Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network Appliance NS0-111 Exam -

Free NS0-111 Sample Questions:

Q: 1 Which one of the following files will allow you to change the search order for hostname resolution?
A. /etc/hosts
B. /etc/resolv.conf
C. /etc/searchorder.conf
D. /etc/nsswitch.conf
Answer: D

Q: 2 Which one of the following commands is used to modify network interfaces on the storage appliance?
A. ipconfig
B. ifconfig
C. interface
D. ipset
Answer: B

Q: 3 Which one of the following is a valid VLAN interface?
A. E3-9
B. E0
C. E3a
D. All of the above
Answer: A

Q: 4 What is NDMP?
A. It is a standard protocol for controlling data transfers between primary and secondary storage devices
B. It is a proprietary protocol used for controlling data transfers between the storage appliance head and disk drives
C. It is a networking trace analysis tool
D. It is a network management tool for storage appliances
Answer: A

Q: 5 What are the syntax differences between the aggr copy command options and the vol copy command options?
A. Aggr copy commands are case-sensitive, but vol copy commands are not case sensitive.
B. Aggr copy options do not work at the command line.
C. Aggr copy options must be listed in alphabetical order.
D. None; the syntax for both options are the same.
Answer: D

Q: 6 LUNs can be created using FilerView.
A. True
B. False
Answer: A

Q: 7 Which one of the following console commands indicates that all expansion cards are installed in the appropriate slots on the system board?
A. config -v
B. vol status -r
C. sysconfig -c
D. sysconfig -t
E. sysconfig -m
Answer: C

Q: 8 Which one of the following statements best describes the primary value of NVRAM?
A. Data integrity and improved response time for write operations
B. RAID protection
C. Data integrity and simplified backups
D. Separate processing of the network protocol stack
E. Separate processes for the disk subsystem
Answer: A

Q: 9 Which two of the following statements about qtrees and volumes are true? (Choose 2)
A. A volume can contain qtrees, but qtrees cannot contain qtrees.
B. A quota can be set for a qtree, but not for an exported file system.
C. A qtree can contain a volume, but a volume cannot contain a qtree.
D. The default security style for a qtree is the security style of the volume root directory.
Answer: A, D

Q: 10 SyncMirror mirrors data to
A. another storage appliance active volume
B. a second qtree on the same volume
C. another volume on the same system
D. a remote site
Answer: C

Q: 11 You are performing a Data ONTAP upgrade and have loaded the system files onto the storage appliance, and have successfully issued the download command.
What is the next command you would enter to complete the upgrade procedure?
A. version
B. sysconfig -v
C. software
D. reboot
Answer: D

Q: 12 Which command would you use to display complete hardware information for a storage appliance?
A. vol status -v
B. sysconfig -v
C. sysstat
D. disk health -v
Answer: B

Q: 13 To recover a file from a snapshot using a Windows client, what directory will a user look for?
A. snapshot
B. .snapshot
C. snap
D. ~snapshot
Answer: D

Q: 14 To recover a file from a snapshot using a UNIX client, what directory will a user look for?
A. snapshot
B. .snapshot
C. snap
D. ~snapshot
Answer: B

Q: 15 Which volume option will disable automatic snapshot creation?
A. Setting the nosnap volume option to on
B. Turning off access to the .snapshot directory
C. Setting the nosnapdir option to on
D. Setting snap reserve to 0%
Answer: A

Q: 16 Choose the best way to minimize backup time.
A. Tape backup over the WAN connection
B. Utilizing a larger tape capacity
C. Organizing data in volumes and qtrees
D. Using multiple local tape drives
Answer: D

Q: 17 What two conditions should be verified prior to performing remote backups? (Choose 2)
A. The trust relationships between the source and the destination
B. That clustered failover is disabled
C. That rsh is enabled for remote access
D. That remote backup is enabled
Answer: A, C

Q: 18 Which line describes a 50M tree quota for a qtree named "mydata" on volume "vol1"?
Target Type Disk Files Thold Sdisk Sfiles
A. /vol/vol1/mydata tree 50M - -
B. /vol/vol1 steve@tree 50M - -
C. steve tree@/vol/vol1 50M - -
D. /vol/vol1 qtree/steve 50M - -
Answer: A

Q: 19 If there are problems with user quotas being misapplied, the following two files should be checked:
A. /etc/quotas and /etc/rc
B. /etc/quotas and /etc/usermap.cfg
C. /etc/rc and /etc/usermap.cfg
D. /etc/quotas and /etc/quotarules
Answer: B

Q: 20 Which three actions can be performed with the restore command? (Choose 3)
A. View a list of files on tape.
B. Restore individual files and directories.
C. Restart a failed restore process.
D. Enter a number to specify how many filemarks should be skipped.
Answer: A, B, C

Q: 21 What happens if you dump a file that has only Windows permissions, and restore it into a UNIX-style qtree or volume?
A. A file with Windows permissions cannot be put into a UNIX-style qtree or volume. The restore will fail within an hour.
B. The file keeps its Windows permissions for that qtree or volume.
C. The file gets the default UNIX permissions for that qtree or volume.
D. The style for the qtree or volume will be changed to mixed.
Answer: C

Q: 22 What is a consistency point?
A. It is an internal snapshot generated by WAFL, occurring every ten seconds
B. It is time synchronization between a pair of clustered storage appliances
C. It is an internal checksum that is created whenever a user or application opens or closes a file
D. It is a snapshot of the active file system that is created after every disk scrub
Answer: A

Q: 23 Select the two versions of RAID that Network Appliance hardware and software provides. (Choose 2)
Answer: B, C

Q: 24 The common file sharing protocols for NAS are ___________.
Answer: B

Q: 25 Which NetApp product cannot be licensed on a NearStore appliance?
A. SnapVault
B. Multistore
C. SnapMirror
D. NetCache
Answer: D

Q: 26 The main function of a NetCache appliance is to
A. move content close to the user
B. store current content on user systems
C. move content quickly over the Internet
D. keep content up-to-date
Answer: A

Q: 27 What is the most cost effective use of a NearStore?
A. It is used in place of a storage appliance.
B. It is used in place of a server.
C. It is used for nearline storage.
D. It is used for high performance database storage.
Answer: C

Q: 28 In which environment(s) can a single FAS940 storage appliance operate?
A. SAN only
B. NAS only
C. NAS and SAN
D. NAS and Ethernet
Answer: C

Q: 29 To receive field alerts, you must
A. do nothing; they are sent automatically
B. sign up for them through the NOW site
C. contact NetApp support center
D. enable the storage appliance option
Answer: B

© 2014, All Rights Reserved