You are on page 1of 110

Network Appliance NS0-155

Data ONTAP 7-Mode Administrator


Version: 5.1
Network Appliance NS0-155 Exam
Topic 1, Volume A

QUESTION NO: 1

How can you “throttle” SnapValue updates and baseline transfers so that the primary or secondary
is not transmitting data as it can?

A. Use the -k option in the snapvault start or snapshot modify commands.


B. SnapVault does not support throttling of network throughout.
C. Use the snapvault throttle command.
D. Use the -k option in the snapvault initialize command.

Answer: A
Explanation:

QUESTION NO: 2

Node 1 in a clustered pair detects that it has lost connectivity to one of its disk shelves. Node 1 is
still up, but it cannot see one of its disk shelves. However, the partner node, Node 2, can see all of
the Node 1’s disk shelves. Which feature will cause Node 2 to monitor this error condition for a
period of three minutes by default, and then forcibly take over Node 1 if the error condition
persists?

A. Auto enable of giveback


B. Negotiated Fail Over
C. Takeover on panic
D. Cf.quickloop.enable

Answer: B
Explanation:
http://www.wafl.co.uk/cf/
http://wafl.co.uk/options/
Negotiated failover is a general facility which supports negotiated failover on the basis of decisions
made by various modules.

cf.takeover.on_disk_shelf_miscompare
This option allows negotiated takeover to be enabled when the cluster nodes detect a mismatch in
disk shelf count. By default, this option is set to off.

This option is available only when cluster is licensed and changing the value on one filer

"Pass Any Exam. Any Time." - www.actualtests.com 2


Network Appliance NS0-155 Exam
automatically changes the value on the partner filer.

QUESTION NO: 3

In Data ONTAP, the root user is exempt from those two quotas: ______________. (Choose two)

A. User quotas
B. Tree quotas
C. Root quotas
D. Group quotas
E. File quotas

Answer: A,D
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html
User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas, however, do apply even to root and the Windows Administrator account.

QUESTION NO: 4

Which two Volume SnapMirror (VSM) relationship are supported? (Choose two)

A. Data ONTAP 8.0.2 64-bit -->Data ONTAP 8.1 64-bit


B. Data ONTAP 8.0.2 32-bit --> Data ONTAP 8.0.2 64-bit
C. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.1 64-bit
D. Data ONTAP 7.3.2 32-bit --> Data ONTAP 8.0.2 64-bit

Answer: A,C
Explanation: Volume SnapMirror Interoperability Matrix.

"Pass Any Exam. Any Time." - www.actualtests.com 3


Network Appliance NS0-155 Exam

Reference: SnappMirror Async Overview and Best Practices guide.

QUESTION NO: 5

An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare
disks are available. Data ONTAP will then perform what action.

A. Chooses a 72-Gigabyte disk and use it as is.


B. Chooses a 72-Gigabyte disk and right-size it.
C. Halts after 24 hour of running in degraded mode.
D. Alerts you that there are no 36-Gigabyte disks and wait for one to be inserted.

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-8A91F6A2-61B8-42C3-
AEAB7D5AA9BBE9CF.html

"Pass Any Exam. Any Time." - www.actualtests.com 4


Network Appliance NS0-155 Exam
If a disk fails and no hot spare disk that exactly matches the failed disk is available, Data ONTAP
uses the best available spare. Understanding how Data ONTAP chooses an appropriate spare
when there is no matching spare enables you to optimize your spare allocation for your
environment.

Data ONTAP picks a non-matching hot spare based on the following criteria (and more; in the link
above):
If the available hot spares are not the correct size, Data ONTAP uses one that is the next size up,
if there is one.
The replacement disk is downsized (aka right sized) to match the size of the disk it is replacing;
the extra capacity is not available.

QUESTION NO: 6

Which statement is true about expanding an aggregate from 32-bit to 64-bit in place?

A. All aggregates are automatically converted from 32-bit to 64-bit with the Data ONTAP 8.1
upgrade.
B. The expansion is triggered by an aggr convert command.
C. The expansion is triggered by adding disks to exceed 16 TB.
D. The 32-bit aggregates are degraded and must be Volume SnapMirrored to a new 64-bit
aggregates with Data ONTAP 8.1 upgrade.

Answer: C
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html
To upgrade an aggregate in-place, the only available method is to add disks to expand the
aggregate to >16TB.

QUESTION NO: 7

What utility on the storage system will allow you to capture network packet information?

A. Snoop
B. Netstats
C. Pktt
D. Traceroute

"Pass Any Exam. Any Time." - www.actualtests.com 5


Network Appliance NS0-155 Exam
Answer: C
Explanation:
The pktt command controls a simple on-filer packet tracing facility. Packets can be captured into a
trace buffer then dumped to a file, or the captured data can be logged to a file. The data is stored
in "tcpdump" format, and can be directly viewed with tcpdump, ethereal, and perhaps other
viewers. The output can also be converted using the editcap(1) program to a variety of other
formats, including Sniffer, NetMon, and snoop.

QUESTION NO: 8

The root admin on the UNIX box receives an “Access Denied” message when he attempts to
access a newly mounted qtree. What’s the most likely cause of this error?

A. The qtree is missing from the /etc/hosts file.


B. NFS is turned off on the storage system.
C. The qtree is set to ntfs security style.
D. The qtree has not been exported.

Answer: C
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html

https://library.netapp.com/ecmdocs/ECMP1196891/html/GUID-F6304830-B124-40A5-95D6-
C646AA85E9E0.html

Only hostnames and IPs are referenced in /etc/hosts, so A is incorrect. The question states that
the qtree was mounted, and B and D would preclude this so they are incorrect.
You need to set a qtree to mixed or unix security style to support UNIX users.

QUESTION NO: 9

Which two modes support using SnapMirror over multiple network paths?

A. Standalone
B. Partner
C. Multi

"Pass Any Exam. Any Time." - www.actualtests.com 6


Network Appliance NS0-155 Exam
D. Failover
E. Give back

Answer: C,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-75BD4540-A103-4E2B-8B0A-
E6BBC0D3F43F.html
http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html

Two multipath methods are supported:


The multiplexing mode causes snapmirror to use both paths at the same time. If one should fail, it
will switch to use the remaining path only and use both again should the failing path be repaired.
Failover mode causes snapmirror to use the first path as the desired path and only use the second
path should problems arise with the first path.

QUESTION NO: 10

Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two)

A. Options snapmirror.access on
B. Options snapmirror.resync on
C. Snapmirror initialize
D. Snap mirror resync

Answer: C,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
snapmirror initialize [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c
create_dest_snap ] [ -w ] destination Starts an initial transfer over the network. An initial transfer is
required before update transfers can take place.

The initialize command must be issued on the destination node. If the destination is a volume, it
must be restricted (see na_vol(1) for information on how to examine and restrict volumes). If the
destination is a qtree, it must not already exist (see na_qtree(1) for information on how to list
qtrees). If a qtree already exists, it must be renamed or removed (using an NFS or CIFS client), or
snapmirror initialize to that qtree will not work.

snapmirror resync [ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ]


[ -c create_dest_snap ] [ -w ] destination Resynchronizes a broken-off destination to its former

"Pass Any Exam. Any Time." - www.actualtests.com 7


Network Appliance NS0-155 Exam
source, putting the destination in the snapmirrored state and making it ready for update transfers.
The resync command must be issued on the destination node.

QUESTION NO: 11

Which two operations can be performed with the SnapDrive for windows graphical user interface?

A. Create volume
B. Create Snapshot copies
C. Create File
D. Create Disk

Answer: B,D
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278920

What SnapDrive does


SnapDrive software integrates with the Windows Volume Manager so that NetApp filers can serve
as virtual storage devices for application data in Windows 2000 Server and Windows Server 2003
environments.

SnapDrive is dependent on the virtual disk service. The virtual disk service must be started on the
host prior to installing SnapDrive. SnapDrive manages virtual disks (LUNs) on a NetApp filer,
making these virtual disks available as local disks on Windows hosts. This allows Windows hosts
to interact with the virtual disks just as if they belonged to a directly attached redundant array of
independent disks (RAID).

SnapDrive provides the following additional features:


It enables online storage configuration, virtual disk expansion, and streamlined management.
It integrates NetApp Snapshot technology, which creates point-in-time images of data stored on
virtual disks.
It works in conjunction with SnapMirror® software to facilitate disaster recovery from either
asynchronously or synchronously mirrored destination volumes.

QUESTION NO: 12

Which storage system command would display the WWPNs of hosts that have logged into storage

"Pass Any Exam. Any Time." - www.actualtests.com 8


Network Appliance NS0-155 Exam
system using a Fibre Channel connection?

A. fcp config
B. fcp initiator show
C. fcp show –i
D. fcp show initiator

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html

fcp show initiator [ -v ] [ adapter ]


If no adapter name is given, information about all initiators connected to all adapters are shown.
The command displays the portname of initiators that are currently logged in with the Fibre
Channel target adapters. If the portname is in an initiator group setup through the igroup
command, then the group name is also displayed. Similarly, all aliases set with the fcp wwpn-alias
command for the portname are displayed as well.
If the -v flag is given, the command displays the Fibre Channel host address and the
nodename/portname of the initiators as well.

QUESTION NO: 13

In a Fiber Channel configuration, the host’s HBA is referred to as the ___________, and the
storage system’s HBA to as the _____________.

A. Target, initiator
B. Primary, secondary
C. Initiator, target
D. Secondary, primary

Answer: C
Explanation:

QUESTION NO: 14

Which action will cause a currently in-sync SnapMirror relationship to fail out of sync?

A. Running snapmirroe update on the source storage system.

"Pass Any Exam. Any Time." - www.actualtests.com 9


Network Appliance NS0-155 Exam
B. Running snapmirror release on the source storage system.
C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system.

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html
https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html
snapmirror update [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c
create_dest_snap ] [ -w ] destination
For asynchronous mirrors, an update is immediately started from the source to the destination to
update the mirror with the contents of the source.

For synchronous mirrors, a snapshot is created on the source volume which becomes visible to
clients of the destination volume.

The snapmirror update command must be issued on the destination filer.


snapmirror release source { filer:volume | filer:qtree }
Tell SnapMirror that a certain direct mirror is no longer going to request updates.
If a certain destination is no longer going to request updates, you must tell SnapMirror so that it
will no longer retain a snapshot for that destination. This command will remove snapshots that are
no longer needed for replication to that destination, and can be used to clean up SnapMirror-
created snapshots after snapmirror break is issued on the destination side.

The source argument is the source volume or qtree that the destination is to be released from. The
destination argument should be either the destination filer and destination volume name or the
destination filer and destination qtree path. You can use a line from the output of the snapmirror
destinations command as the set of arguments to this command. The /etc/snapmirror.conf file
exists on the node containing the mirror used for SnapMirror.

QUESTION NO: 15

You are trying to do a single file SnapRestore for a file, but you are receiving an error message
that the directory structure no longer exists. Which is the most likely explanation?

A. Once the directory structure has been deleted, you cannot restore the file using single file
SnapRestore. You must now SnapRestore the volume.
B. Snapshot copies have been created since the original directory structure was deleted.
C. You must recreate the directory structure before trying to restore the file.
D. You cannot restore a file to an alternate location.

"Pass Any Exam. Any Time." - www.actualtests.com 10


Network Appliance NS0-155 Exam
Answer: C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html

You can restore a file only to the volume where it was originally located. The directory structure to
which a file is to be restored must be the same as that specified in the path. If this directory
structure does not exist, you must create it before restoring the file.

QUESTION NO: 16

Which mechanism allows you to make LUNs available to some initiators and unavailable to
others?

A. LUN masking
B. LUN grouping
C. LUN cloning
D. LUN hiding

Answer: A
Explanation:
http://en.wikipedia.org/wiki/Logical_Unit_Number_masking
Logical Unit Number Masking or LUN masking is an authorization process that makes a Logical
Unit Number available to some hosts and unavailable to other hosts.

QUESTION NO: 17

An iSCSI ______________ is established when the host initiator logs into the iSCSI target. Within
a ______________ you can have one or more ____________.

A. session, session, connections


B. connection, session, connections
C. connection, connection, sessions
D. session, connection, sessions

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 11


Network Appliance NS0-155 Exam
http://scst.sourceforge.net/mc_s.html
http://www.alacritech.com/legacypdf/iSCSI_Multiple_Connections.pdf

Meme: Remember the acronym: MCS or MC/S - Multiple Connections per Session. Microsoft
Windows 2008's MPIO driver supports MC/S.

QUESTION NO: 18

Which NetApp Virtual Storage Tier component works at the host level?

A. Flash Pool
B. Flash Disk
C. Flash Accel
D. Flash Cache
E. Flash IO

Answer: C
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3366.pdf&cc=us
Flash Accel utilizes server-based flash storage as cache for the host.

QUESTION NO: 19

When using a Protection Manager policy to manage Open systems SnapValut backups on a UNIX
server, which three valid objects to include in the data set? (Choose three)

A. The entire client


B. A directory
C. A file
D. A qtree

Answer: A,B,C
Explanation:

QUESTION NO: 20

"Pass Any Exam. Any Time." - www.actualtests.com 12


Network Appliance NS0-155 Exam
What does it signify if the disks are “not owned” in a FAS2020 system?

A. The disks are mailbox disks.


B. The disks are spare disks.
C. The disks are data disks.
D. The disks are not used.

Answer: D
Explanation:
Disks must be assigned to an aggregate to be used as raid group members or spares.
Unassigned disks are displayed as "not owned".

"Pass Any Exam. Any Time." - www.actualtests.com 13


Network Appliance NS0-155 Exam

QUESTION NO: 21

For each Open Systems platform directory to be backed up to the SnapVault secondary storage

"Pass Any Exam. Any Time." - www.actualtests.com 14


Network Appliance NS0-155 Exam
system you must execute _____________.

A. An initial baseline copy


B. A temporary copy
C. An incremental copy
D. A scheduled update copy

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-EEBC8B52-BEA9-4B49-874F-
7EC78D3F602E.html

Each open systems platform, when prompted by the secondary system, transfers initial base
images of specified directories to qtree locations on the secondary system.
Note: There are no primary-side Snapshot copies in Open Systems SnapVault.

QUESTION NO: 22

What is the maximum distance between a standard clustered pair at 2Bbps?

A. 100 meters
B. 10 meters
C. 50 meters
D. 500 meters

Answer: D
Explanation:

QUESTION NO: 23

Which exportfs command will temporally export the resource while ignoring the options specified in
the /etc/exports file?

A. exportfs – v <path>
B. exportfs –u <path>
C. exportfs –a <path>
D. exportfs – i <path>

Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com 15


Network Appliance NS0-155 Exam
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_exportfs.1.html
exportfs [ -v ] [ -io options ] path -i Ignores the options specified for a file system path in the
/etc/exports file. If you do not specify the –I option with the -o option, Data ONTAP uses the
options specified for the file system path in the /etc/ exports file instead of the options you specify
on the command line.

QUESTION NO: 24

Is NetApp storage Encryption supported in Data ONTAP 8.1.1 Cluster-Mode?

A. No, but you can file a PVR to request support.


B. No. it is targeted for a future release of Data ONATP.
C. Yes, only with a special license installed.
D. Yes, it has been supported since 8.0.1.

Answer: D
Explanation:
http://www.ntapgeek.com/2011/03/netapp-storage-encryption-available.html
March, 2011: "With the recent release of Data ONTAP 8.0.1, NetApp now offers full disk
encryption to prevent unauthorized access to data at rest."

QUESTION NO: 25

Which two cp types would indicate a busy storage system? (Choose two).

A. cp_from_log_full
B. cp_from_busy
C. cp_from_cp
D. cp_from_timer

Answer: A,C
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html
http://redhunter.com/blog/2010/02/11/netapp-consistency-points-in-cacti/
cp_from_log_full (log full) - the current NVRAM bank is full and the system switches to the other
one and starts writing this to disk. Very heavy write activity.

"Pass Any Exam. Any Time." - www.actualtests.com 16


Network Appliance NS0-155 Exam

cp_from_cp (aka Back to Back) - filer is overloaded. The write traffic is coming in faster than it can
be written and the filer is running out of NVRAM capacity in one bank before the data in the other
bank can be written.

cp_from_busy is not a real cp type


cp_from_timer - 10 seconds since the last CP – it means the system is pretty idle write-wise.

