Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NS0-527 Exam Dumps - NetApp Certified Implementation Engineer - Data Protection

Question # 4

A customer has developed a new application that uses Oracle with an AFF system to help track all of their shipping trucks around the world. The customer wants to ensure that application-consistent backups are offloaded to the cloud.

Inthis scenario, which two solutions enable the customer to satisfy these requirements? (Choose two.)

A.

FabricPool

B.

Flash Pool

C.

SnapCenter

D.

FlexClone

Full Access
Question # 5

Click the Exhibit button.

Referring to the exhibit, which volume has the highest level of protection assigned to it?

A.

project_a

B.

mworthen_src1_lun

C.

my_vol

D.

new_work_vol

Full Access
Question # 6

You have an environment with multiple database servers that are performing scheduled nightly dumps. These dumps vary in both the time to complete and the size of data produced. Youneed to ensure that there is always enough room in the volume for the data and that a nightly SnapMirror update does not take place until the database dump process is complete.

In this scenario, which NetApp tool ensures that this process is completed every night?

A.

OnCommand Unified Manager

B.

OnCommand Insight

C.

OnCommand Workflow Automation

D.

OnCommand System Manager

Full Access
Question # 7

Your customer wants to implement SVM DR, but the customer is not certain whether theidentity-preserve parameter should be enabled. The customer explains that the source and destination clusters are in different network subnets.

In this scenario, which SVM DR solution should the customer use?

A.

SVM DR using the identity-preserve parameter disabled and the default SnapMirror policy.

B.

SVM DR using the identity-preserve parameter enabled and then administratively take the data LIFs offline on the DR cluster.

C.

SVM DR with the identity-preserve parameter enabled and a SnapMirror policy with the discard-configs network parameter.

D.

SVM DR with the identity-preserve parameter enabled and the default SnapMirror policy.

Full Access
Question # 8

Click the Exhibit button.

A client has a SnapMirror relationship between two sites that is scheduled to run once a day at 12:15 a.m. They have a network connection between two sites thatprovides 100 Mbps on bandwidth. By performing the backup at this time, they can maximize their bandwidth use.

Referring to the exhibit, how long does the SnapMirror update take to finish?

A.

one hour

B.

four hours

C.

three hours

D.

two hours

Full Access
Question # 9

A customer is using SnapCenter and they want to see details about: 1.) unprotected databases outside of resource groups, 2.) databases that have not been backed up during the report period, 3.) databases that belong to a resource group for which backups have failed, and 4.) the database SnapVault status.

In this scenario, which report type satisfies the requirements?

A.

Backup Report

B.

Clone Report

C.

Plug-in Report

D.

Restore Report

Full Access
Question # 10

A FAS2750 cluster administrator experiences network issues during replication updates that pass over a low- bandwidth WAN link to their DR site. They also replicate locally to another cluster for testing and development. The administrator wants to enable network compression only on the existing WAN Link SnapMirror jobs.

In this scenario, which statement is correct?

A.

Network compression must be enabled when initializing the replica, the current jobs need to be deleted and new ones created.

B.

Network compression is a global option and it cannot be used.

C.

The current DR transfers must be aborted and the option enabled on each job, then resume the transfer.

D.

Network compression ispossible but not on a FAS2750.

Full Access
Question # 11

Click the Exhibit button.

You need to verify that you have a 10 Gb path between two clusters for SnapMirror traffic. Referring to the exhibit, how fast is the network path between the clusters?

A.

10 Mb

B.

100 Mb

C.

1 Gb

D.

10 Gb

Full Access
Question # 12

You must manually upgrade your company’s 8-node cluster from ONTAP 9.5 to ONTAP 9.7. Due to the sensitivity of the data that is being stored on the cluster, it is company policy to perform these upgrades one node at a time.

What are two steps that you must perform to accomplish this task? (Choose two.)

A.

Terminate active NFS connections.

B.

Move Epsilon to maintain cluster quorum.

C.

Terminate active SMB connections.

D.

Change disk ownership.

Full Access
Question # 13

A customer is planning the cloud strategy for their Microsoft SQLdatabases and must be able to protect them from outages. They are planning on using multiple cloud providers for their solution with their current NetApp storage system.

In this scenario, which two products are required to satisfy their backup managementneeds? (Choose two.)

A.

Cloud Volumes ONTAP

B.

SnapCenter

C.

CloudSync

D.

FlashPool

Full Access
Question # 14

A customer is running multiple Oracle DBs over NFS. The volumes are replicated using SnapMirror to a secondary site, which also hosts the development and test systems. They want to streamline the creation of test environments on the secondary site so that they will not have to manually use FlexClone to clone multiple volumes for each request.

In this scenario, which tool satisfies these requirements?

