Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Netapp NS0-527 NetApp Certified Implementation Engineer - Data Protection Exam Practice Test

Page: 1 / 16
Total 156 questions

NetApp Certified Implementation Engineer - Data Protection Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Click the Exhibit button.

You are configuring cluster peering from cluster2 to cluster1 on your ONTAP 9.7 clusters using ONTAP System Manager. You are given the details shown below to set up the cluster peer relationship. You want to determine why the peering has failed.

Cluster2 intercluster LIFIP: 192.168.0.143 Subnet: 255.255.255.0 Port: e0e passphrase: netapp1234

Cluster1 intercluster LIF IP: 192.168.0.153 Subnet: 255.255.255.0 Port: e0e passphrase: netapp1234

Referring to the exhibit, which statement is correct?

Options:

A.

The Source Cluster IP is incorrect.

B.

The Target Cluster Passphrase is incorrect.

C.

The Target Cluster IP is incorrect.

D.

The Source Cluster Passphrase is incorrect.

Question 2

You are configuring a SnapMirror replication between a source volume with adaptive compression enabled and a destination volume with secondary compression enabled.

In this scenario; which statement is correct?

Options:

A.

Blocks are uncompressed at the source and transferred to the destination.

B.

Logical replication with storage efficiency is used.

C.

Storage efficiency (compressed anddeduplicated blocks) is preserved during data transfer.

D.

Data is recompressed using the source volume’s compression type.

Question 3

Click the Exhibit button.

An employee’s computer and mapped home folder has been encrypted with ransomware. You are asked to restore the data from a SnapVault repository.

Referring to the exhibit, what happens when the volume is restored?

Options:

A.

All files in the volume are restored.

B.

The restore is performed locally.

C.

The original data is decrypted in place.

D.

Only files that have changed in the volume are restored.

Question 4

What are two ways to determine if yourSnapMirror relationships are up-to-date? (Choose two.)

Options:

A.

Use Active IQ and navigate to Cluster -> Volumes -> Protection.

B.

Use Active IQ Unified Manager and navigate to Protection -> Volume Relationships.

C.

Use ONTAP System Manager and navigate to Protection -> Volume Relationships on the destination cluster.

D.

Use ONTAP System Manager and navigate to Protection -> Volume Relationships on the source cluster.

Question 5

You want to ensure that you are using compatible hardware and software versions with your MetroCluster installation. Which tool would accomplish this task?

Options:

A.

Hardware Universe

B.

System-Level Diagnostics tool (SLDIAG tool)

C.

OneCollect

D.

Interoperability Matrix Tool

Question 6

A customer has a 2-node ONTAP Select HA cluster deployed on the same site. The ONTAP Deploy VM has been accidentally deleted. The 2-node ONTAP Select HA cluster is still serving data, but the storage failover capability has been disabled.

In this scenario, what would you do to reestablish the storage failover capability on your cluster?

Options:

A.

Deploy two ONTAP Deploy VMs and a new 2-node ONTAP Select cluster and then migrate the data.

B.

Deploy a secondary ONTAP Deploy VM and restore the 2-node cluster quorum.

C.

Deploy two single-nodeONTAP Select clusters and migrate all exiting data.

D.

Deploy a new 4-node ONTAP Select cluster and distribute data from the existing cluster.

Question 7

Your customer wants to implement SVM DR, but the customer is not certain whether theidentity-preserve parameter should be enabled. The customer explains that the source and destination clusters are in different network subnets.

In this scenario, which SVM DR solution should the customer use?

Options:

A.

SVM DR using the identity-preserve parameter disabled and the default SnapMirror policy.

B.

SVM DR using the identity-preserve parameter enabled and then administratively take the data LIFs offline on the DR cluster.

C.

SVM DR with the identity-preserve parameter enabled and a SnapMirror policy with the discard-configs network parameter.

D.

SVM DR with the identity-preserve parameter enabled and the default SnapMirror policy.

Question 8

You have a NAS volume containing 100 GB of data and daily change rate of 10%. You want to keep seven daily Snapshot copies. What is the minimum size for the volume?

Options:

A.

170 GB

B.

100 GB

C.

110 GB

D.

220 GB

Question 9

To assist with capacity planning, your supervisor wants to receive weekly capacity summaryreports using e- mail for all on-premises ONTAP clusters. You are asked to implement a solution that has no additional software licensing costs.

Which action accomplishes this task?

Options:

A.

Configure Cloud Insights Premium Edition.

B.

Create a capacity dashboard in Active IQ Digital Advisor.

C.

Configure capacity and utilization reports in Active IQ Unified Manager.

D.

Configure Cloud Insights Basic Edition.

Question 10

After deploying an ONTAP Select 2 node HA cluster at a remote site, you successfully perform manual takeover and giveback before placing the cluster into production. After the cluster runs in production for a week, you notice that you can no longer perform a manual takeover.

In this scenario, what are two causes of this problem? (Choose two.)

Options:

A.

There is a network disruption between sites.

B.

ONTAP Deploy has been deleted.

C.

The vSphere HA service has failed.

D.

The HA interconnect cables have been removed.