QUESTION NO: 26

There are three phases of Non Disruptive Volume Movement (NDVM). What is the correct
sequence of these phases?

A. Setup Phase, Mirror Phase, Cutover Phase


B. Initialization phase, Copy Phase, Migrate Phase
C. Begin Phase, Move Phase, Complete Phase
D. Setup Phase, Data Copy Phase, Cutover Phase

Answer: D
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/9734-102-1-
17848/PDF_Tips_Data_Motion_0211.pdf

Non-disruptive Volume Movement is called DataMotion. DataMotion uses SnapMirror for volume
migration.
A DataMotion migration occurs in three phases:
1. Setup
2. Data copy
3. Cutover

QUESTION NO: 27

Which statement describes the results of the SnapMirror resynce command?

A. Resynchronization finds the newest common snapshot shared by the two volumes or qtree, and
removes all newer information on the storage system on which the command is run.
B. Resynchronization will cause the loss of all data written to the destination after the original base

"Pass Any Exam. Any Time." - www.actualtests.com 17


Network Appliance NS0-155 Exam
snapshot was made.
C. Resynchronization will update the snapshot on the destination filer.
D. Resynchronization will update the snapshot on the source filer.

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html

snapmirror resync
[ -n ] [ -f ] [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c
create_dest_snap ] [ -w ] destination
Resynchronizes a broken-off destination to its former source, putting the destination in the
snapmirrored state and making it ready for update transfers. The resync command must be issued
on the destination node.

The resync command can cause data loss on the destination. Because it is effectively making
destination a replica of the source, any edits made to the destination after the break will be
undone.

For formerly mirrored volumes, the resync command effectively performs a SnapRestore (see
na_vol
(1)) on the destination to the newest snapshot which is common to both the source and the
destination. In most cases, this is the last snapshot transferred from the source to the destination,
but it can be any snapshot which is on both the source and destination due to SnapMirror
replication. If new data has been written to the destination since the newest common snapshot
was created, that data will be lost during the resync operation.

QUESTION NO: 28

If you were troubleshooting and wanted to look at SnapMirror log files, what is the path to these
files?

A. /vol/vol0/etc/log/snaplog/
B. /vol/vol0/etc/snapmirror/
C. /vol/vol0/etc/snaplog/
D. /vol/vol0/etc/log/

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html

"Pass Any Exam. Any Time." - www.actualtests.com 18


Network Appliance NS0-155 Exam
The root volume is always vol0 and etc is contained therein. When exporting the root volume via
NFS, the path is/vol/vol0; so the full path to snapmirror log files is /vol/vol0/etc/log.
/etc/log/snapmirror.

This file logs SnapMirror activity. Log file for current week.
/etc/log/snapmirror.[0-5] SnapMirror log files for previous weeks.

QUESTION NO: 29

Host multi-pathing describes a ____________ solution that has at least two distinct
______________ paths to a LUN.

A. Token ring, physical


B. FC SAN, virtual
C. FC or IP SAN, virtual
D. FC or IP SAN, Physical

Answer: D
Explanation:
http://en.wikipedia.org/wiki/Multipath_I/O
Fiber Channel (FC), FCoE and iSCSI encapsulate SCSI-3. FCoE and iSCSI further encapsulate
the transport within IP; hence the term IP SAN.

In computer storage, multipath I/O is a fault-tolerance and performance enhancement technique


whereby there is more than one physical path between the CPU in a computer system and its
mass storage devices through the buses, controllers, switches, and bridge devices connecting
them.

A simple example would be a SCSI disk connected to two SCSI controllers on the same computer
or a disk connected to two Fibre Channel ports. Should one controller, port or switch fail, the
operating system can route I/O through the remaining controller transparently to the application,
with no changes visible to the applications, other than perhaps incremental latency.

QUESTION NO: 30

Which two will allow you to read and analyze a packet trace file generated by the storage system?
(Choose two)

"Pass Any Exam. Any Time." - www.actualtests.com 19


Network Appliance NS0-155 Exam
A. WireShark
B. Pktt
C. Netmon
D. Eternal View

Answer: A,C
Explanation:
pktt is part of the Data OnTap command set.
The output of pktt is not very human-readable, but it utilizes the tcpdump format which many traffic
analyzers can read or import. Only two such analyzers have been offered here.

Wireshark is the successor of Etherreal, and available for several platforms. Netmon is a Microsoft
project, available for Windows, soon to be deprecated by the Microsoft Message Analyzer project.

QUESTION NO: 31

How does the NetApp Remote Agent (RSA) connect to NetApp Support?

A. NetApp Support initiates a non-secure connection to the RSA.


B. NetApp Support initiates a secure connection to the RSA.
C. The RSA initiates a secure connection to NetApp Support.
D. The RSA initiates a non-secure connection to NetApp support.

Answer: C
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMP1200040

Remote Support Agent is the facility to provide NetApp Support Engineers with the ability to
remotely trigger AutoSupport.

Remote Support Agent uses HTTP or HTTPS to communicate with the storage controller to initiate
commands and to collect files. It uses HTTPS to send system logs and core files from the Data
ONTAP root volume to Remote Support Enterprise on the NetApp Support side.
NetApp RSA is not related to the RSA public key encryption algorithm.

QUESTION NO: 32

"Pass Any Exam. Any Time." - www.actualtests.com 20


Network Appliance NS0-155 Exam
Which two commands can be used to enable LUN reservations? (Choose two)

A. lun set reservation


B. lun reservation set
C. lun map
D. lun create

Answer: A,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

lun set reservation lun_path [ enable | disable ]


Enables or disables the space reservation on the LUN. If no arguments are supplied after the
lun_path, then the space reservation status of the given lun_path is displayed.
lun create -s size -t ostype [ -o noreserve ] [ -e space_alloc ] lun_path
This usage of the lun create command should be employed to create a new LUN of given size,
with initially zero contents. The LUN is created at the lun_path given. No file should already exist
at the given lun_path. The directory specified in the lun_path must be a qtree root directory.

The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix
can be used: c (1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m).

The size of the created LUN could be larger than the size specified, in order to get an integral
number of cylinders while reporting the geometry using SAN protocols.

The size of the LUN actually created is reported if it is different from that specified in the
command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk
in a singleslice partition), windows (the LUN will be used to store a raw disk device in a single-
partition Windows disk using the MBR (Master Boot Record) partitioning style), hpux (the LUN will
be used to store HP-UX data), aix (the LUN will be used to store AIX data), vld (the LUN contains
a SnapManager VLD), linux (the LUN will be used to store a Linux raw disk without any partition
table), netware (the LUN will be used to store NetWare data), vmware (the LUN will be used to
store VMware data), windows_gpt (the LUN will be used to store Windows data using the GPT
(GUID Partition Type) partitioning style), windows_2008 (the LUN will be used to store Windows
data for Windows 2008 systems), openvms (the LUN will be used to store Open-VMS data), xen
(the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),
solaris_efi

By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be
specified.

"Pass Any Exam. Any Time." - www.actualtests.com 21


Network Appliance NS0-155 Exam
Using this option will create a LUN without any space being reserved. Provisioning threshold
events can be enabled by specifying -e space_alloc option. This option has to be used in
conjunction with -o noreserve.

lun map [ -f ] lun_path initiator_group [ lun_id ]


Maps a LUN to all the initiators in the supplied group. If a LUN ID is not specified, the smallest
number that can be used for the various initiators in the group is automatically picked. Note that
this command can be used multiple times to configure multiple maps for a LUN, or for an initiator
group. Once created, you can use lun show -m to list all the LUN mappings.
The optional -f argument disables checking with the HA partner for LUN mapping conflicts.

QUESTION NO: 33

Which Data ONTAP option sets system-wide for all transfers?

A. Options transfers.wide.enable
B. Options transfer.throttle.enable.
C. Option replication.wide.enable
D. Options replication.throttle.enable

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

replication.throttle.enable Enables global network throttling of SnapMirror and SnapVault transfers.


The default value for this option is off.
replication.throttle.incoming.max_kbs
This option specifies the maximum total bandwidth used by all the incoming (applied at
destination) SnapMirror and SnapVault transfers, specified in kilobytes/sec. The default value for
this option is unlimited, which means there is no limit on total bandwidth used. This option is valid
only when the option replication.throttle.enable is on.

replication.throttle.outgoing.max_kbs
This option specifies the maximum total bandwidth used by all the outgoing (applied at source)
SnapMirror and SnapVault transfers specified in kilobytes/sec. The default value for this option is
unlimited, which means there is no limit on total bandwidth used. This option is valid only when the
option replication.throttle.enable is on.

"Pass Any Exam. Any Time." - www.actualtests.com 22


Network Appliance NS0-155 Exam

QUESTION NO: 34

What is the correct format for the scheduling component of a SnapVault schedule?

A. cnt[@day_list][@hour_list]
B. YYYY-MM-DD
C. Crontable format
D. List of dates in ISO Date format

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html
http://www.geekyfacts.com/index.php?option=com_content&view=article&id=64:snapvault
snapvault snap sched [ -f ] [ -x ] [ -o options ] [ volname [ snapname [ schedule ]]]
schedule is cnt[@day_list][@hour_list] or cnt[@hour_list][@day_list]
In the schedule, cnt tells SnapVault how many of the snapshots to keep for primaries and for non-
SnapLock secondary volumes. The snapshots will be numbered newest to oldest from 0 to cnt-1.
When creating a new snapshot, SnapVault will delete the oldest snapshots, increment by one the
number on the remaining snapshots and then create a new number 0 snapshot. If a snapshot is
missing from the sequence (e.g. sv.0, sv.1, and sv.3 exist but sv.2 does not), only snapshots that
need to be renumbered to make room for the new sv.0 snapshot will be renumbered. In the
example, sv.0 and sv.1 would be renamed to sv.1 and sv.2, but sv.3 would remain unchanged.

The cnt in the schedule is interpreted differently for SnapVault secondary SnapLock volumes. For
SnapLock secondary volumes, snapshots are created with a name that includes an encoded date
and time of when the snapshot is created. These snapshots are never renamed and they are
never automatically deleted. These snapshots may be deleted using snap delete after the
retention period of the snapshot has expired. If cnt is 0, no snapshots will be taken. If cnt is any
non-zero value, snapshots will be taken and no snapshots will be automatically deleted.

If specified, the day_list specifies which days of the week the snapshot should be created. The
day_list is a comma-separated list of the first three letters of the day: mon, tue, wed, thu, fri, sat,
sun. The names are not case sensitive. Day ranges such as mon-fri can also be given. The default
day_list is mon-sun, i.e. every day.

If specified, the hour_list specifies which hours of the day the snapshot should be created, on each
scheduled day. The hour_list is a comma-separated list of the hours during the day, where hours
are integers from 0 to 23. Hour ranges such as 8-17 are allowed. Also, step values are allowed in
conjuction with ranges. For example, 0-23/2 means "every two hours". The default hour_list is 0,
i.e. midnight on the morning of each scheduled day.

"Pass Any Exam. Any Time." - www.actualtests.com 23


Network Appliance NS0-155 Exam

QUESTION NO: 35

When will a Volume SnapMirror (VSM) from a 64-bit source to a 32-bit destination volume fail?

A. When the 64-bit volumes has Volume Guarantee disabled


B. When the 64-bit volume has compression enabled
C. When the 64-bit volume has FlexShare enabled
D. When the 64-bit volume has ASIS enabled

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-87340429-8F4A-4AA6-B081-
0F5040089C78.html
Data compression requires 64-bit aggregates.

QUESTION NO: 36

UNIX allows file access based on___________.

A. NT ACLs and UNIX permissions.


B. NT ACLs and SID.
C. GID or UID and UNIX permissions.
D. GID or UID and ACLs.

Answer: C
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html

In OnTap 8.0, when UNIX security style is selected, only UNIX security objects can be used. The
correct answer is GID, UID and UNIX permissions.

Basic UNIX permissions are organized into three classes: user, group, and others.
UNIX operating systems identify users with a numerical value: a user identifier, also known as a
UID or User ID. Each user is a member of a group of the same name as the user. Like UIDs,
groups (GIDs) are also specified using a numerical value.

"Pass Any Exam. Any Time." - www.actualtests.com 24


Network Appliance NS0-155 Exam

QUESTION NO: 37

Which NetApp Storage Tier component works controller-wide on a FAS controller?

A. Flash Pool
B. Flash Disk
C. Flash Accel
D. Flash Cache
E. Flash IO

Answer: D
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us
http://www.netapp.com/us/products/storage-systems/flash-
cache/index.aspx?ref_source=ntp141p359372brg-c-26967a63-442e-c7e9-6a73-
00002efa4dd6&gclid=CLLdsqWKrbkCFS4aOgodb1AAuA

Flash Cache is a controller-attached PCIe intelligent caching solution.


Flash Accel is a host-attached caching solution.
Flash Pool utilizes SSDs to enhance performance of disk aggregates (implicitly not controller-
wide).
Flash Disk and Flash IO are ambiguous terms.

QUESTION NO: 38

Which NetApp Storage Tier component works aggregate-wide on a FAS controller?

A. Flash Pool
B. Flash Disk
C. Flash Cache
D. Flash Accel
E. Flash IO

Answer: A
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=ds-3177-0512.pdf&cc=us

"Pass Any Exam. Any Time." - www.actualtests.com 25


Network Appliance NS0-155 Exam
http://www.netapp.com/us/products/platform-os/flashpool.aspx
Flash Pool utilizes SSDs to enhance performance of disk aggregates.
Flash Cache is a controller-attached PCIe intelligent caching solution.
Flash Accel is a host-attached caching solution.
Flash Disk and Flash IO are ambiguous terms.

QUESTION NO: 39

What are two methods of protecting LUN overwrites using Snapshot copies on a volume with
fractional reserve set to 0%? (Choose two)

A. Snap Autodelete
B. iGroup throttle
C. LUN reset
D. Volume AutoSize

Answer: A,D
Explanation:
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/03/05/fractional-
reservation--lunoverwrite

From the article:


"If you reduce the Fractional Reservation to 0, you need to make sure the rate of change is within
the volume size, or you need to make sure the volume can auto-grow when required or even snap
auto-delete to reduce the reserved blocks and free up space (although I am not a huge fan of snap
auto-delete for various reasons)."

QUESTION NO: 40

Which set of protocols provide block-level access to NetApp storage?

A. SNA and RPC


B. iSCSI and FCP
C. HTTP and FTP
D. CIFS and NFS

Answer: B

"Pass Any Exam. Any Time." - www.actualtests.com 26


Network Appliance NS0-155 Exam
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonly referred to as a block storage protocols. FCoE is another such protocol.
CIFS and NFS, HTTP and FTP provide file access not block access.

QUESTION NO: 41

An iSCSI or FC SAN implementation provides ____________ access to LUNs.

A. VLD
B. VIIP
C. File
D. Block

Answer: D
Explanation:
iSCSI and Fiber Channel encapsulate SCSI protocol, simulating direct disk access. These are
commonly referred to as a block storage protocols. FCoE is another such protocol.
CIFS and NFS, HTTP and FTP provide file access not block access.

QUESTION NO: 42

Which command on the storage system allows you to display statistics on the performance of
system resource such as CPU, NVRAM, network interfaces, and disks?

A. netstat
B. netdiag
C. pktt
D. sysstat

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html
sysstat reports aggregated filer performance statistics such as the current CPU utilization, the
amount of network I/O, the amount of disk I/O, and the amount of tape I/O.

"Pass Any Exam. Any Time." - www.actualtests.com 27


Network Appliance NS0-155 Exam

QUESTION NO: 43

Which three protocols can coexist on a NetApp storage system? (Choose three)

A. DAFS
B. CIFS
C. DFS
D. FCP
E. NFS

Answer: B,D,E
Explanation:
Data OnTap can simultaneously serve NAS and SAN protocols. CIFS, NFS, and FC protocol are
examples of NAS and SAN protocols respectively.

Data OnTap 7.1 or later does not support DAFS.


DFS provides location transparency and redundancy by allowing shares in multiple different
locations to be logically grouped under one folder, or DFS root. While practically a CIFS server
shared by a Data OnTap filer can be a DFS target, DFS namespaces can only be hosted on
Windows systems.

