A company has implemented a MetroCluster cluster. The company wants to use MetroCluster TieBreaker to monitor and detect failures of the cluster.
In this situation, which three components are monitored? (Choose three.)
A. FC connectivity of the fabric switches
B. the surviving cluster
C. FC connectivity of the ATTO bridges
D. nodes through local node interfaces
E. the cluster, through cluster designated interfaces
正解:B,D,E
質問 2:
What does the metrocluster configuration-settings interface create command do?
A. It creates a MetroCluster local cluster ISL.
B. It creates a MetroCluster intercluster LIF.
C. It creates a MetroCluster MCCIP interface.
D. It creates a MetroCluster local cluster interconnect.
正解:C
質問 3:
In a MetroCluster IP configuration, which two network ports must be connected to dedicated switches?
(Choose two.)
A. the port associated with the intercluster LIF
B. the port associated with the cluster LIF
C. the port associated with the MetroCluster IP LIF
D. the port associated with the node management LIF
正解:B,D
質問 4:
Beginning with On Command Workflow Automation 3.0, which feature allows you to download and manage your WFA workflow packs from the NetApp resources.
A. Workflow Automation Database
B. Storage Automation Store
C. Workflow Automation Community
D. Workflow Automation External Data Sources
正解:B
質問 5:
You want to have a NetApp FlexVol that can both grow and shrink dynamically as required by current capacity needs. Which settings will enable this feature?
A. This can be enabled with the inline-compression volume efficiency option.
B. This can be enabled with the grow volume autosize mode.
C. This can be enabled with the modify volume efficiency option.
D. This can be enabled with the grow_shrink volume autosize mode
正解:D
質問 6:
You have a project that requires off-site backup for selected data volumes, but another physical site or system is not within the current budget.
Which NetApp product would help you to satisfy this requirement?
A. NetApp FlexArray
B. NetApp FlexClone
C. NetApp MetroCluster
D. NetApp ONTAP Cloud
正解:D
質問 7:
A user's home directory, mounted using NFS, has been encrypted by a ransomware attack. The user asks you to retrieve the data.
In this scenario, which process would allow you to accomplish this task?
A. Take a new Snapshot copy of the volume.
B. Restore the data from a Snapshot copy.
C. Apply the XDPDefault policy to the volume.
D. Apply the MirrorAllSnapshots policy to the volume.
正解:B
質問 8:
You are upgrading your Data ONTAP cluster from clustered Data ONTAP 8.3 to clustered Data ONTAP 9.1.
Which two actions must be performed for the SnapMirror relationships?
(Choose two.)
A. After the upgrade, resynchronize, and resume SnapMirror relationships.
B. Delete and re-create SnapMirror relationships.
C. Delete the obsolete SnapMirror Snapshot copies which were created in Data ONTAP 8.3.
D. Break existing SnapMirror relationships.
正解:A,D