100% Valid NetApp NS0-155 Dumps with VCE and PDF shared by PassLeader (Question 61 – Question 75)

New and Valid for 100% Passing Ensure NetApp NS0-155 Dumps from PassLeader: https://www.passleader.com/ns0-155.html (195 Q&As), PassLeader offer both NS0-155 VCE Dumps and NS0-155 PDF Dumps for Preparing for the NetApp NS0-155 Exam, 100% Valid and 100% Passing Guarantee.

More, you can download the latest PassLeader NS0-155 Exam Dumps Online for FREE: https://drive.google.com/open?id=0B-ob6L_QjGLpRmRuU1NXelgwZEk

The snapvault restore command is run on the ____.

A.    secondary system to push data to the primary system
B.    primary system to pull data from the secondary system
C.    secondary system to pull data from the primary system
D.    secondary system to push data to the primary storage system

Answer: B
The snapvault command has a number of subcommands. The set of subcommands differs on the primary and secondary.
On the primary, the subcommands allow users to configure and manage a set of snapshots for potential replication to the secondary, to abort replication transfers to the secondary, to check status, to restore data from the secondary, and to release resources when a primary qtree will no longer be replicated to a secondary.
On the secondary, the subcommands allow users to configure and manage the replication of primary paths to secondary qtrees, to configure and manage the snapshot schedules which control when all the qtrees in a secondary volume are updated from their respective primary paths and how many snapshots to save, to abort transfers, to check status, and to release resources preserved to restart backups from a restored qtree.

To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ____. (Choose two.)

A.    restore to a non existing qtree with DOT 7.2
B.    add the new qtree to the primary storage system with DOT 7.2
C.    overwrite the existing qtree on the primary storage system with DOT 7.3
D.    delete the existing qtree from the secondary storage system with DOT 7.3

Answer: AC
You use the snapvault restore command to restore a backed-up qtree saved to the secondary system. Starting with Data ONTAP 7.3, you can restore the data to an existing qtree on the primary system using baseline restore or incremental restore.

The snapvault update command is only available on the secondary system.

A.    True
B.    False

Answer: A

Which tool is available on an OSSV client to assist in starting or stopping the OSSV service, modifying NDMP settings, enabling debugging, and capturing trace files?

A.    Operations Manager
B.    Protection Manager
C.    Svconfigurator GUI
D.    svdebug.exe

Answer: C

The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

A.    True
B.    False

Answer: A
OSSV hosts listen for communications from NDMP manager applications on port 10000 by default.

What security mechanism can an administrator use on an OSSV client to set permissions allowing backups to a SnapVault secondary system?

A.    Via /etc/hosts.equiv file
B.    QSM access list modifiable via svconfigurator
C.    Contents inside a file called access and located in OSSV /snapvault/etc
D.    MD5 based authentication between SnapVault primary and secondary, with changeable password

Answer: B

Which three statements are true about SnapLock volumes? (Choose three.)

A.    SnapMirror supports SnapLock volumes.
B.    There are two types of SnapLock volumes.
C.    SnapLock volumes support per-file retention periods.
D.    In Data ONTAP and later, SnapLock Compliance volumes are not supported on the V-Series controller with NetApp Storage.

Answer: ABC
The snaplock command manages compliance related functionality on the system. A volume created using the vol command (see na_vol(1)) is a snaplock volume when either the enterprise or compliance option is chosen. Enterprise and compliance SnapLock volumes allow different levels of security assurance.
SnapLock operates fundamentally at the file level.

Snapshot copies for SnapLock volumes are deleted automatically according to the retention count set in the Snapshot schedule.

A.    True
B.    False

Answer: A

A volume SnapMirror relationship is allowed between two SnapLock Compliance volumes if the destination volume has unexpired WORM files.

A.    True
B.    False

Answer: B
A volume SnapMirror relationship is not allowed between two SnapLock Compliance volumes if the destination volume has unexpired files.

What is the maximum number of disk shelves per loop in a fabric-attached MetroCluster?

A.    1
B.    2
C.    4
D.    6

Answer: B
You can cable a maximum of two disk shelves on each loop.

Which command displays the disk ownership for both CPU modules in a FAS2020 system?

A.    disk own -s
B.    disk show -v
C.    vol status -r
D.    disk display r

Answer: B

To remove a cluster setup, you must perform these steps:
1. Type cf disable.
2. Unlicense cluster.
3. Remove partner entries for network interfaces from the /etc/rc file.
4. Halt and make sure the partner-sysid is blank.
5. Power down and remove the cluster interconnect card.
6. Perform steps 1-5 above on the partner node.

A.    True
B.    False

Answer: A

You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file on the NFS mount point for the inaccessible system, but you get the following error:
NFS server filer2 not responding still trying.
When not in takeover mode, both storage systems operate normally and you do not get the error. You perform a “cf giveback” and you can now create a file over NFS on both systems. What should you do first to resolve this issue?

A.    Replace the NIC adapter.
B.    Submit a new bug report.
C.    Use the cluster-config-checker.cgi to identify the problem and corrective action.
D.    Replace the cluster interconnect card and run diagnostics “all” to ensure proper system operation.

Answer: C
This question implies that there is an issue with the clustering of the two controllers. Since this is the case you will want to run the cluster configuration checker to identify and resolve any issues.

Each storage system in a cluster must have network access to the ____.

A.    Internet
B.    cluster partner
C.    same administration
D.    host same collection of subnets

Answer: D
All the network ports should be assigned correct port roles, and all the network ports should be in the same subnet.

One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make this configuration persistent across reboots, you must enter this information in the ____ file for each system.

A.    /etc/rc
B.    /etc/hosts
C.    /vol/vol0/home
D.    /vol/vol0/mount

Answer: A
Startup commands for your storage system are stored in the /etc/rc file. The /etc/rc file contains commands that the storage system executes at boot time to configure the system. Commands in the /etc/rc file configure the storage system to:
– Communicate on your network
– Use the NIS and DNS services
– Save the core dump that might exist if the storage system panicked before it was booted

Trying the PassLeader NS0-155 Dumps in VCE and PDF for Your First Attempt and 100% Passing: https://www.passleader.com/ns0-155.html (195 Q&As, VCE and PDF)

More, download new PassLeader NS0-155 Exam Dumps for FREE: https://drive.google.com/open?id=0B-ob6L_QjGLpRmRuU1NXelgwZEk