QUESTION NO: 44

Which three tools present statistics from the Data ONTAP counter manager? (Choose three)

A. Operations manager
B. Window perfmon
C. Sysstat
D. Stats

Answer: A,B,D
Explanation: Section: OnTap Administration
Explanation

https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html
https://communities.netapp.com/servlet/JiveServlet/previewBody/18684-102-5-
34635/TR4090PerformanceAdvisorFeatures%26Diagnosis.pdf
https://communities.netapp.com/groups/chris-kranz-hardware-pro/blog/2009/04/01/performance-

"Pass Any Exam. Any Time." - www.actualtests.com 28


Network Appliance NS0-155 Exam
stats-withoutperfstat-or-ops-mgr

Note in the diagram below how the performance tools integration with Data OnTap. statit and
sysstat interface directly with the performance counters while the other tools - including stats, a
command line tool -integrate with the Counter Manager.

QUESTION NO: 45

What security mechanism can an administrator use on an OSSV client to use permissions
allowing backup to a SnapVault secondary system?

A. MD5 authentication between SnapVault primary and secondary, with changeable password
B. Contents inside file called access and located in OSSV /snapvault/etc
C. QSM access list modifiable via svconfigurator
D. Via /etc/hosts.equiv file

Answer: C
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf
In order to restrict the NetApp secondary systems that are allowed to initiate backups from an
OSSV host, the QSM Access List field can be populated with the hostname of the secondary using
the OSSV Configurator utility. When using this option, make sure the “Check QSM Access List”
box is enabled.

"Pass Any Exam. Any Time." - www.actualtests.com 29


Network Appliance NS0-155 Exam
The snapvault.access option on the NetApp secondary can be used to restrict the OSSV hosts
that are allowed to initiate restores from that secondary system. This option can be populated with
a list of hostnames for each OSSV host. For example:
options snapvault.access host=ossv1,ossv2,ossv3
Screenshot of the svconfigurator GUI; note the QSM access list checkbox and field.

QUESTION NO: 46

Which command disables client access to Snapshot copies on a volume called flexvoll?

A. cifs shares –change flxvoll –nosnap


B. snap access flexvoll off
C. vol options flexvoll nonsnapdir on
D. vol options flexvoll snapdir off
E. vol options flexvoll snapdir on

Answer: C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_vol.1.html
vol options nosnapdir [on|off]
If this option is on, it disables the visible .snapshot directory that is normally present at client

"Pass Any Exam. Any Time." - www.actualtests.com 30


Network Appliance NS0-155 Exam
mount points, and turns off access to all other .snapshot directories in the volume. The default
setting is off.

QUESTION NO: 47

When using MetroCluster in a forced takeover mode, identify two methods for restricting access to
the disaster site node. (Choose two)

A. Use manual fencing


B. Use the cf giveback –f command.
C. Use the cf forcetakeover –d command.
D. Turn off power to the disaster site node.
E. Isolate the failed node from the surviving node.

Answer: A,D
Explanation:
http://vipulvajpayeestorage.blogspot.com/2012/01/manually-failover-activity-in-netapp.html

In order to test or effect a Disaster Recovery operation, you must restrict access to the disaster
site node to prevent the node from resuming service. If you do not, you risk the possibility of data
corruption.

Access to the disaster site note can be restricted in the following ways:
Turn off the power to the disaster site node Use "manual fencing" (Disconnect VI interconnects
and fiber channel cables; either physically or through configuration changes on the fabric
switches.)
Isolating the failed node from the surviving node could still lead to the possibility of a split brain, so
this is not a correct answer.

QUESTION NO: 48

The two copies SyncMirror volume are called ____________, which are physical copies of the
same file system and consist of one or more RAID groups.

A. Snapshot copies
B. Aggregates
C. Plexes

"Pass Any Exam. Any Time." - www.actualtests.com 31


Network Appliance NS0-155 Exam
D. Volumes

Answer: C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-D4D7C7F0-9063-4099-B5CA-
8FEE619EEF1D.html

SyncMirror is a feature of Data OnTap used to mirror data to two separate aggregates. It allows for
real-time mirroring of data to matching aggregates physically connected to the same storage
system.
SyncMirror provides for synchronous mirroring of data, implemented at the RAID level. You can
use SyncMirror to create aggregates that consist of two copies of the same WAFL file system. The
two copies, known as plexes, are simultaneously updated. Therefore, the copies are always
identical. The two plexes are directly connected to the same system.

The following provides information about the activities of SyncMirror:


SyncMirror can be used to mirror aggregates and traditional volumes. (A traditional volume is
essentially an aggregate with a single volume that spans the entire aggregate.)
SyncMirror cannot be used to mirror FlexVol volumes. However, FlexVol volumes can be mirrored
as part of an aggregate.
SyncMirror is different from synchronous SnapMirror.

QUESTION NO: 49

You want to create an automated test environment that performs a single file SnapRestore time
you run the procedure, however, SnapRestore prompts you to confirm your decision to revert the
file. How can you automate this step?

A. Use the -f option with the snap restore command.


B. Enable the options snaprestore_noprompts enable = on option.
C. These prompts are for data protection and auditing and cannot be overridden.
D. Enter the priv set advanced mode on the storage system and prompt will not appear.

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snap.1.html

snap restore [ -f ] [ -t vol | file ] [ -s snapshot_name ] [ -r restore_as_path ]

"Pass Any Exam. Any Time." - www.actualtests.com 32


Network Appliance NS0-155 Exam
vol_name | restore_from_path
Reverts a volume to a specified Snapshot copy, or reverts a single file to a revision from a
specified Snapshot copy.
Before reverting the volume or file, the user is requested to confirm the operation. The -f option
suppresses this confirmation step.

QUESTION NO: 50

When viewing the output of the sysstat –f command, which three fields are part of the output?
(Choose three)

A. FCP
B. FTP
C. CIFS
D. NFS
E. iSCSI

Answer: A,C,D
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html

sysstat [ -c count ] [ -s ] [ -u | -x | -m | -f | -i | -b ] [ -d ] [ interval ]


-f For the default format display FCP statistics.
The FCP default output format is as follows:
CPU NFS CIFS FCP Net kB/s Disk kB/s FCP kB/s Cache
in out read write in out age
###% ##### ##### ##### ##### ##### ##### ##### ##### ##### >##

QUESTION NO: 51

Five minutes ago, you performed a single file SnapRestore on a large NFS file. 40% of your NFS
users are now complaining about getting “stale file handles” for the file. Which is the most likely
cause of this problem, and the best procedure to correct it?

A. This might be due to an NFS storage system and client mismatch. Check to see that these
users have the same version of the NFS client that existed at the time the snapshot was taken.

"Pass Any Exam. Any Time." - www.actualtests.com 33


Network Appliance NS0-155 Exam
B. NFS users why try to access a reverted file without first reopening it might get a “stale file
handle” error message. Have the users try to reopen the file and see if the problem is resolved.
C. After a single file SnapRestore, NFS users have to reboot their systems. Have them reboot
their systems.
D. These users are on a different subnet from the others. Start troubleshooting by checking their
subnet.

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-35C9A4BA-02BA-4965-A366-
698C1299E29D.html

Reverting a file to a selected Snapshot copy


Using snap restore to revert a single file to a selected Snapshot copy is practical when the file is
so large that you cannot copy the previous file version from the Snapshot copy to the active file
system.
Before you begin Ensure that you notify the network users before reverting a file so that they know
that the current data in the file will be replaced by that of the selected Snapshot copy.

Note: NFS users who try to access a reverted file without first reopening it might get a stale file
handle error message after the volume reversion.

QUESTION NO: 52

Using the output below, a co-worker determined that these are types “Solaris” LUNs. What would
your destination be?

lun show – m LUN patch mapped to LUN ID -------------------------------------------------------

/vol/vol1/lun0 solaris – igroup0 0 /vol/vol1/lun solaris- igroup1

0 /vol/vol1/qtree1/lun2 solaris – igroup2 0 /vol/vol1/qtree1/lun3 solaris – igroup3 0

A. These are type “Solaris” LUNs.


B. Not enough information is given here. Run the lun status command to get the information
requested.
C. Not enough information is given here. Run the lun show –v command to get the information
requested.
D. Not enough information is given here. Run the lun map command to get the information

"Pass Any Exam. Any Time." - www.actualtests.com 34


Network Appliance NS0-155 Exam
requested.

Answer: C
Explanation:

QUESTION NO: 53

Which statement is true about ASIS deduplication license with Data ONTAP 8.1?

A. The existing 8.0 license key is used.


B. A new license key is generated.
C. The license is capacity-based.
D. The license no longer exists.

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1120690/html/frameset.html

Changes to deduplication in 8.1 7-mode


Starting with Data ONTAP 8.1, you can enable the deduplication feature without adding a license.
For
deduplication, no limit is imposed on the supported maximum volume size. The maximum volume
size limit is determined by the type of storage system regardless of whether deduplication is
enabled.

QUESTION NO: 54

Which MetroCluster configuration procedure is recommended for re-establishing a mirrored


volume that was in a level-0 resynchronization state when it failed?

A. Determine which volumes are at the remote and disaster sites.


B. Re-create the synchronous mirror.
C. Rejoin the two volumes.
D. Turn on power to the cluster node at the disaster site.

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1210206/html/GUID-A865DB95-9418-4ED2-A993-

"Pass Any Exam. Any Time." - www.actualtests.com 35


Network Appliance NS0-155 Exam
74F347F674A0.html

1. Validate that you can access the remote storage by entering the following command:
aggr status -r
Note: A (level-0 resync in progress) message indicates that a plex cannot be rejoined.

2. Turn on the power to the node at the disaster site. After the node at the disaster site boots up, it
displays the following:
Waiting for giveback...(Press Ctrl-C to abort wait)

3. If the aggregates at the disaster site are online, take them offline by entering the following
command for each aggregate that was split:
aggr offline disaster_aggr
disaster_aggr is the name of the aggregate at the disaster site.
Note: An error message appears if the aggregate is already offline.

4. Destroy every target plex that is in a level-0 resync state by entering the following command:
aggr destroy plex_name

5. Re-create the mirrored aggregates by entering the following command for each aggregate that
was split:
aggr mirror aggr_name -v disaster_aggr
aggr_name is the aggregate on the surviving site’s node.
disaster_aggr is the aggregate on the disaster site’s node.
The aggr_name aggregate rejoins the disaster_aggr aggregate to reestablish the MetroCluster
configuration.

6. Enter the following command at the partner node:


cf giveback
The node at the disaster site reboots.

QUESTION NO: 55

When running deduplication on SnapVault destinations, which three statements are true?

A. The target SnapVault controller deduplicates inline.


B. The source SnapVault data is deduplicated inline on the target before it is written to disk.
C. Deduplication internally synchronizes with the SnapVault schedule on the destination.
D. The source (primary) system sends duplicated data even if the source data is deduplicated.

"Pass Any Exam. Any Time." - www.actualtests.com 36


Network Appliance NS0-155 Exam
E. Deduplication with SnapVault creates a snapshot, deduplicates, then deletes and recreates the
snapshot to effectively deduplicate savings.

Answer: C,D,E
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196986/html/GUID-E5AD37DE-2F44-47DB-90A3-
C8E115FCBFB7.html
SnapVault replicates at the file level not the block level.
Deduplication is always a post-processed activity for Data OnTap, while compression is an inline
process.
The deduplication schedule depends on the SnapVault update schedule on the destination
system.
A new Snapshot copy replaces the archival Snapshot copy after deduplication finishes running on
the destination system. (The name of this new Snapshot copy is the same as that of the archival
copy, but the Snapshot copy uses a new timestamp, which is the creation time.)
The SnapVault update recognizes the deduplicated blocks as changed blocks. Thus, when
deduplication is run on an existing SnapVault source for the first time, all saved space is
transferred to the destination system.

QUESTION NO: 56

If you believe you create FC SAN performance problem, which NatApp utility would gather both
your Solaris host and storage system data for analysis?

A. sio_ntap.exe
B. prestart
C. poststat
D. perfstat

Answer: D
Explanation:
https://communities.netapp.com/docs/DOC-1059

Performance and Statistics Collector (perfstat) is a data collection tool with several key properties:

Perfstat comes in exactly two flavors:

Supported platforms:

"Pass Any Exam. Any Time." - www.actualtests.com 37


Network Appliance NS0-155 Exam

QUESTION NO: 57

Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous


SnapMirror?

A. FilerA:source_vol FilerB:destination_vol visibility_interval = lhr, outstanding = 3ms,


cksum=crc32 syns
B. FilerA:source_vol FilerB:destination_vol – 0-55/5 * * *
C. FilerA:source_vol FilerB:destination_vol – sync
D. FilerA:source_vol FilerB:destination_vol outstanding=3s sync

Answer: A,C,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man5/na_snapmirror.conf.5.html
Each relationship entry of the /etc/snapmirror.conf file is a single line containing space-separated
fields.
The entry has this format:
Source destination arguments schedule schedule
This is the schedule used by the destination node for updating the mirror. It informs the SnapMirror
scheduler when transfers will be initiated. The schedule field can contain the word sync to specify
fully synchronous mirroring, semi-sync to specify semi-synchronous mirroring, or a cron-style
specification of when to update the mirror.

visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m
(minutes) or h (hours). If a suffix is not specified, value is interpreted as seconds. This argument
controls the amount of time before an automatic snapshot is created on the source volume that is
synchronously mirrored. The value is the number of seconds between automatically created
snapshots. The default value is 3 minutes. A small number here can negatively affect the
performance of the mirror. This argument is ignored for asynchronous mirrors.

Outstanding (deprecated)
This argument controls the performance versus synchronicity trade-off for synchronous mirrors.
The value for this argument is a number followed by the suffixes: ops (operations), ms
(milliseconds) or s (seconds). Setting a value less than 10s configures the mirror to run in fully
synchronous mode. Setting a value greater than or equal to 10s configures the mirror to run in
semi-synchronous mode. This argument is ignored for asynchronous mirrors. Please note that this
is a deprecated option. Use the schedule field to specify the synchronous mode for the mirror.

cksum

"Pass Any Exam. Any Time." - www.actualtests.com 38


Network Appliance NS0-155 Exam
This controls which checksum algorithm is used to protect the data transmitted by SnapMirror.
Currently supported values are "none", "crc32c", and "crc32c_header_only". The value
"crc32c_header_only" has been added only for volume SnapMirror and is not supported for
synchronous SnapMirror and qtree SnapMirror.

QUESTION NO: 58

Which three are valid LUN commands? (Choose three)

A. lun clone
B. lun copy
C. lun move
D. lun rename
E. lun snap

Answer: A,C,E
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

The following commands are available in the lun suite:

QUESTION NO: 59

Which three attributes would you specify when creating a LUN? (Choose three)

A. The host operating system of the system attached to LUN.


B. The version of Data ONTAP
C. The size of the LUN.
D. The path to the LUN.

Answer: A,C,D

"Pass Any Exam. Any Time." - www.actualtests.com 39


Network Appliance NS0-155 Exam
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

The usage for lun create is shown below. Options not in brackets are mandatory.
lun create -s size -t ostype [ -o noreserve ] [ -e space_alloc ] lun_path
This usage of the lun create command should be employed to create a new LUN of given size,
with initially zero contents. The LUN is created at the lun_path given. No file should already exist
at the given lun_path. The directory specified in the lun_path must be a qtree root directory.

The size is specified in bytes. Optionally, a number followed by a one-character multiplier suffix
can be used: c (1), w (2), b (512), k (1024), m (k*k), g (k*m), t (m*m).
The size of the created LUN could be larger than the size specified, in order to get an integral
number of cylinders while reporting the geometry using SAN protocols.

The size of the LUN actually created is reported if it is different from that specified in the
command.
The mandatory ostype argument is one of: solaris (the LUN will be used to store a Solaris raw disk
in a singleslice partition), windows (the LUN will be used to store a raw disk device in a single-
partition Windows disk using the MBR (Master Boot Record) partitioning style), hpux (the LUN will
be used to store HP-UX data), aix (the LUN will be used to store AIX data), vld (the LUN contains
a SnapManager VLD), linux (the LUN will be used to store a Linux raw disk without any partition
table), netware (the LUN will be used to store NetWare data), vmware (the LUN will be used to
store VMware data), windows_gpt (the LUN will be used to store Windows data using the GPT
(GUID Partition Type) partitioning style), windows_2008 (the LUN will be used to store Windows
data for Windows 2008 systems), openvms (the LUN will be used to store Open-VMS data), xen
(the LUN will be used to store Xen data), hyper_v (the LUN will be used to store Hyper-V data),
solaris_efi (the LUN will be used to store Solaris_EFI data).