Question 11

You are working for a customer that has deployed a large FlexGroup with ONTAP 9.5. This FlexGroup has a SnapMirror relationship to a system at a disaster recovery site. The FlexGroup is nearly full and needs to be expanded to accommodate additional data.

In this scenario, what must you do to expand the FlexGroup and ensure that the data remains protected?

Options:

A.

Break the SnapMirror relationship, expand the source FlexGroup, and update the SnapMirror.

B.

Offline the source FlexGroup, add additional volumes, bring it online, and update the SnapMirror.

C.

Expand the source FlexGroup nondisruptively, and update the SnapMirror.

D.

Break the SnapMirror relationship, expand the source FlexGroup, and re-baseline the SnapMirror.

Question 12

You want to modify the existing Snapshot copy schedule to allow for more granularity in your ability to recover data after a corruption or loss.

In this scenario, which two tools allow you to accomplish this task (Choose two.)

Options:

A.

OnCommand System Manager

B.

OnCommand Unified Manager

C.

NetApp SnapCenter

D.

ONTAP CLI

Question 13

A customer has a new cloud strategy. They want to replicate mission-critical SAN volumes to the cloud for DR. Which NetApp technology satisfies the requirement?

Options:

A.

Cloud Sync service

B.

Fabric Pool technology

C.

Cloud Volumes Service

D.

Cloud Volumes ONTAP

Question 14

Which attribute does Data ONTAP use the identify Snapshot copies between primary and secondary FlexVol volumes in a SnapVault relationship?

Options:

A.

FlexVol name

B.

Snapshot prefix

C.

SnapMirror policy

D.

SnapMirror label

Question 15

A client has a primary data center that is located in a coastal area where the forecast is calling for a Category 5 hurricane to make landfall in three days. The client’s data is protected using NetApp SVM SnapMirror replication technology with identity-preserve that is enabled. The data is mirrored to a destination cluster outside of the affected area. The client has scheduled a controlled maintenance window for tomorrow to ensure that dependable operations are maintained.

Which three steps must be taken to accomplish this task? (Choose three.)

Options:

A.

You must break the SnapMirror relationship on each individual volume between the source and the destination clusters.

B.

You must configure the destination SVM volumes for data access.

C.

You must reboot each server in your infrastructure so that they can access the data from the destination volumes.

D.

You must break the SnapMirror relationship between the source and the destination SVMs.

E.

You must stop the source SVM before activating the destination SVM.

Question 16

A customer has a MetroCluster solution and wants to automate the disaster-recovery process. The customer wants to control the switchcover between the sites.

Which NetApp tool would satisfy these requirements?

Options:

A.

OnCommand Unified Manager

B.

MetroCluster Tiebreaker

C.

OnCommand System Manager

D.

OnCommand SnapCenter

Question 17

You want to create an application-consistent Snapshot copy by using SnapCenter software. What is required to accomplishthis task?

Options:

A.

NetApp NFS Plug-in for VMware VAAI

B.

SnapDrive for Windows Server

C.

VMware VM Tools

D.

Plug-in for Microsoft Exchange

Question 18

An administrator notices that a NAS volume has been filled completely by active data and Snapshot copies that have expanded over the Snap reserve. The volume is no longerwritable.

In this scenario, which two actions must you take to make the volume writable again? (Choose two.)

Options:

A.

Delete Snapshot copies until space is available.

B.

Delete the files in the active file system.

C.

Delete the SnapMirror relationships.

D.

Delete the SnapVault relationships.

Question 19

What are two NetApp data protection solutions? (Choose two.)

Options:

A.

RecoverPoint

B.

SnapMirror

C.

TimeFinder

D.

SnapVault

Question 20

Which two NetApp features would help you to recover from a file share that was encrypted by a ransomware event? (Choose two.)

Options:

A.

SnapLock

B.

SnapMirror

C.

SnapRestore

D.

Snapshot

Question 21

You decide to enable SnapMirror network compression on your NetApp clustered Data ONTAP environment. Which two statements are correct about enabling this feature?

(Choose two.)

Options:

A.

The data is compressed only while it traverses the network.

B.

The data transfer between the clusters must use the NDMP protocol.

C.

You may only enable SnapMirror network compression on one HA pair in a cluster, and traffic 1-1 is limited to routing through those nodes.

D.

The compression engine creates multiple transfer threads corresponding to the number of CPUs on the source storage system.

Question 22

Your customer needs to activate a destination SVM DRfollowing a disaster.

In this situation, which two actions should be performed? (Choose two.)

Options:

A.

Shut down the source cluster.

B.

From the destination cluster, break the SVM DR relationship.

C.

From the source cluster, break the SVM DR relationship.

D.

Start the destination SVM.

Question 23

Click the Exhibit button.

Referring to the exhibit, what two Search Criteria check boxes need to be used to provide a supported solution for protecting Windows Server 2019 DCE 64-bit, x64 host using local NetApp LUNs with SnapCenter Server 4.1.1? (Choose two.)

Options:

A.

SnapCenter Application Plugin

B.

SnapCenter Host Plugin

C.

Browser

D.

Host OS (OS)

Page: 1 / 16
Total 156 questions