NS0-163 NetApp Certified Data Administrator ONTAP Professional Questions and Answers
An aggregate is composed of twelve 36-Gigabyte disks. A drive fails and only 72-Gigabyte spare disks are available Data ONTAP will then perform what action?
Which Data ONTAP option would you enable to set system wide throttling for all transfers?
Which one of the following options will allow a snapmirror storage appliance to mirror from this system?
Which one of the following /etc/snapmirror.conf entries will not support synchronous SnapMirror?
Which tool should an administrator use to identify the number of empty SAS ports on an existing cluster?
Open System SnapVault agents can be installed on all non-Network Appliance platforms.
An administrator wants to provide isolation from connected hosts to the same FCP LUN. Which two features accomplish this request? (Choose two.)
A volume is SnapMirrored hourly. You revert the volume using a snapshot that was created two days ago. Which command continues the relationship?
Which three tools present statistics from the Data ONTAP counter manager? (Choose three.)
Which native ONTAP feature allows an administrator to block a Windows user from writing files with the.crypto extension?
After configuring an ONTAP duster for SAN access, the administrator is notified that the cluster nodes are connected to separate fc switches.
Given the following output:

What action will correct the redundancy issue?
When Data ONTAP creates a weekly, nightly, or hourly snapshot, the value of n (as shown by the UNIX Is command) is adjusted for all the weekly, nightly, or hourly snapshots. The higher the value of n. the_________the snapshot.
When creating an S3 bucket using System Manager, ONTAP uses which default performance service level for an AFF?
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage appliances were NFS mounted onto the Solaris host. You attempt to create a file on the NFS mount point for the inaccessible appliance, but you get the following error:NFS server filer2 not responding still trying.Symptoms:
1) When not in takeover mode, both storage appliances operate normally.
2) In takeover mode, the taken over node is not accessible on the network.You perform a "cf giveback" and you can now create a file over NFS on both appliances.
What should vou do first to resolve this issue?
A SnapVault secondary volume can contain up to ______________ Snapshot copies for data protection.
What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
Which option of the snap restore command allows you to specify a different directory, as long as the directory already exists?
In a synchronous SnapMirror configuration, the soui'ce storage appliance exhibits high latency due to user traffic and rapid data change from SnapMirror transactions.Which one of the following tuning methods best resolves this performance behavior? Edit the /etc/snapmirror.conf file on the destination storage appliance and set:
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule.
If an error message indicates that the cluster interconnect adapter itself is faulty, what is your corrective action?
Which one of the following commands is used to specify the destination appliance(s) that are allowed to replicate (pull) data from the source appliance?
Which ONTAP feature will allow WORM and non-WORM volumes in the same aggregate?
Which one of the following keywords alone can be used to convert an asynchronous mirror to be synchornous?
Which MetroCluster configuration procedure is recommended for re-establishing a mirrored volume that was in a level-0 re synchronization state when it failed?
Identify the twoSnapMirrorcommands that are entered on the destination storage appliance.
The required hardware to add SyncMirror to an existing system would be ___________.
To remove a cluster setup, you must perform the following steps.
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sine the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.
An administrator wants to present datastores to a VMware environment that is using VLAN-10 and creates an SVM with NFS enabled on lif_NFS.

What does the administrator need to correct?
Fill in the blanks for the following statement:
The qtree specified for_____must not exist on the secondary system before you run the_____command.
Fill in the blank for the following statement: To manage a SnapVault backup through a commercial NDMP application, you must specify a_____authorized through that application.
An administrator is troubleshooting connection problems with ONTAP System Manager. The cluster management L1F is on port aOa-33. Web clients on VLAN 33 are able to access System Manager. Web clients on other subnets are unable to reach System Manager.
Which network component should the administrator modify?
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make tins configuration persistent across reboots, you must enter tins information in the_____file for each appliance.
When cabling a standard storage appliance for SyncMirror. disk pool 1 volumes must be cabled to Fibre Channel adapter(s) located in what range of slots on the FAS960 appliance?
The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.
The SnapVault secondary system allows you to keep a separate schedule of Snapshot copies from your primary system.
In a Fabric Attached Metro Cluster, disk ownership by a node is determined by_____________.
Which one of the following commands would you use to rejoin the "mil" volume with the "mir(l)" volume?
Which method should an administrator use to make sure all data In a local tier cannot be read If the underlying device Is repurposed, returned, misplaced, or stolen?
In which two tools can an administrator identify security vulnerabilities and receive actionable intelligence? (Choose two.)
Which two choices are used to configure a semi-synchronous SnapMirror relationship? (Choose two.)