By default, the LUN is space-reserved. To manage space usage manually, -o noreserve can be
specified.
Using this option will create a LUN without any space being reserved. Provisioning threshold
events can be enabled by specifying -e space_alloc option. This option has to be used in
conjunction with -o noreserve.

QUESTION NO: 60

Which three items are NFS resources for export? (Choose three.)

A. aggregate

"Pass Any Exam. Any Time." - www.actualtests.com 40


Network Appliance NS0-155 Exam
B. directory/qtree
C. file
D. subnet
E. volume

Answer: B,C,E
Explanation:
You can export any file path. Implicitly file paths are filesystem objects. You can export a directory,
a qtree, a volume or even a file.

QUESTION NO: 61

Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server 2008.

A. True
B. False

Answer: B
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3740.pdf&cc=us

SMB 2.0 support was included in Data OnTap 8.1.

QUESTION NO: 62

In a tape environment after a SnapRestore reversion of a volume, incremental backup and restore
operations on the file or volume cannot rely on the timestamps to determine what data needs to be
backed up or restored. Which course of action ensures correct incremental backups?

A. Perform a base-level backup of the volume after you restore it.


B. Reboot the storage system to reset timestamps back to their original times before the reversion.
C. Take a new snapshot of the volume to create new base-level timestamps for the incremental
backup.
D. Take a new snapshot of the volume to create new base-level timestamps for the incremental
backup, and then perform a base-level backup of the volume after you restore it.

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 41


Network Appliance NS0-155 Exam
A baseline (aka "full") backup is always required before valid incremental backups can be made.

QUESTION NO: 63

Which changes the NDMP password on the Open System SnapVault agent?

A. password
B. password <new_password>
C. svpasswd <new_password>
D. svpassword <new_password>

Answer: D
Explanation:
https://kb.netapp.com/support/index?
Page=content&id=2010134&actp=LIST_RECENT&viewlocale=en_US&searchid=1296570465177
The svpassword command is available on the OSSV host as part of the agent binaries in the path
<INSTALL_PATH>\netapp\snapvault\bin.

QUESTION NO: 64

Which three licenses are required for fabric-attached MetroCluster? (Choose three.)

A. Cluster
B. Cluster_remote
C. Syncmirror_local
D. Syncmirror_fabric
E. Syncmirror_remote

Answer: A,B,C
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf
http://backdrift.org/man/netapp/man1/na_license.1.html
In preparation for a fabric attached metrocluster configuration, the following licenses must be
installed:
Cluster syncmirror _local
cluster_remote
syncmirror_fabric and syncmirror_remote are not valid license types.

"Pass Any Exam. Any Time." - www.actualtests.com 42


Network Appliance NS0-155 Exam

QUESTION NO: 65

Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose three.)

A. A LUN can be converted into a VLD.


B. LUNs can be accessed using the FCP protocol.
C. LUNs can be accessed using the iSCSI protocol.
D. Block services are associated with an iSCSI or FCP SAN environment.

Answer: B,C,D
Explanation:
Sadly, you cannot convert a LUN into a Vulcan Language Dictionary.

QUESTION NO: 66

To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site
_______ utility. (Choose two.)

A. AutoSupport
B. Bugs Online
C. NetApp Diagnostics
D. Release Comparison
E. System Configuration Guide

Answer: B,D
Explanation:
This question is out of date, but its still on the exam as of Sept2013! NOW has been replaced with
support.netapp.com.

You should be very familiar with what AutoSupport does. Also if you have done any research, you
know that the System Configuration Guide is an invaluable tool that you will use regularly. Neither
of those are related to bugs.

Bugs Online (BOL) is located at http://support.netapp.com/NOW/cgi-bin/bol/ Bugs Online provides


a suite of tools to help manage and resolve your bug issues.

"Pass Any Exam. Any Time." - www.actualtests.com 43


Network Appliance NS0-155 Exam
The Release Bug Advisor is located at
http://support.netapp.com/NOW/cgi-bin/relrec

There is also a Version Comparison tool available at


https://communities.netapp.com/docs/DOC-8168/diff?secondVersionNumber=8

QUESTION NO: 67

Which two commands on the storage system allow you to gather detailed statistics about network
interfaces, including basic information about network connections? (Choose two.)

A. ifstat -a
B. netdiag -n
C. netstat -i
D. sysstat 1

Answer: A,C
Explanation:
ifstat -a provides detailed statistics (multiple pages) about all network interfaces.
netstat -i provides a list of connections and open network sockets (listeners).
netdiag -n will perform a diagnostic but does not provide detailed statistics about networking.
sysstat 1 will provide performance statistics but not detailed statistics about networking.

QUESTION NO: 68

To configure a storage system as a member of a Windows active directory domain, the time on the
storage system must be set to be within plus or minus five minutes of the time on the domain
controller.

A. True
B. False

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 44


Network Appliance NS0-155 Exam
QUESTION NO: 69

For automatic user name mapping to occur for a CIFS and UNIX user name that are the same,
you must do what?

A. Enter the CIFS user in the NIS database.


B. Enter the user names in the /etc/hosts.equiv file.
C. Use both a NIS server and a Domain Controller in the network.
D. Nothing: mapping will occur if user name authentication is available.

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html

If the user names in the UNIX password database are identical to the Windows names, you need
not provide the mapping information in the /etc/usermap.cfg file.

QUESTION NO: 70

If the security style is set to UNIX, CIFS client file access is determined by ___________.

A. NT ACLs
B. the last client to set permissions
C. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
D. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX

Answer: C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196993/html/GUID-09C7812F-E6EA-47C6-AB79-
EAB803E7A8EB.html

For Data ONTAP to obtain the UID and GIDs for a CIFS user, it must first determine the user’s
UNIX-style name. It does this through user mapping.

QUESTION NO: 71

NTFS allows file access based on ___________.

"Pass Any Exam. Any Time." - www.actualtests.com 45


Network Appliance NS0-155 Exam
A. NT ACLs and SID.
B. NT ACLs and UNIX permissions.
C. SID and password.
D. UNIX permissions.

Answer: A
Explanation:
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/smg/GUID-866DD79D-D2A6-4FBA-
B0BDA63560FECEFF.html

In OnTap 8.0, when NTFS security style is used, only Windows style security objects are used.
For CIFS clients, security is handled using Windows NTFS ACLs.
For NFS clients, the NFS UID (user id) is mapped to a Windows SID (security identifier) and its
associated groups. Those mapped credentials are used to determine file access, based on the
NFTS ACL.

QUESTION NO: 72

UNIX allows file access based on __________.

A. GID or UID and ACLs.


B. GID or UID and UNIX permissions.
C. NT ACLs and SID.
D. NT ACLs and UNIX permissions.

Answer: B
Explanation:

* Unix-like operating systems identify users within the kernel by an unsigned integer value called a
user identifier, often abbreviated to UID or User ID. The range of UID values varies amongst
different systems; at the very least, a UID represents a 15-bit integer, ranging between 0 and

The UID value references users in the /etc/passwd file. Shadow password files and Network
Information Service also refer to numeric UIDs. The user identifier has become a necessary
component of Unix file systems and processes.

* In POSIX-compliant environments the command-line command id gives the user's user identifier
number as well as more information on the user account like the user name, primary user group
and group identifier (GID).

"Pass Any Exam. Any Time." - www.actualtests.com 46


Network Appliance NS0-155 Exam
* Files and directories are owned by a user. The owner determines the file's owner class. Distinct
permissions apply to the owner.
Files and directories are assigned a group, which define the file's group class. Distinct permissions
apply to members of the file's group members. The owner may be a member of the file's group.
Users who are not the owner, nor a member of the group, comprise a file's others class. Distinct
permissions apply to others.
The effective permissions are determined based on the user's class. For example, the user who is
the owner of the file will have the permissions given to the owner class regardless of the
permissions assigned to the group class or others class.

QUESTION NO: 73

Executing this command will have what effect?

Options wafl.default_security_style ntfs

A. It will set the security style of all files to be ntfs.


B. It will change the security style of all qtrees to be ntfs.
C. It will change the security style of all existing volumes to be ntfs.
D. It will set the security style of all newly created volumes to ntfs.

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

wafl.default_security_style
Specifies the default security style assigned to a new volume. All qtrees created on the volume get
this as their security style. Legal values for this option are `unix', `ntfs', or `mixed'. The default
value for this option is `unix', unless the node is an NTFS-only node, in which case the default is
`ntfs'.
Note: if cifs setup is run after setting wafl.default_security_style, the filer will become an NTFS
security style filer.

QUESTION NO: 74

Which two statements apply to an entry in the /etc/exports file regarding exporting

"Pass Any Exam. Any Time." - www.actualtests.com 47


Network Appliance NS0-155 Exam
directories/qtrees and volumes? (Choose two.)

A. Each volume must be exported separately.


B. Exports are accessible only to hosts with names.
C. User names used in an export must be resolvable.
D. Exports can access multiple paths on the same volume.

Answer: A,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

IP addresses and wildcards can be used when specifying host targets in exports.
User names are not valid exports options, save for the anon option which utilizes a local system
UID or user name (i.e. no user name mapping or resolution is performed.)
The highest level in the filesystem that can be specified for an export is the volume level. Implicitly
this means that each volume must be exported separately.
An export provides access to paths below the export, implying that multiple paths on the same
volume can be exported from an export.

QUESTION NO: 75

To automatically export volumes and directories on storage system reboot, include them in the
/etc/exports file.

A. True
B. False

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man5/na_exports.5.html

The /etc/exports file contains a list of export entries for all file system paths that Data ONTAP
exports automatically when NFS starts up.

QUESTION NO: 76

Which exportfs command will temporarily export the resource while ignoring the options specified

"Pass Any Exam. Any Time." - www.actualtests.com 48


Network Appliance NS0-155 Exam
in the /etc/exports file?

A. exportfs -a
B. exportfs -i
C. exportfs -u
D. exportfs -v

Answer: B
Explanation:

QUESTION NO: 77

Which two are Data ONTAP commands for displaying performance information? (Choose two.)

A. nfsstat
B. perfstat
C. sio_ntap_soll
D. sysstat

Answer: A,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_sysstat.1.html
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_nfsstat.1.html

nfsstat and sysstat are OnTap commands used for performance information.
sio_ntap_soll is not an OnTap command.

Perfstat is a GUI performance tool, not an OnTap command. Think of PerfMon for Windows to
remind you that PerfStat is a Windows tool. Note how many of the ONTAP performance
commands end in stat.

QUESTION NO: 78

Which statement best describes the output of this command? sysstat -s 5

A. Display the default output every five seconds and terminate after five counts.
B. Display extended output every five seconds and print a summary after five counts.
C. Display extended output every five seconds and print a summary upon termination.

"Pass Any Exam. Any Time." - www.actualtests.com 49


Network Appliance NS0-155 Exam
D. Display the default output every five seconds and print a summary upon termination.

Answer: D
Explanation:
http://backdrift.org/man/netapp/man1/na_sysstat.1.html
-s
Display a summary of the output columns upon termination, descriptive columns such as `CP ty'
will not have summaries printed. Note that, with the exception of `Cache hit', the `Avg' summary
for percentage values is an average of percentages, not a true mean of the underlying data. The
`Avg' is only intended as a gross indicator of performance. For more detailed information use tools
such as na_nfsstat, na_netstat, or statit.

QUESTION NO: 79

To collect per client NFS statistics on a storage system, the option nfs.per_client_stats.enable
must be set on.

A. True
B. False

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_options.1.html

nfs.per_client_stats.enable
Enables/disables the collection and display of perclient NFS statistics, as described in
na_nfsstat(1). Valid values for this option are on or off. The default value for this option is off.

QUESTION NO: 80

Which two are Data ONTAP commands for creating LUNs on a storage system? (Choose two.)

A. lun create
B. lun config
C. lun make
D. lun setup

"Pass Any Exam. Any Time." - www.actualtests.com 50


Network Appliance NS0-155 Exam
Answer: A,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

The following commands are available in the lun suite:

Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping
configuration.

QUESTION NO: 81

In a Fibre Channel configuration, the host's HBA is referred to as the ___________, and the
storage system's HBA is referred to as the __________ .

A. initiator, target
B. primary, secondary
C. secondary, primary
D. target, initiator

Answer: A
Explanation:
http://en.wikipedia.org/wiki/SCSI_initiator_and_target

QUESTION NO: 82

Before running lun setup on the storage system, you must first create the igroup to which the
initiator will be attached.

A. True
B. False

"Pass Any Exam. Any Time." - www.actualtests.com 51


Network Appliance NS0-155 Exam
Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

lun setup
Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping
configuration.

QUESTION NO: 83

These are three methods of creating a LUN:

* lun create

* lun map

* lun setup

A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html
The following commands are available in the lun suite:

Easy to use interactive mechanism for setting up initiator groups, LUNs, and mapping
configuration.

lun map [ -f ] lun_path initiator_group [ lun_id ]

Maps a LUN to all the initiators in the supplied group

"Pass Any Exam. Any Time." - www.actualtests.com 52


Network Appliance NS0-155 Exam

QUESTION NO: 84

Which set of commands should be used for troubleshooting Ethernet connectivity problems from
the storage system console?

A. ifstat, netdiag
B. perfstat, tracert
C. sysconfig - cr, sysstat
D. dish shm_stats, sysstat

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html
http://backdrift.org/man/netapp/man1/na_netdiag.1.html

ifstat - display device-level statistics for network interfaces


netdiag - perform network diagnostics

QUESTION NO: 85

Which command displays the statistics for Ethernet network interfaces?

A. ifconfig
B. ifstat
C. sysconfig
D. sysstat

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_ifstat.1.html
ifstat - display device-level statistics for network interfaces

QUESTION NO: 86

"Pass Any Exam. Any Time." - www.actualtests.com 53


Network Appliance NS0-155 Exam
Which command is used to set the configuration of an Ethernet network interface?

A. ifconfig
B. ifstat
C. netstat - i
D. sysconfig - v

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_ifconfig.1.html

ifconfig - Configures network interface parameters.

QUESTION NO: 87

What are three true statements about physical reallocation of data added in ONTAP 7.3? (Choose
three.)

A. Use reallocate -p pathname to run the physical reallocate.


B. Use aggr reallocate -p pathname to run the physical reallocate.
C. Reinitialize any SnapMirror relationship for the new physical geometry.
D. Volume Snapshots do not need to be deleted for the reallocate to run effectively.
E. Dont run it on files, volumes, and LUNs that are in an aggregate created by a version of ONTAP
earlier than 7.2.

Answer: A,D,E
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html

The -p option requests that reallocation of user data take place on the physical blocks in the
aggregate, but the logical block locations within a flexible volume are preserved.
Aggregate reallocation is not supported on aggregates created prior to Data ONTAP 7.2.
Using the -p option may reduce the extra storage requirements in a flexible volume when
reallocation is run on a volume with snapshots. It may also reduce the amount of data that needs
to be transmitted by SnapMirror on its next update after reallocation is performed on a SnapMirror
source volume.

"Pass Any Exam. Any Time." - www.actualtests.com 54


Network Appliance NS0-155 Exam
QUESTION NO: 88

Physical Reallocation of a SnapMirror source volume increases the amount of data to transfer for
the next SnapMirror update.

A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_reallocate.1.html
Using the -p option may reduce the extra storage requirements in a flexible volume when
reallocation is run on a volume with snapshots. It may also reduce the amount of data that needs
to be transmitted by SnapMirror on its next update after reallocation is performed on a SnapMirror
source volume.

QUESTION NO: 89

A snapshot is a frozen, read-only image of the entire Data ONTAP active file system that reflects
the state of the ____________ at the time the snapshot was created.

A. qtrees
B. volume
C. directory
D. storage system

Answer: B
Explanation:
http://backdrift.org/man/netapp/man1/na_snap.1.html

Snapshots can be made of volumes or aggregates; most commonly the former. The question
refers to a file system, or more specifically a volume.
You cannot snapshot directories or qtrees alone.

