Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Netapp > Certified Data Administrator (NCDA) > NS0-162

NS0-162 NetApp Certified Data Administrator (ONTAP) Question and Answers

Question # 4

You ate attempting to establish a SnapMlrror relationship between your ONTAP cluster (AcmeClusOl) and a partner company's ONTAP cluster (WidgetsClusOl). The clusters are unable to establish a peering relationship. You perform a packet capture on WldgetsClusOl and do not see any packets from AcmeClusOl. You also discover that the IP subnet that Is used for WidgetsClusOl's intercluster LIFs overlaps with a local subnet at your company.

In this scenario, which feature would enable AcmeClusOl and WidgetsClusOl to peer with each other?

A.

VLANs

B.

broadcast domains

C.

IPspaces

D.

ONTAP subnets

Full Access
Question # 5

SnapMirror Business Continuity (SM-BC) relies on a component to trigger an automatic unplanned failover (AUFO). In this scenario, what is this component?

A.

ONTAP Deploy

B.

Tiebreaker software

C.

ONTAP Mediator

D.

Cloud Manager

Full Access
Question # 6

You need to Increase the number of files that can be created In a volume. Which two methods enable you to achieve this goal? (Choose two.)

A.

Increase the number of files permitted on the volume.

B.

Set the space guarantee to 'volume".

C.

Set the fractional reserve to "0".

D.

Increase the size of the volume.

Full Access
Question # 7

Your company wants their newly Installed ONTAP system to automatically send telemetry data to NetApp to provide early notification of any security risks, bug fixes, and ONTAP updates. Furthermore, In case of hardware failures, a support case should be opened automatically at NetApp.

Which two NetApp components satisfy the requirements? (Choose two.)

A.

Cloud Insights

B.

Active IQ

C.

ONTAP AutoSupport

D.

Active IQ Unified Manager

Full Access
Question # 8

Exhibit

You have a 4-node cluster.

How many ISCSI LIFs will be created from the SVM setup wizard, as shown in the exhibit?

A.

8

B.

6

C.

16

D.

2

Full Access
Question # 9

You want to configure Active Directory domain controller access for NetApp ONTAP cluster administration. In this scenario, which two actions would accomplish this task? (Choose two.)

A.

Configure an authentication tunnel through an admin SVM.

B.

Use the vservar active-directory create command to create a computer account on the domain for a non-CIFS SVM.

C.

Use the vserver active-directory create command to create a computer account on the domain for a CIFS SVM.

D.

Configure an authentication tunnel through an existing CIFS SVM.

Full Access
Question # 10

Which security method would be used to authenticate targets and Initiators In an ISCSI environment?

A.

NIS

B.

LDAP

C.

/etc/hosts

D.

CHAP

Full Access
Question # 11

A customer has a 2-node AFF A220 cluster and needs to enable the FC protocol. The onboard UTA2 ports are configured for 10Gbps Ethernet. In this scenario, what are two different methods to use FCP over the UTA2 ports? (Choose two.)

A.

Swap the Ethernet transceivers in the UTA2 ports for 1Gbps transceivers, and configure the ports as target ports.

B.

Connect onboard UTA2 ports to a Nexus switch and enable FCP.

C.

Swap the Ethernet transceivers in the UTA2 ports for FC transceivers, and configure the ports as target ports.

D.

Change the existing UTA2 ports from 10 Gbps speed to 8 Gb speed.

Full Access
Question # 12

After creating several volumes, you notice that the hosting aggregates Immediately show a decrease In available space. Which volume setting would prevent this outcome?

A.

space SLO set to "thick"

B.

space guarantee set to "none"

C.

space SLO set to "semi-thick"

D.

space guarantee set to "volume"

Full Access
Question # 13

A customer wants to migrate a series of LUNs from a third-party array to a FAS. In this scenario, which two tools would the customer use? (Choose two.)

A.

ADP

B.

XCP

C.

FLI

D.

NKS

Full Access
Question # 14

After creating an SVM In an ONTAP cluster, you are asked to delegate administration of the newly created SVM to an SVM administrator. In this scenario, which two tasks must you complete? (Choose two.)

A.

Create the vsadmin user account in the new SVM.

B.

Create a LIF for SVM management.

C.

Configure role-based access control (RBAC) for the vsadmin user account.

D.

Set a password for the vsadmin user account.

Full Access
Question # 15

An application owner at your organization requests a solution for zero RTO In the event of a failure In your primary data center, where you are using NetApp ONTAP 9.8 software with ISCSI LUNs. The owner wants to avoid reconfiguring the application.

Which NetApp solution would you propose to fulfill these requirements?

A.

SyncMlrror

B.

SnapMirror Business Continuity (SM-BC)

C.

