2018 Feb New NetApp NS0-155 Exam Dumps with PDF and VCE Free Updated Today! Following are some new NS0-155 Real Exam Questions:
1.|2018 Latest NS0-155 Exam Dumps (PDF & VCE) 195Q&As Download:
2.|2018 Latest NS0-155 Exam Questions & Answers Download:
Which three statements are true about SnapLock volumes? (Choose three.)
A. SnapMirror supports SnapLock volumes.
B. There are two types of SnapLock volumes.
C. SnapLock volumes support per-file retention periods.
D. In Data ONTAP 220.127.116.11 and later, SnapLock Compliance volumes are not supported on the V- Series
controller with NetApp Storage.
The snaplock command manages compliance related functionality on the system. A volume created using the vol command (see na_vol(1)) is a snaplock volume when either the enterprise or compliance option is chosen.
Enterprise and compliance SnapLock volumes allow different levels of security assurance.
SnapLock operates fundamentally at the file level.
Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule.
A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination volume has unexpired WORM files.
A volume SnapMirror relationship is not allowed between two SnapLock Compliance volumes if
the destination volume has unexpired files.
What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?
You can cable a maximum of two disk shelves on each loop https://library.netapp.com/ecm/ecm_download_file/ECMP1210206
Which command displays the disk ownership for both CPU modules in a FAS2020 system?
A. disk own -s
B. disk show -v
C. vol status -r
D. disk display r
disk show [ -o <ownername> | -s <sysid> | -n | -v | -a]
Used to display information about the ownership of the disks. Available only on systems with software-based disk ownership. -o lists all disks owned by the filer with the name <ownername> -s lists all disks owned by the filer with the serial number <sysid> -n lists all unassigned disks. -v lists all disks. -a lists all assigned disks.
To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.
For a detailed breakdown of the procedure see the following KB https://kb.netapp.com/support/index?page=content&id=1011576
You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file on the NFS mount point for the inaccessible system, but you get the following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the error. You perform a “cf giveback” and you can now create a file over NFS on both systems. What should you do first to resolve this issue?
A. Replace the NIC adapter.
B. Submit a new bug report.
C. Use the cluster-config-checker.cgi to identify the problem and corrective action.
D. Replace the cluster interconnect card and run diagnostics “all” to ensure proper system operation.
This question implies that there is an issue with the clustering of the two controllers. Since this is the case you will want to run the cluster configuration checker to identify and resolve any issues.
Each storage system in a cluster must have network access to the __________.
B. cluster partner
C. same administration
D. host same collection of subnets
All the network ports should be assigned correct port roles, and all the network ports should be in the same subnet.
One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make this configuration persistent across reboots, you must enter this information in the _____ file for each system.
Startup commands for your storage system are stored in the /etc/rc file.
The /etc/rc file contains commands that the storage system executes at boot time to configure the system.
Commands in the /etc/rc file configure the storage system to:
Communicate on your network
Use the NIS and DNS services
Save the core dump that might exist if the storage system panicked before it was booted
In an active/active configuration in takeover mode, the surviving controller interfaces will reflect the identity of the ________.
A. local interfaces only
B. failed partner interfaces only
C. local and failed partner interfaces
D. interfaces as defined in the /etc/rc file
In takeover mode, this network interface assumes the identity of the network interface on the partner
For the partner interface configuration to be persistent across reboots, you must include the ifconfig command in the /etc/rc file
What is the maximum distance between a standard clustered pair at 2Gbps?
A. 10 meters
B. 50 meters
C. 100 meters
D. 500 meters
The maximum cable length supported for 2Gbps is 500m, the same as the max cable length between a NetApp storage system and a FC switch.
Stretch MetroCluster (sometimes referred to as nonswitched) is simply an active-active configuration that can extend up to 500m depending on speed and cable type. It also includes synchronous mirroring (SyncMirror® and the ability to do a site failover with a single command. See Figure 2. Additional resiliency can be provided through the use of multipathing.
|One Time Purchase||✔||✖||✖||✖||✖|
|100% Pass Guarantee||✔||✖||✖||✖||✖|
|100% Money Back||✔||✖||✖||✖||✖|