QUESTION NO: 90

Data ONTAP uses inodes in an active file system to reference ___________.

"Pass Any Exam. Any Time." - www.actualtests.com 55


Network Appliance NS0-155 Exam
A. qtrees
B. disk blocks
C. file segments
D. Snapshot copies

Answer: B
Explanation:
All data, whether file or block-based, resides in 4KB blocks on disk. A group of related blocks
make up a file. To accommodate different file sizes, the WAFL filesystem describes each file with
reference pointers called inodes.

https://communities.netapp.com/servlet/JiveServlet/previewBody/5027-102-1-
6953/PS%20Tech%20Note%20018%20-%20maxfiles.pdf

Topic 2, Volume B

QUESTION NO: 91

Which command disables client access to Snapshot copies on a volume called flexvol1?

A. cifs shares -change flexvol1 -nosnap


B. snap access flexvol1 off
C. vol options flexvol1 nosnapdir on
D. vol options flexvol1 snapdir off
E. vol options flexvol1 snapdir on

Answer: C
Explanation:

QUESTION NO: 92

When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the
snap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The
higher the value of n, the _________ the snapshot.

A. older
B. newer
C. more important

"Pass Any Exam. Any Time." - www.actualtests.com 56


Network Appliance NS0-155 Exam
D. least important

Answer: A
Explanation:
where n is an integer. The most recent weekly Snapshot copy is weekly.0, weekly.1 is the next
most recent weekly Snapshot copy, and so on.

https://library.netapp.com/ecmdocs/ECMP1113957/html/GUID-1D3B0C7D-D94E-43A3-9091-
5E76003E16EB.html

QUESTION NO: 93

A SnapVault secondary volume can contain up to ___ Snapshot copies for data protection.

A. 125
B. 251
C. 255
D. Depends on capacity and number of disk drives

Answer: B
Explanation:

QUESTION NO: 94

Which three are pre-requisites for using SnapRestore? (Choose three.)

A. The volume to be reverted must be offline.


B. The volume to be reverted must not be a SnapMirror destination.
C. You must enter the SnapRestore license code before you can use it.
D. Snapshot copies must exist on the storage system so that you can select a snapshot for the
reversion.

Answer: B,C,D
Explanation:
You must meet certain prerequisites before using SnapRestore:
- SnapRestore must be licensed on your storage system.
- There must be at least one Snapshot copy on the system that you can select to revert.
- The volume to be reverted must be online.

"Pass Any Exam. Any Time." - www.actualtests.com 57


Network Appliance NS0-155 Exam
- The volume to be reverted must not be in use for data replication.
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-A14081A3-9270-47EE-
A1C1-EC52D3ABDBD0.html

QUESTION NO: 95

Which command or procedure would you use to undo a volume SnapRestore operation?

A. snap restore -r vol


B. snap revert -s vol
C. snap restore undo vol
D. You cannot undo a SnapRestore operation at the volume level.

Answer: D
Explanation:
SnapRestore overwrites all data in the file or volume. After you use SnapRestore to revert to a
selected
Snapshot copy, you cannot undo the reversion.

http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-80FEDAF8-75FA-4E43-
B683-58C1F66B61E2.html

QUESTION NO: 96

What happens after you use SnapRestore to revert a volume to a specific snapshot?

A. You must bring the volume back online.


B. The storage system automatically performs a snapshot for that volume.
C. The Snapshot copies that are older than the snapshot you used are deleted.
D. The Snapshot copies that are more recent than the snapshot you used are deleted.

Answer: D
Explanation:
After you revert a volume to a selected Snapshot copy, you lose all the Snapshot copies that were
taken after the selected Snapshot copy.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-80FEDAF8-75FA-4E43-B683-

"Pass Any Exam. Any Time." - www.actualtests.com 58


Network Appliance NS0-155 Exam
58C1F66B61E2.html

QUESTION NO: 97

Which three statements are true when using SnapRestore? (Choose three.)

A. The volume must be online.


B. SnapRestore must be licensed before you can use it.
C. The snap restore enable on option must be enabled.
D. The volume to be reverted must not be a SnapMirror destination mirror.

Answer: A,B,D
Explanation:

QUESTION NO: 98

Which objects can be restored by a single SnapRestore command? (Choose three)

A. file
B. LUN
C. qtree
D. volume
E. directory

Answer: A,B,D
Explanation:
SnapRestore on a file and volume:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-1E99ACB2-5C69-4FFC-B115-
9D2951D109E9.html

SnapRestore on a LUN:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04-
55E736962FD1.html

Hint: snaprestore at the volume level or at the file level. LUNs are effectively files.

"Pass Any Exam. Any Time." - www.actualtests.com 59


Network Appliance NS0-155 Exam
QUESTION NO: 99

Which option of the snap restore command allows you to specify a different directory, as long as
the directory already exists?

A. snap restore -c
B. snap restore -d
C. snap restore -r
D. snap restore s

Answer: C
Explanation:
snap restore [ -A | -V ] [ -f ] [ -t vol | file ] [ -s snapshot_name ]
[ -r restore_as_path ] vol_name | restore_from_path
See more at: http://wafl.co.uk/snap/#sthash.nJiEwxGV.dpuf

QUESTION NO: 100

A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two
days ago. Which command continues the relationship?

A. SnapMirror initialize
B. SnapMirror quiesce
C. SnapMirror resume
D. SnapMirror resync
E. SnapMirror update

Answer: D
Explanation:
You can use the snapmirror resync command to reestablish the connection between the source
and the destination. This command is applied after the SnapMirror relationship between the
source and destination is broken.
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-5D846D24-0903-4982-A429-
71AE5C0F9033.html

QUESTION NO: 101

When you are setting up SnapMirror, which three are replication pre-requisites? (Choose three.)

"Pass Any Exam. Any Time." - www.actualtests.com 60


Network Appliance NS0-155 Exam
A. The source volume must be offline.
B. SnapMirror must be licensed for each storage system.
C. If you are replicating a volume, you must create a restricted volume to be used as the
SnapMirror.
D. The capacity of the SnapMirror destination must be greater than or equal to the capacity of the
source destination volume.

Answer: B,C,D
Explanation:
You need to fulfill a set of prerequisites before you can use SnapMirror:
- You must purchase and enable the SnapMirror license. If the SnapMirror source and destination
are on different systems, you must enable the SnapMirror license on each system.
- For SnapMirror volume replication, you must create a restricted volume to be used as the
destination volume.

SnapMirror does not automatically create a volume. For information about how to create volumes,
see the section on organizing data using volumes and qtrees in the Data ONTAP Storage
Management Guide for 7-Mode.

- For SnapMirror volume replication, the destination system must use a version of Data ONTAP
that is the same as or later than that of the SnapMirror source system.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-ED9C09EF-3F61-41FE-B8F1-
36356C5FEC5F.html

QUESTION NO: 102

Which command would you use to verify that the iSCSI service is running?

A. iscsi protocol
B. iscsi service
C. iscsi show
D. iscsi status

Answer: D
Explanation:
iscsi status - displays current status of the iSCSI service.
http://wafl.co.uk/iscsi/#sthash.GzOHA2Tj.dpuf

"Pass Any Exam. Any Time." - www.actualtests.com 61


Network Appliance NS0-155 Exam

QUESTION NO: 103

Identify the two commands that could be entered on the SnapMirror destination storage system.
(Choose two.)

A. snapmirror resync
B. snapmirror release
C. snapmirror initialize
D. options snapmirror.access on

Answer: A,C
Explanation:

QUESTION NO: 104

You have quiesced a SnapMirror relationship. Which command would re-establish the scheduled
updates?

A. snapmirror restart
B. snapmirror resume
C. snapmirror resync
D. snapmirror update

Answer: B
Explanation:
snapmirror resume destination
Resumes transfers to destination. The snapmirror resume command can be used either to abort a
snapmirror quiesce in progress or undo a previously completed snapmirror quiesce. The
command restores the state of the destination from quiescing or quiesced to whatever it was prior
to the quiesce operation.
http://wafl.co.uk/snapmirror/#sthash.5u3eilbK.dpuf

QUESTION NO: 105

In a volume SnapMirror relationship, the source and destination volumes must be the same size.

"Pass Any Exam. Any Time." - www.actualtests.com 62


Network Appliance NS0-155 Exam
A. True
B. False

Answer: B
Explanation:
In an active volume SnapMirror relationship, the size of the source and destination file systems is
identical.

However, the size of the destination volume can be larger than or equal to the size of the source
volume. The size of the file systems must be identical to allow the source to be restored from the
destination.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE5EE692-81CF-4569-A703-
00B4E283CE99.html

QUESTION NO: 106

Which two statements apply to the fs_size_fixed volume option? (Choose two.)

A. The default setting is on.


B. This option is automatically set to be on when a volume becomes a SnapMirrored volume.
C. This option turns to off after the snapmirror break command is issued for the relationship.
D. This option causes the SnapMirror destination volume to remain the same size and not grow or
shrink when a SnapMirrored volume relationship is broken.

Answer: B,D
Explanation:
This option causes the file system to remain the same size and not grow or shrink when a
SnapMirrored volume relationship is broken, or when a vol add is performed on it. This option is
automatically set to be on when a volume becomes a SnapMirrored volume. It will remain on after
the snapmirror break command is issued for the volume. This allows a volume to be SnapMirrored
back to the source without needing to add disks to the source volume. If the volume size is larger
than the file system size, turning off this option will force the file system to grow to the size of the
volume. The default setting is off.
http://wafl.co.uk/vol-2/#sthash.DbEHR4YS.dpuf

QUESTION NO: 107

"Pass Any Exam. Any Time." - www.actualtests.com 63


Network Appliance NS0-155 Exam
Which three statements apply to the SnapMirror visibility_interval argument? (Choose three.)

A. The default interval value is five minutes.


B. The smallest interval value supported is 30 seconds.
C. This variable controls the view of the data on the destination system.
D. By setting a value, you specify the amount of time before an automatic snapshot is created on
the source volume that is synchronously mirrored.

Answer: B,C,D
Explanation:
http://www.netapp.com/us/media/tr-3326.pdf
http://backdrift.org/man/netapp/man5/na_snapmirror.conf.5.html
http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-47724B21-7C7E-4AC9-
A497-9505B42C27AF.html

With SnapMirror Sync and SnapMirror Semi-Sync, changes to the source volume do not show up
immediately on the destination volume, even though the changes have been replicated. The
changes are first shown after the source system creates an automatic Snapshot copy of the
source volume.
Snapshot copies created on the source volume are immediately propagated to the destination
volume. The automatic Snapshot copies are created every three minutes by default.

To change the interval for automatic Snapshot copies, change the visibility_interval in the
snapmirror.conf file; however, performance can degrade if set to a smaller interval because
frequent
Snapshot copies cause additional processing such as cache consistency checking on the
destination system.

There is also a disadvantage in setting this to a large value. When the connection between the
systems has an outage and SnapMirror goes into asynchronous mode, SnapMirror uses the last
common Snapshot copy to transition into synchronous mode. This means that all data from the
last valid common Snapshot copy will need to be replicated from the source to the destination
storage system. If the visibility_interval is set to a large value, a large amount of data might have
to be transferred and it might take longer time for SnapMirror to transition into synchronous mode.
For these reasons, keep the default value of three minutes.

visibility_interval
The value for this argument is a number optionally followed by the suffixes: s (seconds), m
(minutes) or h (hours). If a suffix is not specified, value is interpreted as seconds. This argument
controls the amount of time before an automatic snapshot is created on the source volume that is
synchronously mirrored. The value is the number of seconds between automatically created
snapshots. The default value is 3 minutes. A small number here can negatively affect the

"Pass Any Exam. Any Time." - www.actualtests.com 64


Network Appliance NS0-155 Exam
performance of the mirror. This argument is ignored for asynchronous mirrors.

visibility_interval={xs | xm | xh}
Determines the amount of time before an automatic Snapshot copy is created on the source
volume that is being replicated using synchronous or semi-synchronous SnapMirror. When
replicating synchronously or semisynchronously, using SnapMirror, changes to the source volume
do not show immediately on the destination volume, even though the changes have been
replicated. The changes are shown only after the source system takes an automatic Snapshot
copy of the source volume. This event occurs every three minutes by default.

You can change the interval for automatic Snapshot copies, but performance can degrade if you
set smaller intervals because Snapshot copies are taken more often. The smallest interval you can
set is 30 seconds.
Note: The s, m, and h suffixes specify seconds, minutes, and hours, respectively.

QUESTION NO: 108

SnapMirror will automatically try to restart a transfer after ___________.

A. an initial transfer is interrupted


B. a manual update is interrupted
C. a transfer interrupted by reboot
D. a scheduled incremental update is interrupted

Answer: D
Explanation:
If a scheduled transfer fails (for example, due to network failure), SnapMirror automatically retries
the transfer the next minute.

http://hd.kvsconsulting.us/netappdoc/733docs/html/ontap/onlinebk/GUID-511EAA86-069A-42E8-
B62E-3168C7F0A83D.html

QUESTION NO: 109

Which keyword alone can be used to convert an asynchronous SnapMirror relationship to a


synchronous SnapMirror relationship?

"Pass Any Exam. Any Time." - www.actualtests.com 65


Network Appliance NS0-155 Exam
A. sync
B. cksum
C. src_con
D. outstanding

Answer: A
Explanation:
To convert an asynchronous SnapMirror relationship to a synchronous SnapMirror relationship, on
the administration host, edit the snapmirror.conf file on the destination system to change the
schedule to sync.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-A78BDBC9-610B-4555-A2DE-
CE6861D92614.html

QUESTION NO: 110

Which option will allow a storage system to SnapMirror from this source system?

A. snapmirror.access
B. snapmirror.destination
C. options snapmirror.allow host =
D. options snapmirror.access host =

Answer: D
Explanation:
The snapmirror.access option is the preferred method for controlling snapmirror access on a
snapmirror source filer.
http://www.wafl.co.uk/snapmirrorallow/#sthash.4Cb8IqqN.dpuf

QUESTION NO: 111

Which action will cause a currently in-sync SnapMirror relationship to fall out of sync?

A. Running snapmirror update on the source storage system


B. Running snapmirror release on the source storage system
C. Modifying the /etc/snapmirror.conf file for the relationship on the source storage system
D. Modifying the /etc/snapmirror.conf file for the relationship on the destination storage system

"Pass Any Exam. Any Time." - www.actualtests.com 66


Network Appliance NS0-155 Exam
Answer: D
Explanation:

QUESTION NO: 112

Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose
two.)

A. throttle
B. visibility interval
C. outstanding=3s in DOT 7.2
D. using option semi-sync in DOT 7.3 and higher

Answer: C,D
Explanation:

QUESTION NO: 113

A NearStore license increases the amount of concurrent replication streams.

A. True
B. False

Answer: A
Explanation:

QUESTION NO: 114

Which is true of the SnapVault backup of a NetApp storage system?

A. The file is the basic unit for SnapVault backup destination.


B. The qtree is the basic unit for SnapVault backup destination.
C. The volume is the basic unit of SnapVault backup destination.
D. The directory is the basic unit for SnapVault backup destination.

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140-

"Pass Any Exam. Any Time." - www.actualtests.com 67


Network Appliance NS0-155 Exam
EB147B941BDA.html

The data structures that are backed up and restored through SnapVault depend on the primary
system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore.
SnapVault backs up specified qtrees on the primary system to associated qtrees on the SnapVault
secondary system. If necessary, data is restored from the secondary qtrees back to their
associated primary qtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup.
SnapVault backs up specified directories from the native system to specified qtrees in the
SnapVault secondary system.

If necessary SnapVault can restore an entire directory or a specified file to the open systems
platform.
The destination system uses a slightly more disk space and directories than the source system.

QUESTION NO: 115

Which system is recommended as a secondary system for SnapVault?

A. IS1200
B. DataFort
C. NearStore VTL
D. FAS with NearStore license

Answer: D
Explanation:

QUESTION NO: 116

Which statement applies to the Open Systems SnapVault Free Space Estimator utility?

A. This utility runs automatically after each transfer.


B. This utility must be enabled on the secondary storage system.
C. This utility determines if there is sufficient disk space available on the primary to perform an
OSSV transfer.
D. This utility determines if there is sufficient disk space available on the secondary to perform an
OSSV transfer.

