Which iSCSI security method encrypts data between the initiator and the target?
Which iSCSI security method encrypts data between the initiator and the target?
Which two are Data ONTAP commands for gathering performance information?
Which two are Data ONTAP commands for gathering performance information? (Choose two.)
File locking for a CIFS client is __________.
File locking for a CIFS client is __________.
What mechanism allows you to make LUNs available to some initiators and unavailable to others?
What mechanism allows you to make LUNs available to some initiators and unavailable to others?
Which 3 FAS deduplication features were added in ONTAP 7.3?
Which 3 FAS deduplication features were added in ONTAP 7.3?
NTFS allows file access based on ___________.
NTFS allows file access based on ___________.
What is the definition of the cifs setup command?
What is the definition of the cifs setup command?
Which two commands on the storage system allow you to gather statistics about network interfaces, including ba
Which two commands on the storage system allow you to gather statistics about network
interfaces, including basic information about network connections? (Choose two.)
Starting with Data ONTAP 7.3.1, support for SMB 2.0 in Windows Vista and Windows Server 2008 was added.
Starting with Data ONTAP 7.3.1, support for SMB 2.0 in Windows Vista and Windows Server 2008
was added.
Which three items are NFS resources for export?
Which three items are NFS resources for export? (Choose three.)