Data ONTAP 8.0 7-Mode Administrator: NS0-154 Exam
Data ONTAP 8.0 7-Mode Administrator
NS0-154 Questions & Answers
Exam Code: NS0-154
Exam Name: Data ONTAP 8.0 7-Mode Administrator
Q & A: 152 Q&As
1. Which three items are NFS resources for export? (Choose three.)
A.aggregate
B.directory/qtree
C.file
D.subnet
E.volume
Answer: BCE
2. Data ONTAP 8.0 7-Mode supports SMB 2.0 in Windows Vista and Windows Server
2008.
A.True
B.False
Answer: B
3. In a tape environment after a SnapRestore reversion of a volume, incremental backup
and restore operations on the file or volume cannot rely on the timestamps to determine
what data needs to be backed up or restored. Which course of action ensures correct
incremental backups?
A.Perform a base-level backup of the volume after you restore it.
B.Reboot the storage system to reset timestamps back to their original times before the
reversion.
C.Take a new snapshot of the volume to create new base-level timestamps for the
incremental backup.
D.Take a new snapshot of the volume to create new base-level timestamps for the
incremental backup, and then perform a base-level backup of the volume after you restore
it.
Answer: A
4. Which three /etc/snapmirror.conf entries will support synchronous or semi-synchronous
SnapMirror? (Choose three.)
A.FilerA:source_vol FilerB:destination_vol – sync
B.FilerA:source_vol FilerB:destination_vol – 0-55/5 * * *
C.FilerA:source_vol FilerB:destination_vol outstanding=3s sync
D.FilerA:source_vol FilerB:destination_vol visibility_interval=1hr, outstanding=3ms,
cksum=crc32 sync
Answer: ACD
5. Which changes the NDMP password on the Open System SnapVault agent?
A.password
B.password
C.svpasswd
D.svpassword
Answer: D
6. Which two commands can be used to enable LUN reservations? (Choose two.)
A.lun create
B.lun map
C.lun reservation set
D.lun set reservation
Answer: AD
7. Which three licenses are required for fabric-attached MetroCluster? (Choose three.)
A.Cluster
B.Cluster_remote
C.Syncmirror_local
D.Syncmirror_fabric
E.Syncmirror_remote
Answer: ABC
8. An iSCSI or FC SAN implementation provides _____ access to LUNs.
A.block
B.file
C.VIIP
D.VLD
Answer: A
9. Which are three characteristics of an iSCSI or FCP SAN implementation? (Choose
three.)
A.A LUN can be converted into a VLD.
B.LUNs can be accessed using the FCP protocol.
C.LUNs can be accessed using the iSCSI protocol.
D.Block services are associated with an iSCSI or FCP SAN environment.
Answer: BCD
10. Which three protocols can coexist on a NetApp storage system? (Choose three.)
A.CIFS
B.DAFS
C.DFS
D.FCP
E.NFS
Answer: ADE
11. Which set of protocols provide block-level access to NetApp storage?
A.CIFS and NFS
B.HTTP and FTP
C. iSCSI and FCP
D.SNA and RPC
Answer: C
12. Host multi-pathing describes a _________ solution that has at least two distinct
_________ paths to a LUN.
A.FC or IP SAN, physical
B.FC or IP SAN, virtual
C.FC SAN, virtual
D.token ring, physical
Answer: A
13. To determine the version of Data ONTAP in which a bug has been fixed, use the NOW
site _______ utility. (Choose two.)
A.AutoSupport
B.Bugs Online
C.NetApp Diagnostics
D.Release Comparison
E.System Configuration Guide
Answer: BD
14. Which two will allow you to read and analyze a packet trace file generated by the
storage system? (Choose two.)
A.Eternal View
B.Netmon
C.pktt
D.WireShark
Answer: BD
15. What utility on the storage system will allow you to capture network packet
information?
A.netstats
B.pktt
C.snoop
D.traceroute
Answer: B
16. Which two commands on the storage system allow you to gather detailed statistics
about network interfaces, including basic information about network connections?
(Choose two.)
A.ifstat -a
B.netdiag -n
C.netstat -i
D.sysstat 1
Answer: AC
17. To configure a storage system as a member of a Windows active directory domain,
the time on the storage system must be set to be within plus or minus five minutes of the
time on the domain controller.
A.True
B.False
Answer: A
18. For automatic user name mapping to occur for a CIFS and UNIX user name that are
the same, you must do what?
A.Enter the CIFS user in the NIS database.
B.Enter the user names in the /etc/hosts.equiv file.
C.Use both a NIS server and a Domain Controller in the network.
D.Nothing: mapping will occur if user name authentication is available.
Answer: D
19. If the security style is set to UNIX, CIFS client file access is determined by
___________ .
A.NT ACLs
B.the last client to set permissions
C.the mapped UNIX UID/GID of the CIFS client and the UNIX file permissions
D.This is not allowed: A CIFS client cannot access files in a path set to a security style of
UNIX
Answer: C
20. NTFS allows file access based on ___________.
A.NT ACLs and SID.
B.NT ACLs and UNIX permissions.
C.SID and password.
D.UNIX permissions.
Answer: A
…go to http://www.lead2pass.com/ns0-154.html to download the full version Q&As.