"Pass Any Exam. Any Time." - www.actualtests.com 68


Network Appliance NS0-155 Exam
Answer: C
Explanation:

QUESTION NO: 117

The snapvault snap sched -x command is used to ____________.

A. schedule full backups


B. cancel scheduled backups
C. schedule baseline transfer
D. schedule incremental backups

Answer: D
Explanation:

QUESTION NO: 118

The snapvault snap create volume snapname command can be executed on the ___________.

A. open systems
B. primary system only
C. secondary system only
D. secondary or primary systems

Answer: D
Explanation:

QUESTION NO: 119

The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies
from your primary system.

A. True
B. False

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 69


Network Appliance NS0-155 Exam

QUESTION NO: 120

Which three statements apply to NearStore Personality license? (Choose three.)

A. It increases the storage capacity.


B. It converts the destination storage system to a NearStore system.
C. It requires the nearstore_option license on the destination storage system.
D. It provides increased concurrent streams when the storage systems are used as destinations
for SnapMirror and SnapVault transfers.

Answer: B,C,D
Explanation:

QUESTION NO: 121

Which Data ONTAP option sets system-wide throttling for all transfers?

A. options transfer.wide.enable
B. options transfer.throttle.enable
C. options replication.wide.enable
D. options replication.throttle.enable

Answer: D
Explanation:

QUESTION NO: 122

The qtree specified for ____ must not exist on the secondary system before you run the ____
command.

A. pri_qtree_path, snapvault start


B. sec_qtree_path, snapvault start
C. pri_qtree_path, snapvault initialize
D. sec_qtree_path, snapvault initialize

Answer: B
Explanation:
snapvault initialize is not a valid command

"Pass Any Exam. Any Time." - www.actualtests.com 70


Network Appliance NS0-155 Exam
http://backdrift.org/man/netapp/man1/na_snapvault.1.html
snapvault start -r [options] -S [prim_system:]prim_qtree_path [sec_system:]
sec_qtree_path
pri_qtree_path is not a valid command

http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-DB31E1F4-60A8-4F34-
A1C4-8F79754E4DE2.html

QUESTION NO: 123

The snapvault restore command is run on the _________.

A. secondary system to push data to the primary system


B. primary system to pull data from the secondary system
C. secondary system to pull data from the primary system
D. secondary system to push data to the primary storage system

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html

The snapvault command has a number of subcommands. The set of subcommands differs on the
primary and secondary.

On the primary, the subcommands allow users to configure and manage a set of snapshots for
potential replication to the secondary, to abort replication transfers to the secondary, to check
status, to restore data from the secondary, and to release resources when a primary qtree will no
longer be replicated to a secondary.
On the secondary, the subcommands allow users to configure and manage the replication of
primary paths to secondary qtrees, to configure and manage the snapshot schedules which
control when all the qtrees in a secondary volume are updated from their respective primary paths
and how many snapshots to save, to abort transfers, to check status, and to release resources
preserved to restart backups from a restored qtree.

QUESTION NO: 124

To restore a qtree protected with SnapVault from the secondary storage system to the primary

"Pass Any Exam. Any Time." - www.actualtests.com 71


Network Appliance NS0-155 Exam
storage system, you can ______________. (Choose two.)

A. restore to a non existing qtree with DOT 7. 2


B. add the new qtree to the primary storage system with DOT 7.2
C. overwrite the existing qtree on the primary storage system with DOT 7.3
D. delete the existing qtree from the secondary storage system with DOT 7.3

Answer: A,C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DB31E1F4-60A8-4F34-A1C4-
8F79754E4DE2.html

You use the snapvault restore command to restore a backed-up qtree saved to the secondary
system. Starting with Data ONTAP 7.3, you can restore the data to an existing qtree on the
primary system using baseline restore or incremental restore.

QUESTION NO: 125

The snapvault update command is only available on the secondary system.

A. True
B. False

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapvault.1.html
snapvault update [ -k n ] [ -s snapname ] [ -w ] sec_ondary_qtree
Available on the secondary only. Immediately starts an update of the specified qtree on the
secondary.

QUESTION NO: 126

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault
communications.

A. True
B. False

"Pass Any Exam. Any Time." - www.actualtests.com 72


Network Appliance NS0-155 Exam
Answer: A
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4791-102-2-13466/tr-3466.pdf

Pg 17
OSSV hosts listen for communications from NDMP manager applications on port 10000 by
default.

QUESTION NO: 127

What security mechanism can an administrator use on an OSSV client to set permissions allowing
backups to a SnapVault secondary system?

A. Via /etc/hosts.equiv file


B. QSM access list modifiable via svconfigurator
C. Contents inside a file called access and located in OSSV /snapvault/etc
D. MD5 based authentication between SnapVault primary and secondary, with changeable
password

Answer: B
Explanation:

QUESTION NO: 128

Which tool is available on an OSSV client to assist in starting or stopping the OSSV service,
modifying NDMP settings, enabling debugging, and capturing trace files?

A. Operations Manager
B. Protection Manager
C. Svconfigurator GUI
D. svdebug.exe

Answer: C
Explanation:
http://synergy-ds.com/netapp/tr-3466.pdf

"Pass Any Exam. Any Time." - www.actualtests.com 73


Network Appliance NS0-155 Exam

QUESTION NO: 129

Which three statements are true about SnapLock volumes? (Choose three.)

A. SnapMirror supports SnapLock volumes.


B. There are two types of SnapLock volumes.
C. SnapLock volumes support per-file retention periods.
D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V-
Series controller with NetApp Storage.

Answer: A,B,C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-8ACE3CAB-D338-4AFC-A530-

"Pass Any Exam. Any Time." - www.actualtests.com 74


Network Appliance NS0-155 Exam
0D0FEC3B9F94.html

The snaplock command manages compliance related functionality on the system. A volume
created using the vol command (see na_vol(1)) is a snaplock volume when either the enterprise or
compliance option is chosen.

Enterprise and compliance SnapLock volumes allow different levels of security assurance.
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-D4533C47-441D-41AB-A8A2-
272A2BFC431C.html
SnapLock operates fundamentally at the file level.

QUESTION NO: 130

Snapshot copies for SnapLock volumes are deleted automatically according to the retention count
set in the Snapshot schedule.

A. True
B. False

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-83A15F85-92A1-4EA8-A9EC-
B9E0E2269E37.html

QUESTION NO: 131

A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the
destination volume has unexpired WORM files.

A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196889/html/GUID-4B97B80F-D208-4154-95BF-
D7FF9F5BEE11.html
A volume SnapMirror relationship is not allowed between two SnapLock Compliance volumes if

"Pass Any Exam. Any Time." - www.actualtests.com 75


Network Appliance NS0-155 Exam
the destination volume has unexpired files.

QUESTION NO: 132

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

A. 1
B. 2
C. 4
D. 6

Answer: B
Explanation:
You can cable a maximum of two disk shelves on each loop
https://library.netapp.com/ecm/ecm_download_file/ECMP1210206

QUESTION NO: 133

Which command displays the disk ownership for both CPU modules in a FAS2020 system?

A. disk own -s
B. disk show -v
C. vol status -r
D. disk display r

Answer: B
Explanation:
disk show [ -o <ownername> | -s <sysid> | -n | -v | -a]

Used to display information about the ownership of the disks. Available only on systems with
software-based disk ownership. -o lists all disks owned by the filer with the name <ownername> -s
lists all disks owned by the filer with the serial number <sysid> -n lists all unassigned disks. -v lists
all disks. -a lists all assigned disks.

"Pass Any Exam. Any Time." - www.actualtests.com 76


Network Appliance NS0-155 Exam
QUESTION NO: 134

To remove a cluster setup, you must perform these steps:

1. Type cf disable.

2. Unlicense cluster.

3. Remove partner entries for network interfaces from the /etc/rc file.

4. Halt and make sure the partner-sysid is blank.

5. Power down and remove the cluster interconnect card.

6. Perform steps 1-5 above on the partner node.

A. True
B. False

Answer: A
Explanation:
For a detailed breakdown of the procedure see the following KB
https://kb.netapp.com/support/index?page=content&id=1011576

QUESTION NO: 135

You are troubleshooting a clustered failover problem at a customer site. The customer explains
that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you
attempt to create a file on the NFS mount point for the inaccessible system, but you get the
following error:

NFS server filer2 not responding still trying.

When not in takeover mode, both storage systems operate normally and you do not get the error.
You perform a "cf giveback" and you can now create a file over NFS on both systems. What
should you do first to resolve this issue?

A. Replace the NIC adapter.


B. Submit a new bug report.
C. Use the cluster-config-checker.cgi to identify the problem and corrective action.
D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system
operation.

"Pass Any Exam. Any Time." - www.actualtests.com 77


Network Appliance NS0-155 Exam
Answer: C
Explanation:
This question implies that there is an issue with the clustering of the two controllers. Since this is
the case you will want to run the cluster configuration checker to identify and resolve any issues.

https://library.netapp.com/ecmdocs/ECMM1278349/html/upgrade/upgrading/concept/c_oc_upg_b
4_active2.html

QUESTION NO: 136

Each storage system in a cluster must have network access to the __________.

A. Internet
B. cluster partner
C. same administration
D. host same collection of subnets

Answer: D
Explanation:
All the network ports should be assigned correct port roles, and all the network ports should be in
the same subnet.
https://library.netapp.com/ecm/ecm_download_file/ECMP1196907

QUESTION NO: 137

One method of configuring an interface for takeover is to enter ifconfig interface partner address at
the command line. To make this configuration persistent across reboots, you must enter this
information in the _____ file for each system.

A. /etc/rc
B. /etc/hosts
C. /vol/vol0/home
D. /vol/vol0/mount

Answer: A
Explanation:
Startup commands for your storage system are stored in the /etc/rc file. The /etc/rc file contains

"Pass Any Exam. Any Time." - www.actualtests.com 78


Network Appliance NS0-155 Exam
commands that the storage system executes at boot time to configure the system.

Commands in the /etc/rc file configure the storage system to:


Communicate on your network
Use the NIS and DNS services
Save the core dump that might exist if the storage system panicked before it was booted

https://library.netapp.com/ecmdocs/ECMM1278265/html/sysadmin/accessing/concept/c_oc_accs_
systemstartup-etc-rc-file.html#c_oc_accs_system-startup-etc-rc-file

QUESTION NO: 138

What is the maximum distance between a standard clustered pair at 2Gbps?

A. 10 meters
B. 50 meters
C. 100 meters
D. 500 meters

Answer: D
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf

The maximum cable length supported for 2Gbps is 500m, the same as the max cable length
between a NetApp storage system and a FC switch.

Stretch MetroCluster (sometimes referred to as nonswitched) is simply an active-active


configuration that can extend up to 500m depending on speed and cable type. It also includes
synchronous mirroring (SyncMirror®) and the ability to do a site failover with a single command.
See Figure 2. Additional resiliency can be provided through the use of multipathing.

"Pass Any Exam. Any Time." - www.actualtests.com 79


Network Appliance NS0-155 Exam

QUESTION NO: 139

In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the
identity of the ________.

A. local interfaces only


B. failed partner interfaces only
C. local and failed partner interfaces
D. interfaces as defined in the /etc/rc file

Answer: D
Explanation:
In takeover mode, this network interface assumes the identity of the network interface on the
partner
http://www.wafl.co.uk/tag/ifconfig/#sthash.3rsjaDZD.dpuf

For the partner interface configuration to be persistent across reboots, you must include the
ifconfig command in the /etc/rc file

"Pass Any Exam. Any Time." - www.actualtests.com 80


Network Appliance NS0-155 Exam
http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/nag/GUID-525FCF4E-109D-4E6F-9256-
C6E56438CA9A.html

QUESTION NO: 140

When using SnapRestore to restore a single LUN, the LUN must be ___________.

A. exported and accessible


B. mapped to a Windows server
C. mounted on a host
D. taken offline or unmapped

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196995/html/GUID-577EDC41-FEA0-4987-8F04-
55E736962FD1.html

Always unmount the LUN before you run the snap restore command on a volume containing the
LUN or before you run a single file SnapRestore of the LUN. For a single file SnapRestore, you
must also take the LUN offline.

QUESTION NO: 141

For aggregates or traditional volume SyncMirror to work correctly, the configuration of each plex
should be identical with regard to ____________.

A. NVRAM
B. Mirrored Snapshot copies
C. RAID groups and disk sizes
D. NDMP and Snapshot copies

Answer: C
Explanation:
SyncMirror is essentially a RAID-1 mirror; hence the name. The best practice is to mirror storage
of equal performance; i.e. identical RAID groups and disk sizes (number of spindles, IOPS). If you
were to mirror two storage devices of different performance, the slower device would be the
limiting factor.

"Pass Any Exam. Any Time." - www.actualtests.com 81


Network Appliance NS0-155 Exam

QUESTION NO: 142

What happens when two aggregates are rejoined?

A. It is not possible to rejoin aggregates.


B. Data ONTAP will always retain data from the newest aggregate.
C. Both aggregates revert to the last common snapshot before the split.
D. You will have a large new aggregate containing all volumes from both aggregates.
E. One of the aggregates will be overwritten and you will lose any data changed on it after the
split.

Answer: E
Explanation:
When you rejoin split aggregates, Data ONTAP mirrors the data from one aggregate to the other
and destroys data that existed on that aggregate before the rejoin.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-B9CB3DA8-E1AF-4BAC-A85B-
64C009010F4A.html

QUESTION NO: 143

You cannot remove the SyncMirror license if one or more mirrored volumes exist.

A. True
B. False

Answer: A
Explanation:
You cannot disable the SyncMirror license if mirrored aggregates exist and are online.

http://hd.kvsconsulting.us/netappdoc/801docs/html/ontap/onlinebk/GUID-5058FDA7-68AE-4693-
B343-0E9FFEDFC86C.html

"Pass Any Exam. Any Time." - www.actualtests.com 82


Network Appliance NS0-155 Exam
QUESTION NO: 144

A mirrored volume has a failed disk, but there are no available spares in the pool from which the
degraded plex was built. Data ONTAP will __________.

A. halt all operations to volumes in that pool


B. choose spare disks to reconstruct from the opposite pool
C. warn you that there are no available spares from the proper pool
D. "halt" after 24 hours if spare disks are not added to the proper pool

Answer: C
Explanation:
Both ‘warn you that there are no available spares from the proper pool’ and ‘halt after 24 hours if
spare disk are not added to the proper pool’ are correct answers. However, since Data ONTAP
alerts you first, 'warn you that there are no available spares' is the best answer.
https://library.netapp.com/ecm/ecm_download_file/ECMP1196912

QUESTION NO: 145

The required hardware to add SyncMirror to an existing system would be ____________.

A. disk shelves and cluster interconnect


B. disk shelves and termination switches
C. disk shelves, Ethernet adapters, and cabling
D. disk shelves, Fibre Channel adapters, and cabling

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com 83


Network Appliance NS0-155 Exam

QUESTION NO: 146

Which two are true when creating a SyncMirror volume? (Choose two.)

A. The disks selected for Plex 0 and Plex 1 must come from the same disk shelf.
B. The disks selected for Plex 0 and Plex 1 must come from the same disk pools.
C. The number of disks added must be an even number and equally divided between the two
plexes.
D. The disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the
basis of the size of the disk. If there is no equivalent-sized disk, Data ONTAP takes a larger
capacity disk and right-sizes it.

Answer: C,D
Explanation:
The rules for the selection of disks or array LUNs, for using as mirrored aggregates, are as
follows:
Disks or array LUNs selected for each plex must be in different pools.
The same number of disks or array LUNs must be in both the plexes.
Disks are selected first on the basis of equivalent bytes per sector (bps) size, then on the basis of
the size of the disk.
If there is no equivalent-sized disk, Data ONTAP uses a larger-capacity disk, and limits the size to
make it identically sized.
Data ONTAP names the plexes of the mirrored aggregate.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-F5F241AF-50C0-4FF3-8C01-
96958581C4D9.html

QUESTION NO: 147

After issuing the aggr split aggr0/plex0 aggrNew command ____________.

