the same WAFL file system. The two copies, known as plexes, are simultaneously updated. Therefore, the copies
are always identical. The two plexes are directly connected to the same system.
The following provides information about the activities of SyncMirror:
SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume is essentially an aggregate with a single volume that spans the entire aggregate.) SyncMirror cannot be used to mirror FlexVol volumes. However,
FlexVol volumes can be mirrored as part of an aggregate.
SyncMirror is different from synchronous SnapMirror.
Question 143:
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster site node. (Choose two)
A. Use manual fencing
B. Use the cf giveback f command.
C. Use the cf forcetakeover d command.
D. Turn off power to the disaster site node.
E. Isolate the failed node from the surviving node.
In order to test or effect a Disaster Recovery operation, you must restrict access to the disaster site node to prevent the node from resuming service. If you do not, you risk the possibility of data corruption.
Access to the disaster site note can be restricted in the following ways:
Turn off the power to the disaster site node Use "manual fencing" (Disconnect VI interconnects and fiber channel cables; either physically or through configuration changes on the fabric switches.) Isolating the failed node from the surviving
node could still lead to the possibility of a split brain, so this is not a correct answer.
Question 144:
Which command disables client access to Snapshot copies on a volume called flexvoll?
A. cifs shares change flxvoll nosnap
B. snap access flexvoll off
C. vol options flexvoll nonsnapdir on
D. vol options flexvoll snapdir off
E. vol options flexvoll snapdir on
Correct Answer: C
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html vol options nosnapdir [on|off] If this option is on, it disables the visible .snapshot directory that is normally present at client mount points, and turns off access to all other .snapshot directories in the volume. The default setting is off.
Question 145:
What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a SnapVault secondary system?
A. MD5 authentication between SnapVault primary and secondary, with changeable password
B. Contents inside file called access and located in OSSV /snapvault/etc
C. QSM access list modifiable via svconfigurator
D. Via /etc/hosts.equiv file
Correct Answer: C
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf In order to restrict the NetApp secondary systems that are allowed to initiate backups from an OSSV host, the QSM Access List field can be
populated with the hostname of the secondary using the OSSV Configurator utility. When using this option, make sure the "Check QSM Access List" box is enabled. The snapvault.access option on the NetApp secondary can be used to
restrict the OSSV hosts that are allowed to initiate restores from that secondary system. This option can be populated with a list of hostnames for each OSSV host.
For example:
options snapvault.access host=ossv1,ossv2,ossv3
Screenshot of the svconfigurator GUI; note the QSM access list checkbox and field.
Question 146:
Which three tools present statistics from the Data ONTAP counter manager? (Choose three)
A. Operations manager
B. Window perfmon
C. Sysstat
D. Stats
Correct Answer: ABD
Section: OnTap Administration
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html https:// communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5- 34635/ TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performance-stats- withoutperfstat-or-ops-mgr Note in the diagram below how the performance tools integration with Data OnTap. statit and sysstat interface directly with the performance counters while the other tools - including stats, a command line tool -integrate with the Counter Manager.
Question 147:
Which three protocols can coexist on a NetApp storage system? (Choose three)
A. DAFS
B. CIFS
C. DFS
D. FCP
E. NFS
Correct Answer: BDE
Data OnTap can simultaneously serve NAS and SAN protocols. CIFS, NFS, and FC protocol are examples of NAS and SAN protocols respectively.
Data OnTap 7.1 or later does not support DAFS.
DFS provides location transparency and redundancy by allowing shares in multiple different locations to be logically grouped under one folder, or DFS root. While practically a CIFS server shared by a Data OnTap filer can be a DFS target,
DFS namespaces can only be hosted on Windows systems.
Question 148:
Which command on the storage system allows you to display statistics on the performance of system resource such as CPU, NVRAM, network interfaces, and disks?
A. netstat
B. netdiag
C. pktt
D. sysstat
Correct Answer: D
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html sysstat reports aggregated filer performance statistics such as the current CPU utilization, the amount of network I/O, the amount of disk I/O, and the amount of tape I/O.
Question 149:
An iSCSI or FC SAN implementation provides ____________ access to LUNs.
A. VLD
B. VIIP
C. File
D. Block
Correct Answer: D
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are commonly referred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP and FTP provide file access not block access.
Question 150:
Which set of protocols provide block-level access to NetApp storage?
A. SNA and RPC
B. iSCSI and FCP
C. HTTP and FTP
D. CIFS and NFS
Correct Answer: B
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are commonly referred to as a block storage protocols. FCoE is another such protocol. CIFS and NFS, HTTP and FTP provide file access not block access.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only NetApp exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NS0-155 exam preparations and NetApp certification application, do not hesitate to visit our Vcedump.com to find your solutions here.