Sunteți pe pagina 1din 11

Exam Title

: Network Appliance NS0-153 : Network Appliance Storege Networking

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.
.

www.Prepking.com

1. If a qtree security style is UNIX, CIFS client file access is determined by ___________ . A. NT ACLs. B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name. C. the last client to set permissions. D. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of UNIX. Answer: B

2. Which statement best describes the output of the following command? sysstat -s 5 A. Display utilization output every five seconds and print a summary upon termination. B. Display extended output every five seconds and print a summary upon termination. C. Display the default output every five seconds and print a summary upon termination. D. Display the default output every five seconds and terminate after five counts. Answer: C

3. Which three are true of the NetApp iSCSI target (ISWT)? (Choose three.) A. It is an iSCSI software interface. B. It is an iSCSI host bus adapter (HBA). C. It implements iSCSI protocol. D. It supports iSCSI target operation over standard NICs. E. It supports iSCSI target operations over standard FC. Answer: ACD

4. Which command will show the FCP target(s) on a storage appliance? A. lun show -v B. fcp show adapter C. fcp show all D. lun stats Answer: B

www.Prepking.com

5. An iSCSI or FC SAN implementation provides _____ access to LUNs. A. file B. block C. VLD D. VIIP Answer: B

6. Which three are characteristics of an iSCSI or FCP SAN implementation? (Choose three.) A. iSCSI is a TCP/IP method for accessing LUNs. B. LUNs can be accessed through FCP. C. A LUN can be converted into a VLD. D. Block services are synonymous with an iSCSI or FCP SAN environment. E. All hosts are required to use multipathing software. Answer: ABD

7. Which three can coexist on a NetApp storage appliance? (Choose three.) A. Domain Controller B. NFS C. CIFS D. DFS E. FCP Answer: BCE

8. Which set of protocols provide block-level access to Network Appliance storage? A. CIFS and NFS B. iSCSI and FCP C. HTTP and FTP D. SNA and RPC Answer: B

www.Prepking.com

9. Host multipathing describes a _________ solution that has at least two distinct _________ paths to a LUN. A. FC or IP SAN, virtual B. FC or IP SAN, physical C. FC SAN, virtual D. token ring, physical Answer: B

10. ____________ is the default cfmode for new installations of Data ONTAP 7.2. A. single image B. mixed C. partner D. dual fabric Answer: A

11. Cfmode is a(n) ____________-specific setting. A. FCP B. iSCSI C. Active/Active D. Active/Passive Answer: A

12. Which cfmode is described by the following scenario? All LUNs in the cluster are available on all ports in the cluster. Any port on each controller can provide access to both local and partner LUNs. A. single image B. partner C. mixed D. standby Answer: A
www.Prepking.com

13. To determine the version of Data ONTAP in which a bug has been fixed, use the NOW site _______ utility. A. System Configuration Guide B. NetApp Diagnostics C. Bugs Online/Release Comparison D. AutoSupport Answer: C

14. To determine if a problem you are experiencing is known to NetApp, use the NOW site _____ utility. A. System Configuration Guide B. Bugs Online/Release Comparison C. AutoSupport D. Ethereal Answer: B

15. Which two will allow you to read and analyze a packet trace file generated by the storage appliance? (Choose two.) A. pktt B. Netmon C. Eternal View D. Ethereal Answer: BD

16. What utility on the storage appliance will allow you to capture network packet information? A. netstat B. snoop C. pktt D. traceroute Answer: C
www.Prepking.com

17. Which two commands on the storage system allow you to gather statistics about network interfaces, including basic information about network connections? (Choose two.) A. sysstat 1 B. netdiag -n C. netstat -i D. ifstat -a Answer: CD

18. To configure a storage system as a member of an active directory domain, the time on the storage system must be set to be within five minutes plus or minus, of the time on the Domain Controller. True or False? A. True B. False Answer: A

19. If the client is a CIFS client, locks are __________. A. advisory B. mandatory C. ordered D. optional Answer: B

20. For automatic user name mapping to occur for a CIFS and UNIX user name that are the same, you must do which of the following? A. Enter the user names in the /etc/hosts.equiv file. B. Use both an NIS server and a Domain Controller in the network. C. Enter the CIFS user in the NIS database. D. Do nothing; the mapping will occur. Answer: D
www.Prepking.com

21. CIFS clients can resolve symbolic links created by NFS clients on the storage system. True or False? A. True B. False Answer: A

22. Which one of the following will enable "symlink_strict_security"? A. options cifs.symlink_strict_security on B. cifs shares -change <sharename> -symlink_strict_security C. options symlink_strict_security=true D. options symlink_strict_security=on Answer: B

23. NTFS allows file access based on ___________. A. NT ACLs and UNIX permissions. B. SID and password. C. NT ACLs and SID. D. UNIX permissions. Answer: C

24. UNIX allows file access based on __________. A. GID or UID and UNIX permissions. B. NT ACLs and UNIX permissions. C. NT ACLs and SID. D. GID or UID and ACLs. Answer: A

25. Executing this command will have what effect? options wafl.default_security_style mixed A. It will change the security style of all volumes to mixed.
www.Prepking.com

B. It will change the security style of all qtrees to mixed. C. It will set the security style of all files to mixed. D. It will set the default security style for all newly created volumes. Answer: D

26. On a newly created qtree, you notice the following: * CIFS permissions on the qtree are everyone: full control. * Your Windows users can access the share, and can copy, edit, and delete files without issue. * The super user on a Solaris workstation can mount other qtrees from the same volume. The super user receives an "Access Denied" message when he attempts to mount the new qtree. What is the most likely cause of this error? A. NFS is turned off on the storage appliance. B. The qtree has not been exported. C. The qtree is set to ntfs only security style. D. The qtree is missing from the /etc/hosts file. Answer: B

27. Which command is the most appropriate for troubleshooting a multiprotocol authentication problem? A. wcc B. rdfile /etc/rc C. priv set advanced D. sysstat 1 Answer: A

28. Which command displays the credentials the storage system has stored in memory for a particular user account? A. cifs B. wcc C. showcred D. mem_disp
www.Prepking.com

Answer: B

29. Which three items are NFS resources for export? (Choose three.) A. volume B. subnet C. directory D. qtree E. file Answer: ACD

30. Which three statements apply to an entry in the /etc/exports file regarding exporting directories, qtrees, and volumes? (Choose three.) A. Export each volume separately. B. The storage appliance must resolve host names. C. Export /vol. D. Export ancestors and their descendants. Answer: ABD

31. To export volumes and directories automatically on reboot, include them in the /etc/exports file. True or False? A. True B. False Answer: A

32. Which option of the exportfs command will temporarily export a resource while ignoring the options specified in the /etc/exports file? A. exportfs -a B. exportfs -u C. exportfs -v D. exportfs -i
www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/NS0-153.htm

S-ar putea să vă placă și