A. there is a new plex called aggrNew


B. there are two new plexes, plex0 and plexNew
C. there is a new mirrored aggregate called aggrNew
D. there are two unmirrored aggregates, aggr0 and aggrNew
E. flexible volumes are evenly split between aggr0 and aggrNew

"Pass Any Exam. Any Time." - www.actualtests.com 84


Network Appliance NS0-155 Exam
Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
aggr split aggrname/plexname new_aggrname
Removes plexname from a mirrored aggregate and creates a new unmirrored aggregate named
new_aggrname that contains the plex. The original mirrored aggregate becomes unmirrored. The
plex to be split from the original aggregate must be functional (not partial), but it could be inactive,
resyncing, or out-ofdate.

Aggr split can therefore be used to gain access to a plex that is not up to date with respect to its
partner
plex, if its partner plex is currently failed.

If the aggregate in which plexname resides is embedded in a traditional volume, aggr split
behaves identically to vol split. The new aggregate is embedded in a new traditional volume of the
same name.
The aggregate in which plexname resides must contain exactly one flexible volume, aggr split will
by default rename the flexible volume image in the split-off plex to be the same as the new
aggregate.
If the original aggregate is restricted at the time of the split, the resulting aggregate will also be
restricted. If the restricted aggregate is hosting flexible volumes, they are not renamed at the time
of the split. Flexible volumes will be renamed later, when the name conflict is detected while
bringing an aggregate online. Flexible volumes in the aggregate that is brought online first keep
their names. That aggregate can be either the original aggregate, or the aggregate resulting from
the split. When the other aggregate is brought online later, flexible volumes in that aggregate will
be renamed.

If the plex of an aggregate embedded within a traditional volume is offline at the time of the split,
the resulting aggregate will be offline. When splitting a plex from an aggregate that hosts flexible
volumes, if that plex is offline, but the aggregate is online, the resulting aggregate will come online,
and its flexible volumes will be renamed. It is not allowed to split a plex from an offline aggregate.
A split mirror can be joined back together via the -v option to aggr mirror.

QUESTION NO: 148

Normally, before you split a SyncMirror volume, you ensure that both plexes are _______ and
_______.

A. offline, quiesced

"Pass Any Exam. Any Time." - www.actualtests.com 85


Network Appliance NS0-155 Exam
B. online, consistent
C. online, normal
D. restricted, offline

Answer: C
Explanation:
Ensure that both plexes of the mirrored aggregate you are splitting are online and operational.

https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-DE08C404-6E9C-47F6-A72E-
CDEE2043408C.html

QUESTION NO: 149

You can avoid data corruption when you issue the cf forcetakeover -d command if the remote
node is ________.

A. in a giveback mode
B. fenced off manually
C. powered on and accessible
D. powered off and inaccessible

Answer: D
Explanation:

QUESTION NO: 150

You have connected all cables and disk shelves in a fabric-attached MetroCluster. Which
command would verify that disks are connected and have dual paths?

A. disk show
B. sysconfig -p
C. vol status -r
D. storage show disk -p

Answer: D
Explanation:
The operator must ensure that the partner filer does not become operational at any time while a
filer is in a takeover mode initiated by the use of this command
http://backdrift.org/man/netapp/man1/na_cf.1.html

"Pass Any Exam. Any Time." - www.actualtests.com 86


Network Appliance NS0-155 Exam

QUESTION NO: 151

When using MetroCluster in a forced takeover mode, identify two methods for restricting access to
the disaster site node. (Choose two.)

A. Use manual fencing.


B. Use the cf giveback -f command.
C. Use the cf forcetakeover -d command.
D. Turn off power to the disaster site node.
E. Isolate the failed node from the surviving node.

Answer: A,D
Explanation:

QUESTION NO: 152

In a fabric-attached MetroCluster, a "site failure" is described as a __________.

A. failure of the Inter-Switch-Links (ISL)


B. failure of the interconnect cable
C. complete failure of the primary controller and disk shelves
D. malfunction of the Fibre Channel adapter on the cluster node

Answer: C
Explanation:
http://argoat.net/Blog/?p=1466

QUESTION NO: 153

Which two statements are true of the cf forcetakeover -d command? (Choose two.)

A. Mirrored volumes are implicitly split.


B. Partner mailboxes must be available.
C. The failed cluster node is powered off automatically.
D. The surviving cluster node takes over the functions of the failed partner.

"Pass Any Exam. Any Time." - www.actualtests.com 87


Network Appliance NS0-155 Exam
Answer: A,D
Explanation:
https://communities.netapp.com/servlet/JiveServlet/previewBody/4803-102-1-6405/tr-3548.pdf

It is important to remember that this is the case only when a complete site is lost. In the case of a
failed controller at one of the sites, a normal cluster failover occurs. Due to the operation of
SyncMirror, there is also added protection from multidrive or complete shelf failures. When a
storage controller fails in an active-active configuration, the partner detects the failure and
automatically (if enabled) performs a takeover of the dataserving responsibilities from the failed
controller. Part of this process relies on the surviving controller being able to read information from
the disks on the failed controller. If this quorum of disks is not available, then automatic takeover
won’t be performed. In a MetroCluster configuration, manually executing a single command will
allow a takeover to occur in spite of the lack of a quorum of disks. This "forced takeover" process
breaks the mirrored relationships in order to bring the failed controller’s volumes on line.

forcetakeover -d is very dangerous. Not only can it cause data corruption, if not used carefully, it
can also lead to a situation where both the node and its partner are operational (split brain). As
such, it should only be used as a means of last resort when the takeover and forcetakeover
commands are unsuccessful in achieving a takeover. The operator must ensure that the partner
node does not become operational at any time while a node is in a takeover mode initiated by the
use of this command. In conjunction with RAID mirroring, it can allow recovery from a disaster
when the two nodes in the HA pair are located at two distant sites.

QUESTION NO: 154

Protection Manager is an optional component of the Operations Manager that can be licensed and
accessed from the NetApp Management Console (NMC).

A. True
B. False

Answer: B
Explanation:
Operations Manager, Protection Manager and Provisioning Manager are all core products of the
Unified Manager Platform suite.

"Pass Any Exam. Any Time." - www.actualtests.com 88


Network Appliance NS0-155 Exam
QUESTION NO: 155

Operations Manager can monitor and manage only NetApp storage hosts that have the NetApp
Host Agent installed.

A. True
B. False

Answer: A
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278642
If no Host Agent is installed, how can the management tool query the host?

QUESTION NO: 156

Which are three valid data protection solutions? (Choose three.)

A. SnapVault toVolume SnapMirror


B. SnapVault toVolume SnapMirror to SnapVault
C. SnapVault toVolume SnapMirror toVolume SnapMirror
D. Volume SnapMirror to SnapVault

Answer: A,C,D
Explanation:
http://www.redbooks.ibm.com/redpapers/pdfs/redp4268.pdf

When you are using SnapVault in combination with Volume SnapMirror, it is important to
understand their relationship with Snapshot. You cannot utilize SnapVault to protect a Volume
SnapMirror destination, because SnapVault and SnapMirror both use the same Snapshot copies;
they cannot run simultaneously. Schedules must be managed to accommodate the interlock that
keeps SnapVault and SnapMirror from stepping on each other.

QUESTION NO: 157

Protection Manager has policies that allow for tape-based protection as well as disk-based
protection.

"Pass Any Exam. Any Time." - www.actualtests.com 89


Network Appliance NS0-155 Exam
A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecm/ecm_download_file/ECMM1278633

QUESTION NO: 158

When using a Protection Manager policy to manage Open Systems SnapVault backups on a UNIX
server, which three are valid objects to include in the data set? (Choose three.)

A. A file
B. A qtree
C. A directory
D. The entire client

Answer: A,C,D
Explanation:
Open Systems Snap Vault runs on servers, so the objects that can be selected for backup will be
host-based.
Qtrees are objects on the storage system.

"Pass Any Exam. Any Time." - www.actualtests.com 90


Network Appliance NS0-155 Exam

QUESTION NO: 159

XML-files in /etc/stats/preset are used together with the sysstat command to customize the output.

A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_stats.1.html
http://backdrift.org/man/netapp/man5/na_stats_preset.5.html

Data ONTAP provides some XML files that output a predetermined set of statistics that you can
use without having to construct a script or type in a complicated command on the command line.

The preset files are located in the /etc/stats/preset directory. To use a preset file, you add -p
filename to your stats show or stats stop command line. You can also add counters on the

"Pass Any Exam. Any Time." - www.actualtests.com 91


Network Appliance NS0-155 Exam
command line. If any options you specify on the command line conflict with the preset file, your
command line options take precedence.

You can also create your own preset files.

QUESTION NO: 160

When migrating from Data ONTAP 7G to Data ONTAP 8.0 7-mode, existing non-traditional
aggregates are designated as ________.

A. 16-bit
B. 32-bit
C. 64-bit
D. Foreign
E. Unknown

Answer: B
Explanation:
Aggregates are never converted as part of an upgrade. An upgrade will not touch your data!

QUESTION NO: 161

To create a 64-bit aggregate, which optional switch/flag/parameter/option to the aggr create


command must be included?

A. b 64
B. B 64
C. l 64
D. L 64
E. No optional switch/flag/parameter/option is needed because 64-bit aggregates are the default

Answer: B
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us

The command to create a 64-bit aggregate is the same aggr create command that is present in
Data ONTAP 7G for aggregate creation. The aggr create command has a new flag, -B, to specify

"Pass Any Exam. Any Time." - www.actualtests.com 92


Network Appliance NS0-155 Exam
the type of aggregate to create. It takes a value of either 32 or 64 and creates the respective type
of aggregate. Therefore the aggr create command with -B 64 creates a 64-bit aggregate. The aggr
create command without the -B flag by default creates a 32-bit aggregate.

Here are some commands for creating different aggregate types in Data ONTAP 8.0:
Creating a 64-bit aggregate:
aggr create aggr_64 -B 64 5
Creating a 32-bit aggregate using –B flag:
aggr create aggr_32 -B 32 5
Creating a 32-bit aggregate without using –B flag:
aggr create default_aggr_32 5
Note: the man pages do not include this option in later versions of DOT because 64-bit is now the
default.

QUESTION NO: 162

After upgrading to DOT 8.07-mode, you can convert existing 32-bit aggregates into 64-bit
aggregates.

A. True
B. False

Answer: B
Explanation:
http://www.ntapgeek.com/2011/12/how-in-place-expansion-works.html

To upgrade an aggregate in-place, the only available method is to add disks to expand the
aggregate to >16TB.
There is an obscure method using diag mode but that is not supported or mentioned in the exam
content. The answer is always add disks to grow past 16TB, or migrate.

QUESTION NO: 163

With 64-bit aggregates, the number of FlexVols that can be created on a storage controller is
____.

"Pass Any Exam. Any Time." - www.actualtests.com 93


Network Appliance NS0-155 Exam
A. 500
B. 1000
C. 6400
D. 64000

Answer: A
Explanation:
http://www.netapp.com/us/products/storage-systems/fas3200/fas3200-tech-specs.aspx

There is no easily remembered reason why its 500. Some people like to remember that there is
one other question on the exam that requires you to remember an arbitrary number and the
answer is also 500 (distance of a fiber interconnect at 2Gbps).

QUESTION NO: 164

The largest volume that can be created on a 64-bit aggregate is ___.

A. 10 TB
B. 16 TB
C. 64 TB
D. Equal to size of the aggregate

Answer: D
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us

Trick question.... Depends on the array and the maximum shelves and disks and aggregate size,
which can change over time. But a volume can never be greater than the aggregate - save for a
new feature in 8.2 called Infinite Volume that is not covered by this exam.

QUESTION NO: 165

Which command will show the FCP target(s) on a storage system?

A. fcp show adapter


B. fcp show all
C. fcp show -t

"Pass Any Exam. Any Time." - www.actualtests.com 94


Network Appliance NS0-155 Exam
D. fcp status

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_fcp.1.html

fcp show adapter [ -v ] [ adapter ]


If no adapter name is given, information about all adapters are shown.
This command displays information such as nodename/portname and link state about the adapter.
If the -v flag is given, this command displays additional information about the adapters.

QUESTION NO: 166

You are having problems accessing three recently-created LUNs. Given the output below, the
reason is because all of the LUNs are using the same LUN ID of 0.

lun show -m

LUN pathMapped to LUNID

---------------------------------------------------

/vol/vol1/lun0 solaris-igroup0 0

/vol/vol1/lun1 windows-igroup 0

/vol/vol1/qtree1/lun2 aix-igroup 0

/vol/vol1/qtree1/lun3 linux-igroup 0

A. True
B. False

Answer: B
Explanation:
The 'lun' in the path is irrelevant. The 0 at the end of each statement denotes the LUN ID.
LUN IDs must be unique per igroup.

QUESTION NO: 167

"Pass Any Exam. Any Time." - www.actualtests.com 95


Network Appliance NS0-155 Exam
Using the output below, a co-worker determined that these are type "Solaris" LUNs. What would
your determination be?

A. These are type "Solaris" LUNs.


B. Not enough information is given here. Run the lun map command to get the information
requested.
C. Not enough information is given here. Run the lun show -v command to get the information
requested.
D. Not enough information is given here. Run the lun status command to get the information
requested.

Answer: C
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging


| -g initiator_group | -n node | -l vol_name | lun_path ]
Displays the status (lun_path, size, online/offline state, shared state) of the given LUN or class of
LUNs. With the -v option supplied, additional information (comment string, serial number, LUN
mapping, HA Pair Shared Volume Information) is also displayed. With the -m option supplied,
information about lun_path to initiator_group mappings is displayed in a table format. With the -c
option supplied, information about LUN cloning status is displayed.

A specific LUN can be indicated by supplying its lun_path. When an initiator_group is specified,
status is reported for all LUNs that are mapped to the initiator group. When a node is specified,
status is reported for all LUNs that are mapped to initiator groups which contain that node. When
staging is specified, information about the temporary LUNs preserved in the staging area is
reported. When vol_name is specified, status is reported for all the LUNs in that volume.
Mapped LUNs are ones with at least one map definition. A LUN is online if it has not been
explicitly made offline using the lun offline command.

"Pass Any Exam. Any Time." - www.actualtests.com 96


Network Appliance NS0-155 Exam

QUESTION NO: 168

Which two commands would help you troubleshoot a LUN that cannot be accessed by a host?
(Choose two.)

A. fcp show wwpn


B. fcp wwpn
C. igroup show
D. lun show -err
E. lun show -v

Answer: C,E
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_igroup.1.html

igroup show [ -v ] [ initiator_group ] Displays the nodes in an initiator group and their aliases, set
with the fcp wwpnalias command. If no initiator_group is specified, the members of all initiator
groups are displayed. You can use the -v option to get a verbose listing.

https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_lun.1.html

lun show [ -v | -m | -c ] [ all | mapped | offline | online | unmapped | staging |


-g initiator_group | -n node | -l vol_name | lun_path ] Displays the status (lun_path, size,
online/offline state, shared state) of the given LUN or class of LUNs. With the -v option supplied,
additional information (comment string, serial number, LUN mapping, HA Pair Shared Volume
Information) is also displayed. With the -m option supplied, information about lun_path to
initiator_group mappings is displayed in a table format. With the -c option supplied, information
about LUN cloning status is displayed.

QUESTION NO: 169

NetApp recommends that Fibre Channel switches that have both disk and tape connected to them
should have separate zones created for each.

A. True
B. False

"Pass Any Exam. Any Time." - www.actualtests.com 97


Network Appliance NS0-155 Exam
Answer: A
Explanation:
http://www.brocade.com/downloads/documents/white_papers/Zoning_Best_Practices_WP-00.pdf

Separating the disk and tape devices into separate zones prevents disk RSCNs from impacting
tape devices, which tend to be more sensitive to RSCNs.
Best practice is to zone each initiator WWPN to each target WWPN individually.

QUESTION NO: 170

Which command shares out the directory /vol/vol2/home using the share name "netapp"?

A. cifs shares -add /vol/vol2 netapp


B. cifs shares -add /vol/vol2/home/netapp
C. cifs shares -add netapp vol/vol2
D. cifs shares -add netapp /vol/vol2/home

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_cifs_shares.1.html
cifs shares -add sharename path

QUESTION NO: 171

The quota resize command only affects existing /etc/quotas file target entries, not new quota
entries.