A.

Snap Creator Framework

B.

OnCommand Unified Manager

C.

NetApp Service Level Manager

D.

OnCommand Workflow Automation

Full Access
Question # 15

Your customer is concerned that his volume might run out of space. Which two volume command options would be used to resolve this problem?

(Choose two.)

A.

snapshot autodelete

B.

autosize

C.

space-guarantee

D.

filesystem-size-fixed

Full Access
Question # 16

You are the administrator of an ONTAP 9.7 cluster. You configured an hourly Snapshot schedule for all volumes. One of your users accidentally deleted an important spreadsheet file on an SMB share. This file must be restored within a minimum amount of time.

Which two actions satisfy this requirement? (Choose two.)

A.

On the cluster CLI, issue the volume clone restore command.

B.

On the cluster CLI, issue the volume snapshot restore-file command.

C.

In Windows Explorer, right-click on the SMB share where the file was deleted, goto "Previous Versions" and select the file, then copy it to the original location.

D.

In ONTAP System Manager, navigate to the volume where the share resides, click on "Snapshot Copies" and restore the latest Snapshot copy.

Full Access
Question # 17

A customer wants to assign a user to a build-in SnapCenter RBAC Role that will allow them to review and start existing SnapMirror processes only.

In this scenario, which Role will allow the customer to accomplish this task?

A.

App Backupand Clone Admin

B.

Infrastructure Admin

C.

Backup and Clone Viewer

D.

SnapCenter Admin

Full Access
Question # 18

Your DevOps team reported that one virtual machine on a VMware datastore has been corrupted due to a ransomware attack.

In this scenario, which two methods would solvethe issue? (Choose two.)

A.

Restore the Snapshot copy of the volume from ONTAP System Manager.

B.

Restore the VM using SnapCenter Plug-in for VMware vSphere.

C.

Restore the datastore using SnapCenter Plug-in for VMware vSphere.

D.

Clone thevolume's Snapshot copy prior to the attack, mount, and storage vMotion.

Full Access
Question # 19

You have deployed a 4-node fabric MetroCluster configuration for cross-site disaster-recovery protection. In this scenario, which two statements are correct for an automatic unplanned switchover (AUSO) operation?

(Choose two.)

A.

AUSO is triggered in the event of a site-wide controller failure to provide nondisruptive operations.

B.

AUSO is triggered in the event of a complete site-wide failure to provide nondisruptive operations.

C.

AUSO is triggered in the event of a site-wide switch failure to provide nondisruptive operations.

D.

AUSO is enabled by default on a MetroCluster cluster.

Full Access
Question # 20

You have two ONTAP clusters, cluster1 and cluster2. Cluster1 has an SVM serving SMB3 data and you want to protect it by replicating it to cluster2 using SVM DR. The source and destination subnets are identical. You want to retain the CIFS server security of the SVM at the destination site.

In this scenario, which three steps would you take to configure the SVM DR relationship? (Choose three.)

A.

Configure the network for data access on the destination SVM.

B.

Create the SnapMirror relationship with the id-preserve option set totrue.

C.

Create the destination SVM with the dp-destination subtype.

D.

Create a CIFS server on the destination SVM.

E.

Initialize the SnapMirror relationship.

Full Access
Question # 21

Which two types of volumes support NDMP backup? (Choose two.)

A.

FlexCache

B.

Flash Pool

C.

FlexVol

D.

FlexGroup

Full Access
Question # 22

You are using Veeam Backup & Replication to create Snapshot-based backups of your VMware environment running ONTAP. You added your primary and secondary ONTAP cluster to the Veeam Storage inventory.

However, you are unable to select your secondary ONTAP cluster as a secondary target for your Veeam backup job.

In ONTAP System Manager, which action solves this problem?

A.

Select "Make Snapshot directory visible” for each volume that you want to back up.

B.

Create a vsadmin account to grant cluster access to Veeamfor each volume that you want to back up.

C.

Change the security style to NTFS for the volume you want to back up.

D.

Initialize SnapVault for the volume that you want to back up.

Full Access
Question # 23

Click the Exhibit button.

A customer wants to ensure that their volumes are protected. In ONTAP System Manager, under the Protectionsection, you see the screen that is shown in the exhibit. The company has an asynchronous mirror policy of less than a 60-minute lag.

Referring to the exhibit, which volume has a lag that exceeds the company policy?

A.

svm_fabricpool:demo_volume -> svm_fabricpool:demo_volume_dest

B.

svm_fabricpool:project_a -> svm_fabricpool:project_a_dest

C.

svm_fabricpool:demo_volume -> svm_fabricpool:demo_volume_DR

D.

svm_fabricpool:project_b -> svm_fabricpool:project_b_dest

Full Access