Which command displays the disk ownership for both CPU modules in a FAS2020 system?
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
Which NetApp data protection software solution should you use to migrate application data from local or third-
You are designing data protection for a Microsoft SQL server. Which NetApp data protection
software solution should you use to migrate application data from local or third-party SAN LUNs to
LUNs on the NetApp storage system?
Perform steps 1 -5 above on the partner node.
To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1 -5 above on the partner node.
Which statement is true about placement of active and target database and log LUNs?
You are designing storage for continuous replication environments. Which statement is true about
placement of active and target database and log LUNs?
What should you do first to resolve this issue?
You are troubleshooting a clustered failover problem at a customer site. The customer
explains that both storage systems were NFS mounted onto the Solaris host. While in
takeover mode, you attempt to create a file on the NFS mount point for the inaccessible
system, but you get the following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the
error.
You perform a “cf giveback” and you can now create a file over NFS on both systems. What
should you do first to resolve this issue?
Which SnapMirror relationship should you create in the snapmirror.conf file for a SnapManager for Exchange con
Which SnapMirror relationship should you create in the snapmirror.conf file for a SnapManager for
Exchange configuration?
Each storage system in a cluster must have network access to the __________.
Each storage system in a cluster must have network access to the __________.
which two methods should you use to license SnapVault?
When utilizing the NetApp Management Console to configure Protection Manager, which two
methods should you use to license SnapVault? (Choose two.)
To make this configuration persistent across reboots, you must enter this information in the _____ file for ea
One method of configuring an interface for takeover is to enter ifconfig interface partner
address at the command line. To make this configuration persistent across reboots, you
must enter this information in the _____ file for each system.
how should you plan for failover performance?
When sizing high-availability workloads, how should you plan for failover performance?