ExamGecko
Home Home / Network Appliance / NS0-520

Network Appliance NS0-520 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Changes to your organization requires access to an SVM be given to a group of individuals. Your company uses Active Directory as a method of access control. You decide to use the security login create - vserver engCluster -user-or-group-name CORP\Admins -application ssh -authmethod domain -role vsadmin command.

In this scenario, which access rights will this command grant?

A.
read only rights to the SVM engCluster for Active Directory group CORP
A.
read only rights to the SVM engCluster for Active Directory group CORP
Answers
B.
vsadmin rights to the SVM engCluster for Active Directory group CORP\Admins
B.
vsadmin rights to the SVM engCluster for Active Directory group CORP\Admins
Answers
C.
vsadmin rights to the SVM CORP for Active Directory group CORP\Admins
C.
vsadmin rights to the SVM CORP for Active Directory group CORP\Admins
Answers
D.
vsadmin rights to the SVM engCluster for Active Directory group CORP
D.
vsadmin rights to the SVM engCluster for Active Directory group CORP
Answers
Suggested answer: B

A customer has multiple host applications that require FC block storage. You need to gather and validate the customer's requirements for a supported NetApp solution.

Which two tools would be used to accomplish this task? (Choose two.)

A.
Interoperability Matrix Tool (IMT)
A.
Interoperability Matrix Tool (IMT)
Answers
B.
OneCollect
B.
OneCollect
Answers
C.
Config Advisor
C.
Config Advisor
Answers
D.
Hardware Universe (HWU)Answer: AD
D.
Hardware Universe (HWU)Answer: AD
Answers
Suggested answer: A, D

Click the Exhibit button.

You are implementing an ONTAP 9.5 AFF A300 SAN cluster with the NVMe, FC, and FCoE protocols.

Referring to the exhibit, which three protocols and physical port pairs are supported? (Choose three.)

A.
NVMe on ports 2a/2b
A.
NVMe on ports 2a/2b
Answers
B.
FC on ports 2a/2b
B.
FC on ports 2a/2b
Answers
C.
NVMe on ports 0e/0f
C.
NVMe on ports 0e/0f
Answers
D.
FCoE on ports 0e/0f
D.
FCoE on ports 0e/0f
Answers
E.
FC on ports 0e/0f
E.
FC on ports 0e/0f
Answers
Suggested answer: B, C, D

What is a SAN best practice when initially configuring a Linux FC boot LUN?

A.
Install the Host Utilities in the guest Linux OS.
A.
Install the Host Utilities in the guest Linux OS.
Answers
B.
Map the WWPN of the target.
B.
Map the WWPN of the target.
Answers
C.
Disable the HBA port with the host's BIOS.
C.
Disable the HBA port with the host's BIOS.
Answers
D.
Configure multipath to the LUN.Answer: B
D.
Configure multipath to the LUN.Answer: B
Answers
Suggested answer: B

A customer has an FC host that needs to be attached to the NetApp AFF A700 dual controller storage cluster.

To accomplish this task, which three steps should the customer perform? (Choose three.)

A.
Configure the FCP service for the node that has the LUN that is being accessed.
A.
Configure the FCP service for the node that has the LUN that is being accessed.
Answers
B.
Confirm that the FC HBA driver and firmware is supported according to the Interoperability Matrix Tool (IMT)
B.
Confirm that the FC HBA driver and firmware is supported according to the Interoperability Matrix Tool (IMT)
Answers
C.
Configure portsets to support the availability of multiple paths.
C.
Configure portsets to support the availability of multiple paths.
Answers
D.
Configure an igroup with the WWPN from the host initiator for LUN access.
D.
Configure an igroup with the WWPN from the host initiator for LUN access.
Answers
E.
Confirm that the switch firmware is supported according to the Interoperability Matrix Tool (IMT).
E.
Confirm that the switch firmware is supported according to the Interoperability Matrix Tool (IMT).
Answers
Suggested answer: C, D, E

Click the Exhibit button.

You notice that your volume named vol1 has a temporary volume that is doubling the space that is used by the volume.

In this scenario, which operation caused the volume to take up twice the space?

A.
FlexClone
A.
FlexClone
Answers
B.
SnapRestore
B.
SnapRestore
Answers
C.
FlexGroup
C.
FlexGroup
Answers
D.
SnapMirrorAnswer: D
D.
SnapMirrorAnswer: D
Answers
Suggested answer: D

You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).

In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)

A.
CHAP creates a hash value for the username and shared secret.
A.
CHAP creates a hash value for the username and shared secret.
Answers
B.
iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
B.
iSCSI ACLs are applied to the initiator configuration to provide an IP address of the targets.
Answers
C.
CHAP encrypts all iSCSI session I/O.
C.
CHAP encrypts all iSCSI session I/O.
Answers
D.
iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
D.
iSCSI ACLs are applied to the target configuration to provide an IP address of the initiators.
Answers
Suggested answer: A, D

How do you configure the iSCSI-SendTargets datastore when the datastore is provisioned from NetApp storage?

A.
You must configure jumbo frames when SendTargets-based iSCSI is used.
A.
You must configure jumbo frames when SendTargets-based iSCSI is used.
Answers
B.
Use static discovery to add the target IQN.
B.
Use static discovery to add the target IQN.
Answers
C.
Use dynamic discovery to add the target IQN.
C.
Use dynamic discovery to add the target IQN.
Answers
D.
You must configure a single protocol on the SVM when SendTargets-based iSCSI is used.Answer: C
D.
You must configure a single protocol on the SVM when SendTargets-based iSCSI is used.Answer: C
Answers
Suggested answer: C

You are planning to set up a new SAN with an AFF A300 2-node switchless cluster. Your SAN fabric will consist of Cisco MDS9148s switches.

According to NetApp best practices, which two actions would be required to accomplish this task?

(Choose two.)

A.
Set the switchport speed setting to 16 Gb.
A.
Set the switchport speed setting to 16 Gb.
Answers
B.
Use single initiator, multiple target zoning.
B.
Use single initiator, multiple target zoning.
Answers
C.
Use multiple initiator, single target zoning.
C.
Use multiple initiator, single target zoning.
Answers
D.
Set the switchport speed to auto negotiate.Answer: BD
D.
Set the switchport speed to auto negotiate.Answer: BD
Answers
Suggested answer: B, D

The ESX host reports inconsistent performance for iSCSI-based connectivity.

In this scenario, what would cause this problem?

A.
The host and storage are connected to different switches.
A.
The host and storage are connected to different switches.
Answers
B.
The flow control was disabled on the storage.
B.
The flow control was disabled on the storage.
Answers
C.
The hardware initiators were used instead of software.
C.
The hardware initiators were used instead of software.
Answers
D.
The flow control is enabled on the storage.
D.
The flow control is enabled on the storage.
Answers
Suggested answer: B
Total 234 questions
Go to page: of 24