ExamGecko
Home Home / Network Appliance / NS0-163

Network Appliance NS0-163 Practice Test - Questions Answers, Page 7

Question list
Search
Search

You have connected all cables and disk shelves in a Fabric Attached MetroCluster. Which one of the following commands would you use to verify that disks are connected and have dual paths?

A.
storage show disk-p
A.
storage show disk-p
Answers
B.
sysconfig -v
B.
sysconfig -v
Answers
C.
vol status -r
C.
vol status -r
Answers
D.
disk show
D.
disk show
Answers
Suggested answer: A

Which statement is true of the cf forcetakover -d command?

A.
The surviving cluster node takes over the functions of the failed partner.
A.
The surviving cluster node takes over the functions of the failed partner.
Answers
B.
Mirrored volumes are implicitly split.
B.
Mirrored volumes are implicitly split.
Answers
C.
Both of the above
C.
Both of the above
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: C

In cluster takeover mode, the shared interface assumes the identity of the

A.
local interface only
A.
local interface only
Answers
B.
failed partner interface only
B.
failed partner interface only
Answers
C.
local and failed partner interfaces
C.
local and failed partner interfaces
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: C

Each storage appliance in a cluster must have network access to the

A.
Internet.
A.
Internet.
Answers
B.
same collection of subnets.
B.
same collection of subnets.
Answers
C.
cluster partner.
C.
cluster partner.
Answers
D.
same administration host.
D.
same administration host.
Answers
Suggested answer: B

Which three are required licenses for Fabric Attached MetroCluster? (Choose 3)

A.
Syncmirror_remote
A.
Syncmirror_remote
Answers
B.
Syncmirrorocal
B.
Syncmirrorocal
Answers
C.
Cluster
C.
Cluster
Answers
D.
Cluster remote
D.
Cluster remote
Answers
Suggested answer: B, C, D

Which tool is available on a non-NetApp primary system to assist in starting or stopping SnapVault, modifying NDMP settings, enabling debugging, and capturing trace files?

A.
Data Fabric Manager
A.
Data Fabric Manager
Answers
B.
Svconfigurator GUI
B.
Svconfigurator GUI
Answers
C.
svdebug.exe
C.
svdebug.exe
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: B

Which statement describes the results of the snapmirror resync command?

A.
Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.
A.
Resynchronization finds the newest common snapshot shared by the two volumes or qtrees, and removes all newer information on the storage appliance on which the command is run.
Answers
B.
Resynchronization made. cause the loss of all data written to the destination after the original base snapshot was
B.
Resynchronization made. cause the loss of all data written to the destination after the original base snapshot was
Answers
C.
Resynchronization. update the snapshot on the source filer.
C.
Resynchronization. update the snapshot on the source filer.
Answers
D.
Resynchronization. update the snapshot on the destination filer.
D.
Resynchronization. update the snapshot on the destination filer.
Answers
Suggested answer: A

In cluster takeover mode, the shared interface assumes the identity of the

A.
local interface only
A.
local interface only
Answers
B.
failed partner interface only
B.
failed partner interface only
Answers
C.
local and failed partner interfaces
C.
local and failed partner interfaces
Answers
D.
None of the above
D.
None of the above
Answers
Suggested answer: C

The NearStore system is not the recommended secondary storage appliance for Open System SnapVault.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When using MetroCluster, identify two methods for restricting access to the disaster site node. (Choose 2)

A.
Use manual fencing
A.
Use manual fencing
Answers
B.
Turn off power to the disaster site node.
B.
Turn off power to the disaster site node.
Answers
C.
Use the cf forcetakeover-d command.
C.
Use the cf forcetakeover-d command.
Answers
D.
Use the cfgiveback-f command.
D.
Use the cfgiveback-f command.
Answers
Suggested answer: A, B
Total 243 questions
Go to page: of 25