A. True
B. False

Answer: A
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html

quota resize volume


Adjusts currently active quotas in the specified volume to reflect changes in the /etc/quotas file.
For instance, if you edit an entry in /etc/quotas to increase a user's quota, quota resize will cause

"Pass Any Exam. Any Time." - www.actualtests.com 98


Network Appliance NS0-155 Exam
the change to take effect. The volume name may be omitted if the system has only one volume.
quota resize can be used only when quotas are already on. Because it does not rescan the file
system to compute usage, quota resize is faster than turning quotas off and then on again. quota
resize will apply all updated entries in /etc/quotas; however, it will generally ignore newly added
entries. A newly added entry will only take effect if the corresponding user or group has an active
quota as a result of updating a file subject to default quotas.

QUESTION NO: 172

In Data ONTAP, the root user is exempt from these two quotas: _______. (Choose two.)

A. file quotas
B. group quotas
C. root quotas
D. tree quotas
E. user quotas

Answer: B,E
Explanation:

QUESTION NO: 173

In Data ONTAP, both the Microsoft Windows Administrator and root are exempt from user and
group quotas, but not from tree quotas.

A. True
B. False

Answer: A
Explanation:
http://backdrift.org/man/netapp/man1/na_quota.1.html

User and group quotas do not apply to the root user or to the Windows Administrator account; tree
quotas, however, do apply even to root and the Windows Administrator account.

"Pass Any Exam. Any Time." - www.actualtests.com 99


Network Appliance NS0-155 Exam

QUESTION NO: 174

What command would create a LUN clone named lun0.clone from the LUN lun0 on the volume
vol2?

A. lun clone start create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent


B. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 snap_recent
C. lun clone create /vol/vol2/lun0 -b /vol/vol2/lun0.clone snap_recent
D. lun clone create /vol/vol2/lun0.clone -b /vol/vol2/lun0 -s snap_recent

Answer: B
Explanation:
http://backdrift.org/man/netapp/man1/na_lun.1.html
lun clone create clone_lunpath [ -o noreserve ] -b parent_lunpath parent_snap

QUESTION NO: 175

Which iSCSI security method encrypts data between the initiator and the target?

A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests

Answer: A
Explanation:
IPSec is an encryption transport that can be used to secure any IP traffic including iSCSI.

QUESTION NO: 176

You receive an error message from an iSCSI host stating that there is an authentication error.
Which command would troubleshoot the failure?

A. iscsi security show


B. iscsi security generate
C. iscsi show authentication

"Pass Any Exam. Any Time." - www.actualtests.com 100


Network Appliance NS0-155 Exam
D. iscsi security authentication

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_iscsi.1.html

iscsi security show


Display the default authentication and all the initiator specific authentication information.
Hint: Remember that the iscsi command is mostly structured "iscsi noun verb", unlike the fcp
command which is structure "fcp verb noun". Example: iscsi initiator show, fcp show initiator.

QUESTION NO: 177

Which three steps should be taken when troubleshooting a "stale nfs file handle" response to a
NFS mount request on a Solaris system? (Choose three)

A. check the client's fstab


B. check the /etc/sd.conf file on the client
C. check show mount -e to the storage system from the client
D. check for connectivity to the storage system from the client
E. check the output of the exportfs command on the storage system

Answer: A,D,E
Explanation:
The fstab file reflects the defined filesystem mount paths (including NFS mounts).
Always check network connectivity when a problem arises with a network service.
The exportfs command will display the active exports on the storage system.

QUESTION NO: 178

Which three configurations would increase data transfer rates in a volume SnapMirror environment
for traditional volumes?

A. The destination volumes are flexible volumes.


B. The destination and source contain disks of the same size.
C. The destination and the source contain RAID groups of the same size.
D. The destination and source contain the same number of raid groups.
E. The destination and source storage systems are no father than 30 meters apart.

"Pass Any Exam. Any Time." - www.actualtests.com 101


Network Appliance NS0-155 Exam
Answer: B,C,D
Explanation:
By aligning the performance of the source and destination, optimal data transfer (aka replication)
rates can be attained. Flexvols don't matter, and there is no measurable difference between the
performance of a network over a 30m or 3m cable.

QUESTION NO: 179

Identify the two commands that could be entered on a system with a SnapMirror source. (Choose
two)

A. snapmirror update
B. snapmirror status
C. snapmirror initialize
D. options snapmirror.access all

Answer: B,D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196979/html/man1/na_snapmirror.1.html

http://www.uow.edu.au/~blane/netapp/ontap/cmdref/man1/na_options.1.htm
update [ -S source ] [ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ] [ -w ] destination
For asynchronous mirrors, an update is immediately started from the source to the destination to
update the mirror with the contents of the source.

For synchronous mirrors, a snapshot is created on the source volume which becomes visible to
clients of the destination volume.

The update command must be issued on the destination node.status [ -l | -t | -q ] [ volume | qtree
... ]
Reports status of all the SnapMirror relationships with a source and/or destination on this node.
This command also reports whether SnapMirror is on or off. If any volume or qtree arguments are
given to the command, only the SnapMirror relationships with a matching source or destination will
be reported. If the argument is invalid, there won't be any status in the output.initialize [ -S source ]
[ -k kilobytes ] [ -s src_snap ] [ -c create_dest_snap ]
[ -w ] destination Starts an initial transfer over the network. An initial transfer is required before
update transfers can take place.

The initialize command must be issued on the destination node. If the destination is a volume, it

"Pass Any Exam. Any Time." - www.actualtests.com 102


Network Appliance NS0-155 Exam
must be restricted (see na_vol(1) for information on how to examine and restrict volumes). If the
destination is a qtree, it must not already exist (see na_qtree(1) for information on how to list
qtrees). If a qtree already exists, it must be renamed or removed (using an NFS or CIFS client), or
snapmirror initialize to that qtree will not work.snapmirror.access

This option determines which SnapMirror destination filers may initiate transfers, and over which
network interfaces. When set to "legacy", SnapMirror uses the older snapmirror.allow to determine
access. The option value is a string containing an expression which provides the access filter. An
example of the options command for snapmirror.access is options snapmirror.access
host=toaster,fridge. The default value is "legacy". See na_snapmirror(1) , na_snapmirror.allow(5)
and na_protocolaccess(8) for more details.

The snapmirror.allow file exists on the source filer used for SnapMirror.

QUESTION NO: 180

Which OSSV tool would you use to perform an OSSV unattended installation?

A. msipackage
B. svunattendossv
C. svconfigpackager
D. unattendpackager

Answer: C
Explanation:
The reference for this questionis an old version of a TR. It is likely that this question will be
removed from the NSO-155 exam.
The svconfigpackager is a binary in the OSSV client which can be used to create an unattended
installation package using an answer file.

QUESTION NO: 181

Which command creates a new SyncMirror aggregate, letting Data ONTAP select the disk drives?

A. aggr create aggrX -d 12


B. aggr create aggrX -m 12
C. aggr mirror aggrX -m 12

"Pass Any Exam. Any Time." - www.actualtests.com 103


Network Appliance NS0-155 Exam
D. aggr mirror aggrX -n 12

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html
The following commands are available in the aggr suite:

If you use the -d disk1 [ disk2 ... ] argument, the node creates the aggregate with the specified
spare disks disk1, disk2, and so on. You can specify a space-separated list of disk names. Two
separate lists must be specified if the new aggregate is mirrored. In the case that the new
aggregate is mirrored, the indicated disks must result in an equal number of disks on each new
plex.

The disks in a plex are not permitted to span spare pools. This behavior can be overridden with
the -f option.

The same option can also be used to force using disks that do not have matching rotational speed.
The –f option has effect only when used with the -d option specifying disks to use.

The -m option can be used to specify that the new aggregate be mirrored (have two plexes) upon
creation. If this option is given, then the indicated disks will be split across the two plexes. By
default, the new aggregate will not be mirrored.

aggr mirror aggrname


The -n option can be used to display the command that the system will execute without actually
making any changes. This is useful for displaying the automatically selected disks, for example.

QUESTION NO: 182

Which SyncMirror command mirrors an existing unmirrored aggregate where Data ONTAP selects
the disk drive?

"Pass Any Exam. Any Time." - www.actualtests.com 104


Network Appliance NS0-155 Exam
A. aggr mirror aggrY
B. aggr mirror aggrY -m
C. aggr mirror aggrT -d 12@144
D. aggr mirror aggrY -m 12@144

Answer: A
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html

aggr mirror aggrname


[ -f ]
[ -n ]
[ -v victim_aggrname ]
[ -d disk1 [ disk2 ... ] ]
Turns an unmirrored aggregate into a mirrored aggregate by adding a plex to it. The plex is either
newlyformed from disks chosen from a spare pool, or, if the -v option is specified, is taken from
another existing unmirrored aggregate. Aggregate aggrname must currently be unmirrored. Use
aggr create to make a new, mirrored aggregate from scratch.

Disks may be specified explicitly using -d in the same way as with the aggr create and aggr add
commands.

The number of disks indicated must match the number present on the existing aggregate. The
disks specified are not permitted to span disk pools. This behavior can be overridden with the -f
option. The -f option, in combination with -d, can also be used to force using disks that have a
rotational speed that does not match that of the majority of existing disks in the aggregate.

If disks are not specified explicitly, then disks are automatically selected to match those in the
aggregate's existing plex.

The -v option can be used to join victim_aggrname back into aggrname to form a mirrored
aggregate. The result is a mirrored aggregate named aggrname which is otherwise identical to
aggrname before the operation.

Victim_aggrname is effectively destroyed. Victim_aggrname must have been previously mirrored


with
aggrname, and then separated via the aggr split command. Victim_aggrname must be offline.
Combined with the -v option, the -f option can be used to join aggrname and victim_aggrname
without prompting the user.

The -n option can be used to display the command that the system will execute without actually
making any changes. This is useful for displaying the automatically selected disks, for example.

"Pass Any Exam. Any Time." - www.actualtests.com 105


Network Appliance NS0-155 Exam

QUESTION NO: 183

When troubleshooting a double disk failure with SyncMirror, you decide to remove and destroy a
plex from a mirrored aggregate. What steps remove a plex from a mirrored aggregate?

A. Take the aggregate offline and use the aggr destroy command
B. Take the aggregate offline and use the destroy -f command
C. Ensure the plex is online and use the aggr destroy plexname command.
D. Ensure the plex is offline and use the aggr destroy plexname command.

Answer: D
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196890/html/man1/na_aggr.1.html

aggr destroy { aggrname | plexname } [ -f ]


Destroys the aggregate named aggrname, or the plex named plexname. Note that if the specified
aggregate is tied to a traditional volume, then the traditional volume itself is destroyed as well.
If an aggregate is specified, all plexes in the aggregate are destroyed. The named aggregate must
also not contain any flexible volumes, regardless of their mount state (online, restricted, or offline).
If a plex is specified, the plex is destroyed, leaving an unmirrored aggregate or traditional volume
containing the remaining plex.

Before destroying the aggregate, traditional volume or plex, the user is prompted to confirm the
operation. The -f flag can be used to destroy an aggregate, traditional volume or plex without
prompting the user.

The disks originally in the destroyed object become spare disks. Only offline aggregates,
traditional volumes and plexes can be destroyed.

QUESTION NO: 184

When replicating data between 32-bit and 64-bit aggregates, which two are allowed? (Choose
two)

A. NDMPcopy
B. QSM

"Pass Any Exam. Any Time." - www.actualtests.com 106


Network Appliance NS0-155 Exam
C. vol copy
D. VSM

Answer: A,B
Explanation:
http://www.netapp.com/us/system/pdf-reader.aspx?m=tr-3786.pdf&cc=us

http://wafl.co.uk/ndmpcopy/
Because volume SnapMirror works at the block level, the source and destination must both be
FlexVol volumes in the same aggregate type. The source and destination of a volume SnapMirror
relationship must either both be FlexVol volumes in 32-bit aggregates or both be FlexVol volumes
in 64-bit aggregates.

Therefore you cannot create a volume SnapMirror relationship from a FlexVol volume in a 32-bit
aggregate to a FlexVol volume in a 64-bit aggregate or vice versa.

"Pass Any Exam. Any Time." - www.actualtests.com 107


Network Appliance NS0-155 Exam

QUESTION NO: 185

What types of migration are supported from 32-bit to 64-bit?

A. migration of qtrees via QSM


B. migration of volumes via ndmpcopy
C. migration of volumes via SnapMirror
D. Both A & B
E. Both B & C
F. Both A & C

Answer: D
Explanation:
Volume SnapMirror operates at the physical block level. It replicates the contents of an entire
volume, including all Snapshot copies, plus all volume attributes verbatim from a source (primary)
volume to a target (secondary) volume. Implicitly, the destination volume will be the same as the
source volume. Since C is incorrect, A & B must be correct.

Qtree snapmirror operates at the logical level, so it is unimportant that the destination system has
a different volume configuration.

ndmpcopy is similarly operating with data already read from the volume and so the destination
volume type is not a consideration.

QUESTION NO: 186

How do you migrate LUNs under volumes from 32-bit to 64-bit?

A. lrep
B. ndmpcopy
C. rsync
D. snapvault

Answer: B
Explanation:
http://wafl.co.uk/ndmpcopy/
Think of ndmpcopy as a sort of ftp for SAN. You can use it to copy files from one volume to

"Pass Any Exam. Any Time." - www.actualtests.com 108


Network Appliance NS0-155 Exam
another. Because the file is read from one volume and written to another, the constraints of
volume types are not an issue.

QUESTION NO: 187

Which three FAS deduplication features exist in ONTAP 8.0 7-Mode?

A. The deduplication fingerprint and change logs were moved to the root volume /etc/dedup
directory.
B. After breaking the deduplication volume destination mirror, the deduplication (a-sis) process
continues uninterrupted.
C. Qtree SnapMirror is supported on the destination for deduplication by enabling on the source,
destination, or both systems.
D. The fingerprint database and the change logs that the deduplication process uses are located
outside the volume, in the aggregate.
E. The deduplication schedule is not tied to a Qtree SnapMirror update, and can be configured just
like the deduplication schedule for any volume.

Answer: C,D,E
Explanation: Section: Data Protection
NetApp also recommends that if deduplication is used on the source volume, then it should also
be used on the destination volume. However, you are not restricted using deduplication on the
source volume only.
The deduplication schedule is not tied to the qtree SnapMirror update. In other words, the
deduplication process does not automatically start at the completion of the qtree SnapMirror
transfer.
The fingerprint database and the change log files that are used in the deduplication process are
located outside of the volume in the aggregate and are therefore not captured in Snapshot copies
http://www.netapp.com/us/media/tr-3505.pdf

QUESTION NO: 188

To manage SnapVault relationships with an NDMP management application, you must specify a:

A. directory path
B. volume and qtree
C. SnapVault license

"Pass Any Exam. Any Time." - www.actualtests.com 109


Network Appliance NS0-155 Exam
D. username and password

Answer: D
Explanation:
Add a new backup user to the Backup Operators useradmin group list. Enter the following
command:
useradmin user add backupuser -g "Backup Operators"
Generate an NDMP password for the new user. Enter the following command:
ndmpd password backupuser
The NDMP password is used to authenticate the NetBackup media server to the storage system.
This password is required for setup on the NetBackup management station.
https://library.netapp.com/ecmdocs/ECMM1278284/html/onlinebk/5snapv37.htm

QUESTION NO: 189

For OSSV sources, the qtree is the basic unit of SnapVault backups.

A. True
B. False

Answer: B
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196991/html/GUID-06C70D3B-9A06-4D20-B140-
EB147B941BDA.html

The data structures that are backed up and restored through SnapVault depend on the primary
system.
On systems running Data ONTAP, the qtree is the basic unit of SnapVault backup and restore.
SnapVault backs up specified qtrees on the primary system to associated qtrees on the SnapVault
secondary system. If necessary, data is restored from the secondary qtrees back to their
associated primary qtrees.
On open systems storage platforms, the directory is the basic unit of SnapVault backup.
SnapVault backs up specified directories from the native system to specified qtrees in the
SnapVault secondary system.
If necessary SnapVault can restore an entire directory or a specified file to the open systems
platform.
The destination system uses a slightly more disk space and directories than the source system.

"Pass Any Exam. Any Time." - www.actualtests.com 110

You might also like