Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Netapp NS0-194 - NetApp Certified Support Engineer (NCSE)

Page: 2 / 2
Total 60 questions

You have a 4-node MetroCluster system. A node needs to be taken down for maintenance, but all data needs to remain online.

In this scenario, what should you do to bring down a single node?

A.

Perform an HA takeover of the node.

B.

Perform a MetroCluster switchover.

C.

Disable HA on each side of the MetroCluster.

D.

Perform an aggregate relocation of the CFO aggregates on the node.

When using NetApp Volume Encryption (NVE) which type of server is needed to keep encryption keys separate from encrypted data?

A.

KMIP

B.

RADIUS

C.

TLS

D.

TKIP

You are asked to replicate 15 of 20 volumes and the network configuration of your storage virtual machine to your other data center.

In this scenario, which NetApp technology should you use?

A.

SnapMirror Synchronous

B.

SVM DR

C.

MetroCluster

D.

SVM peering

While troubleshooting client access issues to a CIFS share, you notice that the issue only occurs when the data LIF that the clients are accessing is on a specific node in the cluster.

In this scenario, which configuration should you review to determine why this issue is happening?

A.

cluster health

B.

Kerberos

C.

share path

D.

export policies

For security reasons, you must track the access of files of a specific folder.

In this scenario, what should you do to accomplish this task from the storage side?

A.

Implement a Vscan solution.

B.

Use a cron job to save the audit log.

C.

Use role-based access control to track access.

D.

Implement an FPolicy solution.

A customer ordered a FAS2720 cluster with 8 TB SATA drives. The customer wants to use the Advanced

Drive Partitioning (ADP) feature to avoid consuming the high capacity drives for the root aggregate. Before you use the cluster setup, you issue the aggr status command and notice that ADP is not being used.

In this scenario, what would you use to implement ADP?

A.

loader prompt

B.

special boot menu

C.

nodeshell

D.

SP prompt

Test user "LAB\tester" can perform an operation in the CIFS share "HR" from the SVM "svm1". However, the rest of the users from the HR department cannot perform the same operation. You want to determine why only "LAB\tester" can perform the operation.

In this scenario, which security trace filter accomplishes this task?

A.

vserver security trace filter create -vserver svm1 -index 1 -protocol nfs - unix-name tester -trace-allow no

B.

vserver security trace filter create -vserver svm1 -index 1 -protocol cifs - windows- name LAB\tester -trace-allow no

C.

vserver security trace filter create -vserver svm1 -index 1 -protocol cifs - windows- name LAB\tester -trace-allow yes

D.

vserver security trace filter create -vserver svm1 -index 1 -protocol nfs - unix-name tester -trace-allow yes

A volume was accidentally deleted two hours ago by another administrator. No backups exist.

In this scenario, what do you do to restore the data?

A.

Use the ONTAP System Manager to recover the volume.

B.

Use a volume snapshot to return the data to the active file system.

C.

Use the volume recovery queue to restore the volume.

D.

Use an aggregate snapshot to revert the aggregate to an earlier state.