Page |6
C. -type readonly
D. -perm r
Answer: B
24. Which ONTAP command displays the current mount path of a volume?
A. volume show -fields junc on-path
B. volume mount show
C. namespace show
D. file-system path show
Answer: A
25. Can a single export policy be assigned to mul ple volumes?
A. No, policies are 1:1.
B. Yes, policies are reusable objects.
C. Only if the volumes are in the same aggregate.
D. Only if the volumes are read-only.
Answer: B
26. What is the primary func on of the vserver name-mapping command?
A. To map volume names to shares.
B. To map UNIX users to Windows users (and vice versa) for mixed security environments.
C. To map DNS names to IPs.
D. To map LUN IDs.
Answer: B
27. Which LIF parameter ensures that the LIF returns to its home port a er a failover event is
resolved?
A. -auto-revert true
B. -failback enabled
C. -s cky true
D. -home-port-only
Answer: A
28. What is the requirement for the root volume size of an SVM?
A. Minimum 1 TB.
B. Minimum 1 GB (recommended).
C. It must be a FlexGroup.
D. It must be 0 KB.
Answer: B
29. Which command allows you to view the effec ve permissions on a file?
A. vserver security file-directory show
B. file permissions show
C. volume file show
D. system security check
Answer: A
30. To enable SMB 3.0 encryp on for a specific share, which property must be set?
A. encrypt-data
Page |7
B. smb3-secure
C. data-protec on
D. secure-share
Answer: A
31. Which component manages the resolu on of hostnames to IP addresses within the SVM?
A. The external DNS server referenced in vserver services name-service dns.
B. The cluster management LIF.
C. The Service Processor.
D. The local /etc/hosts file only.
Answer: A
32. What is a "Broadcast Domain" in ONTAP networking?
A. A logical grouping of ports that share the same Layer 2 network segment.
B. A group of LIFs.
C. A security zone.
D. A rou ng table.
Answer: A
33. Which command adds a rule to the export policy "default" to allow access from any client?
A. vserver export-policy rule create -policyname default -clientmatch 0.0.0.0/0
B. export add default all
C. vserver nfs export add
D. policy rule add -all
Answer: A
34. If a qtree has a security style of "NTFS", can a UNIX user access it via NFS?
A. No, never.
B. Yes, provided a valid name mapping exists to a Windows user with permissions.
C. Yes, ONTAP ignores the NTFS ACLs.
D. Yes, but only as root.
Answer: B
35. Which LIF type is used for inter-cluster replica on (SnapMirror)?
A. Data
B. Management
C. Intercluster
D. Cluster
Answer: C
36. What is the effect of vserver cifs op ons modify -smb1-enabled false?
A. It disables the CIFS service.
B. It disables support for the legacy SMB 1.0 protocol.
C. It forces SMB 3.0.
D. It disconnects all users.
Answer: B
37. Which command creates a new SVM?
A. vserver create
Page |8
B. svm create
C. system services vserver add
D. storage virtual-machine make
Answer: A
38. To support LDAP signing and sealing, what must be configured?
A. Only the LDAP server IP.
B. A TLS/SSL cer ficate or GSSAPI (Kerberos).
C. A sta c route.
D. An export policy.
Answer: B
39. Which object defines the maximum transfer unit (MTU) for a port?
A. The Broadcast Domain.
B. The LIF.
C. The IPspace.
D. The Failover Group.
Answer: A
40. When configuring a data LIF, which address family is selected for standard IP networking?
A. ipv4 or ipv6
B. mac
C. fc
D. iscsi
Answer: A
41. What is the purpose of the -home-node parameter when crea ng a LIF?
A. To designate the node that the LIF will revert to.
B. To lock the LIF to a node permanently.
C. To define the management node.
D. To assign the root aggregate.
Answer: A
42. Which command shows the status of the CIFS server?
A. vserver cifs show
B. vserver cifs status
C. service cifs check
D. network service show
Answer: A
43. To allow an NFS client to mount a subdirectory directly, what se ng is required?
A. No se ng; standard NFS behavior in ONTAP allows this if the path is exported.
B. -allow-subdir-mount true
C. -mount-point all
D. -deep-mount enabled
Answer: A
44. Which command sets the administra ve status of a LIF to "up"?
A. network interface modify -status-admin up
Page |9
B. lif up
C. network port modify -up true
D. interface start
Answer: A
45. What is a "subnet" object in ONTAP used for?
A. To manage pools of IP addresses and gateway se ngs for LIF crea on.
B. To define firewall rules.
C. To isolate tenants.
D. To route traffic.
Answer: A
46. Which command creates a new volume?
A. volume create
B. storage volume add
C. vserver volume make
D. disk volume create
Answer: A
47. If the root volume of an SVM fills up, what is the impact?
A. Clients cannot mount new volumes; exis ng connec ons may hang.
B. No impact.
C. The SVM shuts down.
D. Data volumes are deleted.
Answer: A
48. Which se ng in an export policy allows anonymous access?
A. -anon 65534 (or other ID)
B. -anon 0
C. -public yes
D. -guest enabled
Answer: A
49. To configure a LIF to failover only to ports on the same node, which policy is used?
A. local-only
B. broadcast-domain-wide
C. sfo-partner-only
D. system-defined
Answer: A
50. Which command displays the configured name mapping rules?
A. vserver name-mapping show
B. vserver map show
C. security user map show
D. system name-service map show
Answer: A
P a g e | 10
Domain 2: NetApp NAS Opera ons
2.1 Opera onal Excellence: Quotas, Permissions, and Troubleshoo ng
Opera onal management in ONTAP focuses on resource control and access management. This
domain covers the mechanisms for limi ng storage consump on (Quotas) and the intricate details of
troubleshoo ng access issues (Permissions).
2.1.1 Quota Management
Quotas in ONTAP allow administrators to track and limit resource usage based on disk space and the
number of files (inodes).
Types of Quotas:
o Tree Quotas: Apply to a specific qtree. They func on as "hard" par ons within a
flexible volume. If a tree quota is exceeded, writes to that specific qtree fail, even if
the parent volume has free space.
o User/Group Quotas: Track usage by specific user IDs or group IDs.
o Default Quotas: A rule targe ng the asterisk (*) creates a "derived" quota for every
user or group that writes to the target. This scales automa cally without requiring a
new rule for every user.
Ini aliza on vs. Resizing:
o volume quota on: Ini alizes the quota subsystem. This involves a full scan of the file
system (inode walk) to calculate current usage. It can be me-consuming for large
volumes.
o volume quota resize: A rapid, non-disrup ve opera on used when only the limit
(threshold) of an exis ng quota rule has changed. It does not require a re-scan.
However, adding a new type of quota rule o en requires a full re-ini aliza on.19
Table 1: Quota Command Reference
Ac on Command Impact
Enable Quotas volume quota on Full volume scan (High IO)
Disable Quotas volume quota off Stops tracking
Update Limits volume quota resize Fast update (Low IO)
View Usage volume quota report Displays used vs. limit