Network Appliance NS0-162 Practice Test - Questions Answers, Page 5
List of questions
Related questions
Which security method would be used to authenticate targets and Initiators In an ISCSI environment?
You want to configure Active Directory domain controller access for NetApp ONTAP cluster administration. In this scenario, which two actions would accomplish this task? (Choose two.)
When you set up an ONTAP cluster, which two SVM types are automatically created? (Choose two.)
You need to Increase the number of files that can be created In a volume. Which two methods enable you to achieve this goal? (Choose two.)
A volume Is set to use Adaptive QoS with the default policy.
In this scenario, which change would affect the QoS throughput ceiling?
What establishes a quorum in a 4-node cluster?
Exhibit.
You have received an alert from Active IQ Unified Manager that interface eOc has gone offline.
Network engineering asks for the corresponding MAC address for the port that has a problem.
Referring to the exhibit, which MAC address would you supply to the engineering team?
You have an ESXI cluster with VMware VMFS LUNs on an AFF A400 system. After troubleshooting performance Issues, you determine that timeout best practices are not set on the hosts.
In this scenario, which NetApp tool would apply the best practice settings?
Exhibit.
You have an ONTAP 9.8 cluster. After network maintenance, the LIF that is shown in the exhibit is not always on a correct port and is unreachable by users until the LIFs are moved to port eOc or eOd on either storage node.
In this scenario, which action should you take to ensure that the LIF only fails over to the correct ports?
Which configuration Is supported using NetApp's All SAN Array (ASA)?
Question