ExamGecko
Home Home / Network Appliance / NS0-521

Network Appliance NS0-521 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











After deleting a LUN, an administrator notices that the space does not show as available. What needs to be done to reclaim the space?

A.
UnmaptheLUN.
A.
UnmaptheLUN.
Answers
B.
Delete the volume snapshots.
B.
Delete the volume snapshots.
Answers
C.
Purge the recovery queue.
C.
Purge the recovery queue.
Answers
D.
Perform space reclamation.
D.
Perform space reclamation.
Answers
Suggested answer: D

Explanation:

After deleting a LUN, if the space does not show as available, performing space reclamation is necessary. Space reclamation involves identifying and reclaiming unused space on the storage system, making it available for new data. This process ensures that the deleted LUN's space is properly freed up and reflected in the available storage capacity.

For more details, refer to:

NetApp Documentation on Space Reclamation

NetApp Community on Free Space Reclamation

When using tagged VLANs on Cisco Nexus switches for NVMe over TCP, which two changes must be made to enable jumbo frames? (Choose two.)

A.
Modify the Cisco Nexus switches to use an MTU of 9216.
A.
Modify the Cisco Nexus switches to use an MTU of 9216.
Answers
B.
Modify the appropriate broadcast domain in NetApp ONTAP software to use an MTU of 9000.
B.
Modify the appropriate broadcast domain in NetApp ONTAP software to use an MTU of 9000.
Answers
C.
Modify the appropriate broadcast domain in NetApp ONTAP software to use an MTU of 9216.
C.
Modify the appropriate broadcast domain in NetApp ONTAP software to use an MTU of 9216.
Answers
D.
Modify the Cisco Nexus switches to use an MTU of 9000.
D.
Modify the Cisco Nexus switches to use an MTU of 9000.
Answers
Suggested answer: A, C

Explanation:

For enabling jumbo frames on Cisco Nexus switches for NVMe over TCP with tagged VLANs, the following changes are required:

Modify the Cisco Nexus switches to use an MTU of 9216: Setting the MTU to 9216 ensures that the network can handle jumbo frames, reducing the number of packets needed for large data transfers and thus improving performance.

Modify the appropriate broadcast domain in NetApp ONTAP software to use an MTU of 9216: This setting must match the network configuration to ensure end-to-end support for jumbo frames, which is essential for optimizing performance in NVMe over TCP environments.

For additional information, refer to:

NetApp Documentation on NVMe over TCP

Cisco Documentation on Jumbo Frames

On a two-node NetApp AFF ASA cluster, what is the recommended minimum number of paths for a SAN environment from the client host perspective?

A.
2
A.
2
Answers
B.
8
B.
8
Answers
C.
4
C.
4
Answers
D.
16
D.
16
Answers
Suggested answer: C

Explanation:

In a two-node NetApp AFF ASA cluster, the recommended minimum number of paths for a SAN environment from the client host perspective is 4. This configuration ensures high availability and load balancing, which are critical for maintaining performance and resilience in a SAN environment. Each host should have at least two paths to each controller to achieve this setup.

For more detailed information, you can refer to:

NetApp SAN Configuration

NetApp All-Flash SAN Array Documentation

A NetApp AFF node in a four-node cluster has a single FC port on one node, which Is used for legacy tape backup. Tape is no longer needed, and the port is disconnected and modified for reuse in the FCP SAN.

Based on this change, which command will verify that the port is usable?

A.
network interface show
A.
network interface show
Answers
B.
lun persistent-reservation show
B.
lun persistent-reservation show
Answers
C.
syszem node hardware unified-connect show
C.
syszem node hardware unified-connect show
Answers
D.
vserver fcp initiator show
D.
vserver fcp initiator show
Answers
Suggested answer: C

Explanation:

To verify that a modified FC port is usable after it has been repurposed from tape backup to FCP SAN, the command system node hardware unified-connect show should be used. This command checks the status and configuration of the unified connect hardware, ensuring that the port is correctly set up for the new function in the SAN environment.

For additional details, see:

NetApp Command Reference

A customer requires multiple SAN and NAS protocols on a NetApp AFF cluster. The cluster must concurrently serve a namespace over NVMe/FC, a LUN over FCP, a LUN over iSCSI, and an NFS export.

Based on these requirements, what is the minimum data SVM count that is required?

A.
3
A.
3
Answers
B.
4
B.
4
Answers
C.
1
C.
1
Answers
D.
2
D.
2
Answers
Suggested answer: C

Explanation:

To concurrently serve a namespace over NVMe/FC, a LUN over FCP, a LUN over iSCSI, and an NFS export, only one data SVM (Storage Virtual Machine) is required. NetApp ONTAP allows a single SVM to support multiple SAN and NAS protocols simultaneously, enabling efficient and consolidated management of storage resources.

For more information, refer to:

NetApp Documentation on SVM Configuration

NetApp SVM Best Practices

A customer needs to verify if jumbo frames have been configured correctly for an ISCSI workload. Which command should be used?