SVM Disaster Recovery (SVM DR)

D.

SnapMirror Synchronous (SMS)

Full Access
Question # 16

You have a 2-node NetApp FAS500f system serving NAS and SAN protocols. The cluster is running NetApp ONTAP 9.8. You have a requirement to use SnapMirror to mirror your data to public cloud object storage.

In this scenario, which ONTAP native solution is supported?

A.

Flash Pool

B.

Cloud Backup Service

C.

Cloud Compliance service

D.

Cloud Sync

Full Access
Question # 17

You want to monitor system performance in real time.

In this scenario, which two tools would you use to accomplish this task? (Choose two.)

A.

ONTAP System Manager

B.

Active IQ Unified Manager

C.

ONTAP CLI

D.

Active IQ Digital Advisor

Full Access
Question # 18

You want to scale out storage performance for read-Intensive data across multiple locations. In this scenario, which NetApp feature accomplishes this task?

A.

FlexClone

B.

FlexVol

C.

FlexCache

D.

Flash Pool

Full Access
Question # 19

Exhibit

After creating a new LIF called datalif1 on SVM vs0, you notice connectivity issues to the newly created LIF, as shown In the exhibit. You have verified that the new LIF Is online and the network team is able to see the MAC address on the switches.

Referring to the exhibit, what would cause connectivity Issues?

A.

The home port needs to be modified to port e0d.

B.

The route metric needs to be modified to a metric of 30.

C.

The route needs to be modified to reflect the correct gateway.

D.

The netmask needs to be modified to a /16 network.

Full Access
Question # 20

You have a 50 TO FlexGroup volume that is serving NFSv3 on a FAS8300 HA pair that Is running ONTAP 9.8 software of files. A Linux du command runs for days to count files.

In this scenario, which native ONTAP feature will report real-time file counts?

A.

Quality of Service

B.

Logical Space Reporting

C.

volume autosize

D.

File System Analytics

Full Access
Question # 21

A node fails on an HA configuration. A successful failover occurs, but your clients that are using the SMB protocol complain that they are not able to access their data.

In this scenario, what caused the problem?

A.

The surviving node is not licensed for CIFS.

B.

One of the cluster Interconnect ports on the surviving node failed.

C.

The quota for the qtree has been reached.

D.

The disk ownership did not transfer correctly.

Full Access
Question # 22

Which command parameter will result in a thin-provisioned LUN?

A.

-space-allocation enabled

B.

-space-reservation disabled

C.

-space-gurantee none

D.

-space-guarantee volume

Full Access
Question # 23

The source NAS volume of a SnapMirror relationship is unavailable due to networking issues at your organization's primary data center. You want to make the destination NAS volume writable so that clients are able to access their data.

Which two steps do you need to take to solve the issue? (Choose two.)

A.

Break the SnapMirror relationship using the snapairrcr break command from the destination cluster.

B.

Delete the SnapMirror relationship from the destination cluster.

C.

Use the volume mount command to mount the NAS volume In the NFS namespace.

D.

Break the SnapMirror relationship using the snapmirror break command from the source cluster.

Full Access
Question # 24

Your company wants to Increase access security In both their NFS and ISCSI environments. Currently ISCSI Is not authenticated and NFS relies only on export policies for security.

Which two enhancements do you use to satisfy this new criteria? (Choose two.)

A.

Enable Kerberos for NFS exports.

B.

Enable Kerberos for iSCSI LUN access.

C.

Enable Challenge-Handshake Authentication Protocol (CHAP) for NFS exports.

D.

Enable Challenge-Handshake Authentication Protocol (CHAP) for ISCSI LUN access.

Full Access
Question # 25

You want to prepare your ONTAP cluster and your ESXI cluster to connect NFS datastores over a 10-GbE network using Jumbo frames. In this scenario, which three configurations would accomplish this task? (Choose three.)

A.

Enable jumbo frames with an MTU of 9000 for your ESXi hosts.

B.

Enable jumbo frames with an MTU of 9216 for your switches.

C.

Enable Jumbo frames with an MTU of 1500 for your ESXI hosts.

D.

Enable Jumbo frames with an MTU of 1500 for your ONTAP cluster.

E.

Enable Jumbo frames with an MTU of 9000 for your ONTAP cluster.

Full Access
Question # 26

You have a 4-node cluster with a NetApp AFF A400 HA pair and a NetApp FAS8700 HA pair running NetApp ONIAP 9.8 software. You are required to set up 2-factor authentication for the ONTAP CU.

Which two authentication methods are required in this scenario? (Choose two.)

A.

public key

B.

Security Assertion Markup Language (SAML)

C.

IP security (IPsec)

D.

password

Full Access