[2017 PDF&VCE] Ensure Pass NS0-158 Exam By Training Lead2pass New PDF Dumps (51-60)
Lead2pass 2017 September New NetApp NS0-158 Exam Dumps!
100% Free Download! 100% Pass Guaranteed!
Are you worrying about the NS0-158 exam? Lead2pass provides the latest NS0-158 braindumps and guarantees you passing NS0-158 exam beyond any doubt.
Following questions and answers are all new published by NetApp Official Exam Center: https://www.lead2pass.com/ns0-158.html
Click the Exhibit button.
You have a 2-node NetApp cluster. You perform a storage failover and notice that IP address 10.1.100.21 is unreachable while omegana1-01 is rebooting. After omegana1-01 is back online, the IP address becomes reachable again. However, IP address 10.1.100.20 was still reachable during the reboot. The commands shown in the exhibit were executed before the storage failover.
In this scenario, why was IP address 10.1.100.21 unreachable?
A. The LIF for 10.1.100.21 has an incorrect failover setting.
B. The failover group for 10.1.100.21 is misconfigured.
C. The node management LIFs cannot fail over to other nodes.
D. The Address Resolution Protocol (ARP) cache needs to be cleared on the upstream switch.
The purpose and the default behavior of a LIF is indicated by the role associated with that LIF. Each LIF is assigned a default failover group and failover policy when you create the LIF. These settings automatically configure the LIF with a list of failover targets from the ports available in the failover group, so you need to understand the relationship between LIF roles and failover groups.
Click the Exhibit button.
You manage a multi-tenant NetApp storage system.
You start configuring an SVM for a new customer and receive the error shown in the exhibit when you attempt to create a LIF.
You verify that the IP address is correct and that the customer LIF does not already exist.
However, you see that another customer is using the same IP address in their SVM.
How would you correct this problem?
A. Create a new VLAN for the new customer.
B. Create the LIF with a different IP address.
C. Create an IPspace for the new customer.
D. Create a broadcast domain for the new customer.
The IPspace feature enables a single storage system to be accessed by clients from more than one disconnected network, even if those clients are using the same IP address.
You just finished upgrading a cluster to ONTAP 9.1 and would like to enable NetApp Volume Encryption (NVE) on an existing volume.
You do not have NetApp Storage Encryption (NSE) drives installed.
Which three steps would you take to accomplish this task? (Choose three.)
A. Replace drives with NSE drives.
B. Modify the volume options with the -encrypt true parameter.
C. Install the NVE license.
D. Execute the key manager setup wizard.
E. Perform volume move operation using the -encrypt-destination true parameter.
You must install the NVE license and enable onboard key management before you can enable volume encryption.
You can enable encryption on a new volume or on an existing volume.
You can use the volume move start command to enable encryption on an existing volume.
You can use the same aggregate or a different aggregate.
Click the exhibit button.
In reference to the NFS export-policy rules shown in the exhibit, NFS clients mounted to /data1 from the 192.168.1.0/24, 192.168.2.0/24 and 192.168.3.0/24 subnets are able to mount /data1 and read files but are unable to edit files or write new files. All other subnets require read-only access to /data1.
What must you do to allow write access to the three subnets while allowing read-only access to all other subnets in this scenario?
A. Set the index of ruleindex 2 to ruleindex 4.
B. Set the index of ruleindex 1 to ruleindex 4.
C. Set the index of ruleindex 3 to ruleindex 4.
D. Set the index of ruleindex 4 to ruleindex 1.
Make sure the rule with ruleindex 1 is applies last.
Note: You can use the vserver export-policy rule setindex command to manually set an existing export rule’s index number. This enables you to rearrange the order in which Data ONTAP processes export rules.
If a client makes an access request that is not permitted by the applicable export policy, the request fails with a permission-denied message. If a client does not match any rule in the export policy, then access is denied. If an export policy is empty, then all accesses are implicitly denied.
What is a characteristic of a single-node cluster?
A. It only hosts a single SVM.
B. It does not have a node management LIF.
C. It does not have any cluster interconnect LIFs.
D. It is unsupported in a production environment.
Click the Exhibit button.
An administrator installed UTA2 PCIe cards into an existing FAS8200 HA pair. The new cards will be used for native FC traffic.
The administrator wants to configure the UTA2 ports for FC client access.
Referring to the exhibit, which two actions address the requirement? (Choose two.)
A. Use the network fcp adapter modify command to bring the adapter online.
B. Reboot the node to bring the adapter online after final configuration.
C. Use the system hardware unified-connect command to verify that the port mode is set to initiator.
D. Use the ucadmin modify command to set the adapter mode to FC.
B: Ports must be converted in pairs, for example, 0c and 0d, after which, a reboot is required, and the ports must be brought back to the up state.
D: CNA ports can be configured into native Fibre Channel (FC) mode or CNA mode.
If the current configuration does not match the desired use (here we want to change from CNA mode to FC mode), enter the following commands to change the configuration as needed:
system node hardware unified-connect modify -node node_name -adapter adapter_name – mode fc|cna -type target|initiator
-mode is the personality type, fc or 10GbE cna.
-type is the FC4 type, target or initiator.
You want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage Encryption (NSE).
Which action accomplishes this task?
A. Perform a takeover-giveback of each node in the cluster to update the passphrase on each mode.
B. Use the security key-manager setup command to change the passphrase.
C. Use the volume move command to migrate a volume and update the passphrase during the move.
D. Use the security key-manager update-passphrase command to change the passphrase.
You can use the security key-manager update-passphrase command to change the onboard key management passphrase.
At which level of granularity would you back up data to tape using the SMTape command?
You can use SMTape to perform volume backups to tapes.
An administrator is designing an ONTAP solution that consists of eight FAS8200 nodes in a single cluster.
Each node will use four ports for cluster connections.
Which cluster interconnect switch model should be used in this scenario?
A. Nexus 5596UP
B. Nexus 5010
The following cluster switches are supported: NetApp CN1610, Cisco Nexus 5596UP and 5596T.
The cluster switches use the following Inter-Switch Link (ISL) ports:
Click the Exhibit button. Which two data protection deployment configurations shown in the exhibit are supported? (Choose two.)
A. configuration D
B. configuration C
C. configuration A
D. configuration B
You can use SnapVault to protect a volume SnapMirror destination.
You can perform SnapVault transfers from the volume SnapMirror destination when you want to retain the data for a longer period.
More free Lead2pass NS0-158 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDSlNsODFqU2FNSEk
Lead2pass offers the latest NS0-158 PDF and VCE dumps with new version VCE player for free download, and the new NS0-158 dump ensures your exam 100% pass.
2017 NetApp NS0-158 (All 121 Q&As) exam dumps (PDF&VCE) from Lead2pass:
https://www.lead2pass.com/ns0-158.html [100% Exam Pass Guaranteed]