ExamGecko
Home / Network Appliance / NS0-520 / List of questions
Ask Question

Network Appliance NS0-520 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Changes to your organization requires access to an SVM be given to a group of individuals. Your company uses Active Directory as a method of access control. You decide to use the security login create - vserver engCluster -user-or-group-name CORP\Admins -application ssh -authmethod domain -role vsadmin command.

In this scenario, which access rights will this command grant?

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

A customer has multiple host applications that require FC block storage. You need to gather and validate the customer's requirements for a supported NetApp solution.

Which two tools would be used to accomplish this task? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

Click the Exhibit button.

Network Appliance NS0-520 image Question 63 79460 09232024011723000000

You are implementing an ONTAP 9.5 AFF A300 SAN cluster with the NVMe, FC, and FCoE protocols.

Referring to the exhibit, which three protocols and physical port pairs are supported? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

What is a SAN best practice when initially configuring a Linux FC boot LUN?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse

A customer has an FC host that needs to be attached to the NetApp AFF A700 dual controller storage cluster.

To accomplish this task, which three steps should the customer perform? (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

Click the Exhibit button.

Network Appliance NS0-520 image Question 66 79463 09232024011723000000

You notice that your volume named vol1 has a temporary volume that is doubling the space that is used by the volume.

In this scenario, which operation caused the volume to take up twice the space?

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

You create a new iSCSI SVM and secure iSCSI sessions by using both Challenge-Handshake Authentication Protocol (CHAP) and iSCSI Access Control Lists (ACL).

In this scenario, in which two ways are you securing your iSCSI implementation? (Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

How do you configure the iSCSI-SendTargets datastore when the datastore is provisioned from NetApp storage?

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

You are planning to set up a new SAN with an AFF A300 2-node switchless cluster. Your SAN fabric will consist of Cisco MDS9148s switches.

According to NetApp best practices, which two actions would be required to accomplish this task?

(Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

The ESX host reports inconsistent performance for iSCSI-based connectivity.

In this scenario, what would cause this problem?

Become a Premium Member for full access
  Unlock Premium Member
Total 234 questions
Go to page: of 24
Search

Related questions