The two copies of a SyncMirror volume are called ______…
The two copies of a SyncMirror volume are called ____________, which are physical copies of the same file
system and consist of one or more RAID groups.
(Choose two)
When using MetroCluster in a forced takeover mode, identify two methods for restricting access to the disaster
site node. (Choose two)
Which command disables client access to Snapshot copies…
Which command disables client access to Snapshot copies on a volume called flexvoll?
What security mechanism can an administrator use on an …
What security mechanism can an administrator use on an OSSV client to use permissions allowing backup to a
SnapVault secondary system?
Which three tools present statistics from the Data ONTA…
Which three tools present statistics from the Data ONTAP counter manager? (Choose three)
Which three protocols can coexist on a NetApp storage s…
Which three protocols can coexist on a NetApp storage system? (Choose three)
Which command on the storage system allows you to displ…
Which command on the storage system allows you to display statistics on the performance of system resource
such as CPU, NVRAM, network interfaces, and disks?
An iSCSI or FC SAN implementation provides ____________…
An iSCSI or FC SAN implementation provides ____________ access to LUNs.
Which set of protocols provide block-level access to Ne…
Which set of protocols provide block-level access to NetApp storage?
What are two methods of protecting LUN overwrites using…
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve
set to 0%? (Choose two)