Network Appliance NS0-520 Practice Test - Questions Answers, Page 7
List of questions
Related questions
Changes to your organization requires access to an SVM be given to a group of individuals. Your company uses Active Directory as a method of access control. You decide to use the security login create - vserver engCluster -user-or-group-name CORP\Admins -application ssh -authmethod domain -role vsadmin command.
In this scenario, which access rights will this command grant?
A customer has multiple host applications that require FC block storage. You need to gather and validate the customer's requirements for a supported NetApp solution.
Which two tools would be used to accomplish this task? (Choose two.)
Click the Exhibit button.
You are implementing an ONTAP 9.5 AFF A300 SAN cluster with the NVMe, FC, and FCoE protocols.
Referring to the exhibit, which three protocols and physical port pairs are supported? (Choose three.)
What is a SAN best practice when initially configuring a Linux FC boot LUN?
A customer has an FC host that needs to be attached to the NetApp AFF A700 dual controller storage cluster.
To accomplish this task, which three steps should the customer perform? (Choose three.)
Click the Exhibit button.
You notice that your volume named vol1 has a temporary volume that is doubling the space that is used by the volume.
In this scenario, which operation caused the volume to take up twice the space?
You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).
In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)
How do you configure the iSCSI-SendTargets datastore when the datastore is provisioned from NetApp storage?
You are planning to set up a new SAN with an AFF A300 2-node switchless cluster. Your SAN fabric will consist of Cisco MDS9148s switches.
According to NetApp best practices, which two actions would be required to accomplish this task?
(Choose two.)
The ESX host reports inconsistent performance for iSCSI-based connectivity.
In this scenario, what would cause this problem?
Question