Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

NS0-593 Exam Dumps - NetApp Certified Support Engineer ONTAP Specialist

Question # 4

Which two automation methods does NetApp ONTAP Select support? (Choose two.)

A.

REST

B.

Anslble

C.

Docker

D.

PHP

Full Access
Question # 5

Your customer installed the shelf firmware for their NS224 shelf over a week ago, and the firmware has not upgraded on shelf 1 module B. The customer wants to know what the next steps would be to get the firmware upgraded after verifying that the shelf firmware is indeed loaded onto the system.

Which step would you perform to complete the firmware upgrade?

A.

Reseat the NSM100 module.

B.

Reseat the disk in Bay 0.

C.

Power cycle the shelf.

D.

Reseat the PSU of the shelf.

Full Access
Question # 6

When an administrator tries to create a share for an existing volume named voll, the process fails with an error.

Referring to the exhibit, what Is the reason for the error?

A.

The volume must have a type of DP.

B.

The volume has not been mounted.

C.

The CIFS service is not authenticating properly with the domain controller.

D.

The CIFS service is not in workgroup mode.

Full Access
Question # 7

Your customer added a new DS4246 shelf to their FAS2750 single-node system and created a new aggregate on the new shelf. Two weeks later, they log into Active IQ and discover the Medium Impact error shown below.

Shelves with both connections via the same SAS path detected

Referring to the exhibit, which statement is correct?

A.

In a FAS2750 system, the internal shelf is only seen on one path, and the external shelves are seen on two paths.

B.

The cables are cabled Incorrectly on the SAS stack.

C.

This situation is normal for a FA57750 single-node system.

D.

Active IQ Is not aware of the shelf configuration for a single-node system.

Full Access
Question # 8

A user mentions that their home drive, that Is an export within a volume, is no longer allowing them to save files. The drive reports that it Is full, even though It shows that minimal data is written to it.

Which statement would explain this behavior?

A.

The mount is stale and uses a cached version of the volume.

B.

Other users wrote to this user's home drive.

C.

Other files within the volume are also owned by the user, exceeding the user quota.

D.

The client system needs to remount the export to show the proper space.

Full Access
Question # 9

Your customer has deployed a two petabyte NetApp ONTAP FlexGroup volume across their 4-node ONIAP 9.8 cluster. They plan to store over three billion files. They want to prevent file 10 conflicts since files are placed into the FlexGroup volume.

In this scenario, which two NFS SVM parameters should be enabled? (Choose two.)

A.

-v3-64bit-identifiers

B.

-v4-fsid-change

C.

-v3-fsid-change

D.

-v4-64bit-idantifiers

Full Access
Question # 10

Recently, a CIFS SVM was deployed and is working. The customer wants to use the Dynamic DNS (DDNS) capability available in NetApp ONTAP to easily advertise bothdata UFs to their clients. Currently. DNS is only responding with one data LIF. DDNS is enabled on the domain controllers.

Referring to the exhibit, which two actions should be performed to enable DDNS updates to work? (Choose two.)

A.

Disable the -vserver-fqdn parameter for the SVM DDNS services.

B.

Remove the NFS protocol from the cifs_01 data LIF.

C.

Enable the -use-secure parameter for the SVM DDNS services.

D.

Enable the -is-enabled parameter for the SVM DDNS services

Full Access
Question # 11

A customer calls you to troubleshoot a network issue. The customer wants to create a packet trace for all clients on the 192.168.9.0/24 subnet.

Referring to the exhibit, on which interface do you have to run the packet trace?

A.

a0a-322

B.

e2a-100

C.

e2a-1092

D.

a0a-456

Full Access
Question # 12

You are troubleshooting a CIFS connection issue that is reported by some users. You decide to collect a packet trace.

In this scenario, after you generate the packet trace, where do you find the trace file?

A.

/packet_traces of the node hosting the LIF

B.

/etc/log/packet_traces of the node hosting the LIF

C.

/etc/log/mlog/packet._traces Of all nodes

D.

/vol0/paclcet_traces of the CIFS SVM

Full Access
Question # 13

After users start reporting the Inability to create new flies in a CIFS share, you find EMS events for wafl.dir.size.max logged for the volume of the SVM to which the share points.

In this scenario, which action should you take to solve this issue?

A.

Delete unneeded files from the directory.

B.

Move the volume to a different aggregate.

C.

Increase the maximum number of files for the volume.

D.

Increase the maximum directory size for the volume.

Full Access
Question # 14

A customer wants to connect a NetApp AFF A700 system to a 40GbE switch. The controllers have a 10/40G Ethernet card in slot 4 for this purpose. The link comes up fine on node 2, but it will not come up on node 1. You look at the AutoSupport data for the nodes in question and see the output shown in the exhibit.

What is the cause of the customer's problem?

A.

The cable is plugged in upside down.

B.

The incorrect cable is used.

C.

The ports are configured for 4x10Gbit instead of 40Gbit.

D.

The port has an incorrect SFP inserted.

Full Access
Question # 15

An administrator receives the following error message:

What are two causes for this error? (Choose two.)

A.

There Is excessive SSD load causing the wear leveling to become unbalanced.

B.

A disk is falling.

C.

There is excessive SATA HDD load.

D.

An SSD disk is performing garbage collection to create a dense data layout.

Full Access
Question # 16

You have a customer who is concerned with high CPU and disk utilization on their SnapMirror destination system. They are worried about high CPU and disk usage without any user operations.

In this situation, what should you tell the customer?

A.

Suggest that the customer manually cancel any scanners on the destination to reduce CPU usage.

B.

Explain that background tasks such as SnapMirror throttle up in the absence of user workload.

C.

Suggest that the customer throttle their SnapMirror relationships to reduce resource consumption.

D.

Explain that only user workload should use the CPU and Investigate further.

Full Access
Question # 17

You are optimizing your Cloud Volumes ONTAP. For interoperability and consolidation purposes, you need to know the storage limits.

In this scenario, which source should be reviewed?

A.

NetApp Cloud Volumes ONTAP Release Notes

B.

Hardware Universe

C.

Interoperability Matrix Tool (IMT)

D.

Cloud Central

Full Access
Question # 18

Which two throughput elements are controlled by host applications? (Choose two.)

A.

operation size

B.

Jitter

C.

concurrency

D.

latency

Full Access