Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network Appliance NS0-151 Exam - Cheat-Test.com

Free NS0-151 Sample Questions:

Q: 1 Which two of the following commands can be used to enable space reservations for a LUN?
A. lun create
B. lun set reservation
C. fcp -r <lun_path>
D. iscsi -r <lun_path>
Answer: A, B

Q: 2 Cloning a LUN from a snapshot will cause that snapshot to be ____________.
A. recreated
B. corrupted
C. locked
D. destroyed
Answer: C

Q: 3 For long-term use, a writeable snapshot of a LUN should be turned into a LUN clone.
A. True
B. False
Answer: A

Q: 4 What is the outcome of the following command?
lun create -b /vol/vol2/.snapshot/testsnap/lun0 /vol/vol2/lun0.clone
A. It creates a duplicate of the clone process of lun0.
B. It creates a clone of the writeable snapshot of lun0.
C. It creates a writeable snapshot of lun0.
D. It creates a snapshot "testsnap" of vol2.
Answer: C

Q: 5 When using SnapRestore to restore a single LUN, the LUN must be ___________.
A. mounted on a host
B. mapped to a Windows server
C. exported and accessible
D. taken offline or unmapped
Answer: D

Q: 6 The writeable snapshot that is created for a LUN clone depends on ___________.
A. mirroring
B. the snapshot taken at the time the clone was created
C. exclusive access to the volume
D. the data in the original LUN not changing
Answer: B

Q: 7 After you clone a LUN, it is a best practice that you ___________________.
A. delete the snapshot created by the writeable snapshot
B. copy the clone to a new volume as soon as possible and delete the old clone
C. create a snapshot of the original LUN in the event that the clone changes
D. expand the LUN so that the host does not encounter ENOSPC errors
Answer: A

Q: 8 What is the difference between hard and soft zoning?
A. Soft zones are based on WWNs/WWPNs.
B. Hard zones are based on WWNs/WWPNs.
C. Soft zones are based on domain IDs and port IDs.
D. None of the above is correct.
Answer: A

Q: 9 If you believe you have an FCP SAN performance problem, which NetApp utility or command would gather both your Solaris host and storage appliance data for analysis?
A. poststat
B. perfstat
C. prestat
D. sio_ntap.exe
Answer: B

Q: 10 Space reservations are useful in SAN iSCSI and FCP LUN environments.
A. True
B. False
Answer: A

Q: 11 Applications, such as databases, running on NAS or iSCSI or FCP SAN must be __________________.
A. prepared for snapshots by flushing buffers to disk and momentarily suspending activity
B. disconnected from their storage resources during the snapshot
C. using dynamic multipathing during a backup
D. mirrored with a host-based volume manager to be backed-up
Answer: A

Q: 12 Given that there is no real flow control in FCP SAN, attention should be given to monitoring queue depths.
A. True
B. False
Answer: A

Q: 13 What are the minimum and maximum LUN sizes on a NetApp storage appliance using iSCSI and a Microsoft Windows 2000 Server?
A. Minimum 11.5 MB, Maximum 2TB
B. Minimum 21.5 MB, Maximum 2.5TB
C. Minimum 31.5 MB, Maximum 2TB
D. Minimum 41.5 MB, Maximum 2.5TB
Answer: C

Q: 14 In FCP SAN and iSCSI SAN, NetApp recommends creating ____ per NetApp cluster node.
A. no more than 10 volumes
B. no more than 50 volumes
C. no more than 100 volumes
D. no more than 200 volumes
Answer: C

Q: 15 Which of the following commands would you use to verify the iSCSI service is running?
A. license add iSCSI
B. iscsi service
C. iscsi status
D. iscsi protocol
Answer: C

Q: 16 Which three of the following are true of the NetApp iSCSI target (ISWT)? (Choose 3)
A. It is an iSCSI software interface.
B. It is an iSCSI hardware interface.
C. It implements iSCSI protocol.
D. It supports iSCSI target operation over standard NICs.
Answer: A, C, D

Q: 17 In an iSCSI target configuration, there are two ISWT adapters. The purpose of adapter iswta is for local traffic. What is the purpose of the iSCSI target adapter iswtb?
A. It is used for partner traffic in a clustered Windows host environment.
B. It is used for partner traffic in a clustered storage appliance environment.
C. It is used for iSCSI network traffic when iswta is exceeding thresholds.
D. It is used for iSCSI network traffic when iswta has failed.
Answer: B

Q: 18 Which of the following is not a command that can be performed with the SnapDrive for Windows graphical user interface?
A. Create Disk
B. Create VLD
C. Connect Disk
D. Convert VLD to LUN
Answer: B

Q: 19 In a Fibre Channel configuration, the host's HBA is referred to as the _____________ and the storage appliance's HBA is referred to as the _________.
A. primary, secondary
B. initiator, target
C. secondary, primary
D. target, initiator
Answer: B

Q: 20 Which of the following is not used for creating LUNs on the storage appliance?
A. lun create
B. lun setup
C. FilerView
D. lun config
Answer: D

Q: 21 The three methods to create a LUN are:
lun setup
lun map
FilerView
A. True
B. False
Answer: B

Q: 22 Which three queue statements are true? (Choose 3)
A. Each device queue maps to one and only one host HBA queue.
B. Total device queue space on Solaris cannot exceed host HBA queue space.
C. Total device queue space in Windows cannot exceed HBA target space.
D. Over-allocation of device queues relative to host HBA space on HP-UX does not lead to problems.
Answer: A, B, D

Q: 23 Which of the following is not a characteristic of an iSCSI or FCP SAN implementation?
A. iSCSI is a TCP/IP method for accessing LUNs.
B. You can access LUNs through FCP.
C. Block services are synonymous with an iSCSI or FCP SAN environment.
D. A LUN can be converted into a VLD.
Answer: D

Q: 24 If you cannot access a LUN that has been created and mapped to an initiator from a Solaris host, what are the two most likely problems? (Choose 2)
A. The storage appliance is not in the /etc/hosts file.
B. The LUN ID is not in the /etc/sd.conf file.
C. The devfsadm command has not been executed.
D. The LUN ID is not in the /kernel/drv/sd.conf file.
Answer: C, D

Q: 25 At Network Appliance, the presence of iSCSI or FCP SAN and NAS storage on the same storage appliance is referred to as _________.
A. consolidated storage
B. co-mingled storage
C. unified storage
D. united storage
Answer: C

Q: 26 Which three of the following can coexist on a NetApp storage appliance?
A. Domain Controller
B. NFS
C. CIFS
D. SAN
Answer: B, C, D


© 2014 Cheat-Test.com, All Rights Reserved