The root admin on the UNIX box receives an "Access Denied" message when he attempts to access a newly mounted qtree. What's the most likely cause of this error?
A. The qtree is missing from the /etc/hosts file.
B. NFS is turned off on the storage system.
C. The qtree is set to ntfs security style.
D. The qtree has not been exported.
What are two methods of protecting LUN overwrites using Snapshot copies on a volume with fractional reserve set to 0%? (Choose two)
A. Snap Autodelete
B. iGroup throttle
C. LUN reset
D. Volume AutoSize
Which changes the NDMP password on the Open System SnapVault agent?
A. password
B. password
C. svpasswd
D. svpassword
To configure a storage system as a member of a Windows active directory domain, the time on the storage system must be set to be within plus or minus five minutes of the time on the domain controller.
A. True
B. False
If the security style is set to UNIX, CIFS client file access is determined by ___________.
A. NT ACLs
B. the last client to set permissions
C. the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
D. This is not allowed: A CIFS client cannot access files in a path set to a security style of UNIX
Executing this command will have what effect? Options wafl.default_security_style ntfs
A. It will set the security style of all files to be ntfs.
B. It will change the security style of all qtrees to be ntfs.
C. It will change the security style of all existing volumes to be ntfs.
D. It will set the security style of all newly created volumes to ntfs.
When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the snap list command) is adjusted for all the weekly.n, nightly.n, or hourly.n Snapshot copies. The higher the value of n, the _________ the snapshot.
A. older
B. newer
C. more important
D. least important
Which three are pre-requisites for using SnapRestore? (Choose three.)
A. The volume to be reverted must be offline.
B. The volume to be reverted must not be a SnapMirror destination.
C. You must enter the SnapRestore license code before you can use it.
D. Snapshot copies must exist on the storage system so that you can select a snapshot for the reversion.
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file on the NFS mount point
for the inaccessible system, but you get the following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the error. You perform a "cf giveback" and you can now create a file over NFS on both systems. What should you do first to resolve this issue?
A. Replace the NIC adapter.
B. Submit a new bug report.
C. Use the cluster-config-checker.cgi to identify the problem and corrective action.
D. Replace the cluster interconnect card and run diagnostics "all" to ensure proper system operation.
Protection Manager is an optional component of the Operations Manager that can be licensed and accessed from the NetApp Management Console (NMC).
A. True
B. False