A.
pig -lif <1IF> -vserver <SVM> -destination <IP> -disallow-fragmentation false -packet-size 1500
A.
pig -lif <1IF> -vserver <SVM> -destination <IP> -disallow-fragmentation false -packet-size 1500
Answers
B.
pig -lif <---F> -vserver <SVM> -destination <IP> -disallow-fragmentation true -packet-size 9000
B.
pig -lif <---F> -vserver <SVM> -destination <IP> -disallow-fragmentation true -packet-size 9000
Answers
C.
pig 'lif <LIF> -vserver <svm> -destination <ip> -disallow- fragmentation true -packet-size 8900
C.
pig 'lif <LIF> -vserver <svm> -destination <ip> -disallow- fragmentation true -packet-size 8900
Answers
D.
ping -lif <LIF> -vserver <SVM> -destination <IP> -disallow- fragmentation true -packet-size 1500
D.
ping -lif <LIF> -vserver <SVM> -destination <IP> -disallow- fragmentation true -packet-size 1500
Answers
Suggested answer: B

Explanation:

To verify if jumbo frames have been configured correctly for an iSCSI workload, the command ping -lif <LIF> -vserver <SVM> -destination <IP> -disallow-fragmentation true -packet-size 9000 should be used. This command tests the network path with the jumbo frame size (9000 bytes) and ensures that the packets are not fragmented, confirming that jumbo frames are supported end-to-end.

For more details, you can check:

NetApp Documentation on iSCSI Configuration

NetApp Community Discussions on Jumbo Frames

An administrator runs the lun igroup show -insrar.ee command on a NetApp ONTAP SAN.

Based on the output, what is the initiator type?

A.
NQN
A.
NQN
Answers
B.
WWNN
B.
WWNN
Answers
C.
IQN
C.
IQN
Answers
D.
WWPN
D.
WWPN
Answers
Suggested answer: D

Explanation:

Based on the output of the command lun igroup show -instance, which lists the protocol as fcp and the initiator as server1.netapp.com, the initiator type is WWPN (World Wide Port Name). In Fibre Channel Protocol (FCP) environments, WWPNs are used to uniquely identify Fibre Channel devices. This contrasts with IQNs used in iSCSI, and NQNs used in NVMe over Fabrics.

For more details, refer to:

NetApp Documentation on Initiators

A storage engineer is required to provide NetApp site design documentation to show that the NetApp ONTAP SAN solution was delivered as intended.

Which NetApp tool can the storage engineer use to automate the creation of a difference report?

A.
NetAppDocs
A.
NetAppDocs
Answers
B.
Active IQ OneCollect
B.
Active IQ OneCollect
Answers
C.
Active IQ Config Advisor
C.
Active IQ Config Advisor
Answers
D.
Harvest
D.
Harvest
Answers
Suggested answer: B

Explanation:

Active IQ OneCollect is a NetApp tool designed to collect configuration and performance data from your storage environment, including SAN solutions. It can automate the creation of difference reports by capturing the current state of the system and comparing it against a baseline, thereby showing any changes or deviations from the intended design.

For further details, refer to:

NetApp Active IQ OneCollect Documentation

An administrator needs to configure Foreign LUN Import on a NetApp HA pair to migrate over FCP LUNs from a third-party array while serving other LUNs.

Which two actions are required to complete this task? (Choose two.)

A.
Reboot the third-party array to prepare for the LUN import.
A.
Reboot the third-party array to prepare for the LUN import.
Answers
B.
Convert all FC ports on each controller to an FC initiator port.
B.
Convert all FC ports on each controller to an FC initiator port.
Answers
C.
Create zoning from the third-party array to the cluster.
C.
Create zoning from the third-party array to the cluster.
Answers
D.
Convert a single FC port on each controller to an FC initiator port.
D.
Convert a single FC port on each controller to an FC initiator port.
Answers
Suggested answer: C, D

Explanation:

To configure Foreign LUN Import (FLI) on a NetApp HA pair to migrate over FCP LUNs from a third-party array while serving other LUNs, the following actions are required:

Create zoning from the third-party array to the cluster: Proper zoning ensures that the NetApp cluster can communicate with the third-party storage array.

Convert a single FC port on each controller to an FC initiator port: This is necessary for the NetApp system to initiate the connection and access the LUNs on the third-party array.

For more information, refer to:

NetApp Documentation on Foreign LUN Import

An administrator is configuring ISCSI on an SVM and requires that all network traffic Is encrypted. What must be done to satisfy this requirement?

A.
Configure aggregate encryption.
A.
Configure aggregate encryption.
Answers
B.
Configure IPsec.
B.
Configure IPsec.
Answers
C.
Enable FIPS mode.
C.
Enable FIPS mode.
Answers
D.
Use CHAP for iSCSI.
D.
Use CHAP for iSCSI.
Answers
Suggested answer: B

Explanation:

To ensure that all network traffic is encrypted for iSCSI on an SVM, configuring IPsec is required. IPsec (Internet Protocol Security) provides end-to-end encryption for IP traffic, ensuring that data transmitted over the network is secure.

For more details, refer to:

NetApp Documentation on Configuring IPsec

Total 65 questions
Go to page: of 7