Your success in Network Appliance NS0-157 is our sole target and we develop all our NS0-157 braindumps in a way that facilitates the attainment of this target. Not only is our NS0-157 study material the best you can find, it is also the most detailed and the most updated. NS0-157 Practice Exams for Network Appliance NS0-157 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Network Appliance NS0-157 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW NS0-157 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/NS0-157-exam-dumps.html
Q141. - (Topic 3)
Which two methods expose volumes to NAS clients? (Choose Two)
A. Mount directories of a volume in a namespace
B. Mount the required namespaces in a volume
C. Mount the required namespaces in an aggregate D. Mount the required volumes in a namespace
Answer: A,D
Q142. - (Topic 1)
Which two NFS versions are supported on clustered Data ONTAP 8.3? (Choose two.)
A. NFSv1
B. NFSv2
C. NFSv3
D. NFSv4
Answer: C,D
Explanation: Configure clustered Data ONTAP 8.3 for NFSv3, NFSv4, and NFSv4.1, including parallel NFS (pNFS)
Q143. - (Topic 3)
In clustered Data ONTAP 8.2 or later, what is largest number of nodes that can be supported with any enabled SAN protocols?
A. 4
B. 6
C. 8
D. 10
E. 12
F. 24
Answer: C
Explanation:
https://communities.netapp.com/docs/DOC-27777
Q144. - (Topic 3)
Which protocol(s) does Infinite Volumes support?
A. All supported protocols on Data ONTAP
B. NFSv3 and NFSv4 only
C. NFSv2 and NFSv3 only
D. File access and protocol improvements
E. NFSv3 and SMB 1.0 only
Answer: D
Explanation: Infinite Volumes use the unified security style, which enables all clients to view and set file permissions, regardless of the file permissions that are currently in effect on a given file or directory. Unified security style also facilitates access checks using both Windows and UNIX credentials.
https://library.netapp.com/ecmdocs/ECMP1511540/html/GUID-E1463130-422D-45CB-B9C2-D041258F88B0.html
Q145. - (Topic 1)
An administrator enabled the iSCSI protocol on an SVM and created a LUN for a Windows 2012 server. When the administrator uses Windows Disk Management, the LUN cannot be found.
What are two solutions for this problem? (Choose two.)
A. Set up the Windows 2012 server to serve as an iSCSI target for the LUN.
B. Define the iSCSI Send Targets in the igroup and map to the LUN.
C. Define the iSCSI IQN in the igroup and map to the LUN.
D. Start the iSCSI service on the Windows 2012 server.
Answer: C,D
Q146. - (Topic 2)
What feature balances load across a cluster while consuming less disk capacity than LS SnapMirror copies?
A. SnapVAult copies
B. FlexCache software
C. FlexClone copies
D. DP SnapMirror copies
Answer: B
182. - (Topic 2)
How does the NetApp Remote Support Agent (RSA) connect to NetApp support?
A. NetApp Support initiates a secure connection to the RSA.
B. NetApp Support initiates a non-secure connection to the RSA.
C. The RSA initiates a secure connection to NetApp Support.
D. The RSA initiates a non-secure connection to NetApp Support.
Answer: C
Explanation:
Remote Support Agent uses the following security measures:
. Connections are outbound only. Connection between Remote Support Agent and Remote Support Enterprise is always initiated by Remote Support Agent. This ensures that there is only an outbound connection from your site to technical support. All communications are authenticated. Communication between Remote Support Agent and Remote Support Enterprise is encrypted using 128-bit VeriSign signed Secure Socket Layer (SSL) certificates. Remote Support Agent retains a copy of the Remote Support Enterprise public certificate to ensure that communication occurs only with NetApp Support. If the authentication fails, the connection is broken and no data is sent. NetApp Remote Support Agent (RSA) is supported on the RLM and SP modules. Link: https://library.netapp.com/ecm/ecm_download_file/ECMP1200041
QUESTION 74 Which Data ONTAP Cluster-Mode clone technology can clone an individual LUN Inside a volume without cloning the entire volume?
A. FlexClone
B. LUN Clone
C. Snap Clone
D. Vol Clone
E. Aggr Clone
Answer: B
Explanation/Reference:
FlexClone LUN is also a method.
It could be a dump issue, if you can only select one, go for LUN Clone.
Q147. - (Topic 2)
If a customer has a 2-node cluster, which of the following must be enabled for storage failover (SFO) to function properly?
A. cluster ha modify –configured true
B. cluster modify –node –eligibility true
C. storage failover modify -node enabled true
D. storage failover modify –node -hwassist true
Answer: A
Q148. - (Topic 3)
What are three types of Vservers? (Choose three)
A. vFiler
B. node
C. intercluster
D. cluster
E. admin
F. data
Answer: B,E,F
Explanation:
https://library.netapp.com/ecmdocs/ECMP1196798/html/GUID-D860985F-11BF-4589-9457-E0FD03130B1F.html
Q149. - (Topic 3)
What is the GUI-based interface that manages a cluster?
A. Cluster Bench
B. Device Manager
C. FilerView
D. Node Studio
E. System Manager
Answer: E
Explanation:
http://www.netapp.com/us/products/management-software/system-manager.aspx
Q150. - (Topic 2)
In clustered Data ONTAP, the NFS mount or the CIFS share path need to contain the following:
A. Vserver root volume
B. Absolute path of the volume
C. Aggregate name for the volume
D. Junction path name for the volume
Answer: D
