Enter your email address:

Delivered by FeedBurner

NS0-120 Data ONTAP Advanced Part 2

http://www.aroopam.com/
Which one of these methods best describes the steps for creating CIFS Shares using FilerView?

A. CIFS -> Configure -> Options

B. CIFS->Shares->Manage

C. CIFS->Configure->Setup Wizard

D. CIFS->Shares->Add

Answer: D

Given the content of the /etc/quotas file, select the appropriate answer for the following question:

What would the default limit for the user wesson for the volume /vol/wmv be if their explicit quota

of 75 MB of disk space and 75K files was removed from the /etc/quotas file?"

A. 50MB disk space, 15K files

B. 750MB disk space, 85K files

C. 100MB disk space, 75K files

D. 75MB disk space, 75K files

Answer: A

Which of the following operations might generate this sysstat output?

A. Disk Scrub

B. Volume copy

C. SnapMirror

D. Volume reconstruction

Answer: A

Given the content of the /etc/quotas file, fill in the blank by selecting the appropriate answer for

The following statement:

"A CIFS user named wesson can use of disk space and 75K files in the /vol/wmv/proj1 qtree."

A. 50MB

B. 100MB

C. 60MB

D. 70MB

Answer: D

Your storage appliance favors a Domain Controller located _________.

A. In the same building as the storage appliance

B. Based on the storage appliance's /etc/cifssec file

C. On the same subnet as the storage appliance

D. Connected via a Wide Area Network

Answer: C

CIFS file locking is __________.

A. Stateless and utilizes advisory locks

B. Stateless and utilizes mandatory locks

C. Stateful and utilizes advisory locks

D. Stateful and utilizes mandatory locks

Answer: D

NFS versions 2 and 3 support ________ file locking.

A. mandatory

B. advisory

C. opportunistic

D. exclusive

Answer: B

In the Windows environment, the storage appliance supports the use of local groups in managing

Users and groups.

A. True

B. False

Answer: A

A qtree security style of UNIX will______________.

A. Block CIFS access to the file system

B. Allow CIFS access to the file system

C. Block CIFS access unless the user is also a UNIX user

D. Not allow write operations to CIFS users

Answer: B

CIFS clients can resolve symbolic links created by NFS clients on the storage appliance.

A. True

B. False

Answer: A

Which of the following symbolic links is NOT supported in Data ONTAP?

A. Mapped

B. Widelink

C. No boundary checking

D. Targeted

Answer: D

Which one of the following will enable "symlink_strict_security"?

A. options cifs.symlink_strict_security on

B. cifs shares -change <sharename> -symlink_strict_security

C. options symlink_strict_security=true

D. options symlink_strict_security=on

Answer: B

NTFS allows file access based on ___________.

A. NT ACLs and UNIX permissions

B. SID and password

C. NT ACLs and SID

D. UNIX permissions

Answer: C

Which one of the following is NOT part of the UNIX security style?

A. GID

B. Other

C. SID

D. UID

Answer: C

To set the default security style for all newly created volumes on the storage appliance to have

Mixed security, one must execute the following command:

A. options qtree.default_security_style mixed

B. options volume.default_security_style mixed

C. options wafl.default_security_style mixed

D. options default_security_style mixed

Answer: C

Which one of these methods best describes the steps for creating CIFS Shares using FilerView?A. CIFS -> Configure -> OptionsB. CIFS->Shares->ManageC. CIFS->Configure->Setup WizardD. CIFS->Shares->AddAnswer: DGiven the content of the /etc/quotas file, select the appropriate answer for the following question:What would the default limit for the user wesson for the volume /vol/wmv be if their explicit quotaof 75 MB of disk space and 75K files was removed from the /etc/quotas file?"A. 50MB disk space, 15K filesB. 750MB disk space, 85K filesC. 100MB disk space, 75K filesD. 75MB disk space, 75K filesAnswer: AWhich of the following operations might generate this sysstat output?A. Disk ScrubB. Volume copyC. SnapMirrorD. Volume reconstructionAnswer: AGiven the content of the /etc/quotas file, fill in the blank by selecting the appropriate answer forThe following statement:"A CIFS user named wesson can use of disk space and 75K files in the /vol/wmv/proj1 qtree."A. 50MBB. 100MBC. 60MBD. 70MBAnswer: DYour storage appliance favors a Domain Controller located _________.A. In the same building as the storage applianceB. Based on the storage appliance's /etc/cifssec fileC. On the same subnet as the storage applianceD. Connected via a Wide Area NetworkAnswer: CCIFS file locking is __________.A. Stateless and utilizes advisory locksB. Stateless and utilizes mandatory locksC. Stateful and utilizes advisory locksD. Stateful and utilizes mandatory locksAnswer: DNFS versions 2 and 3 support ________ file locking.A. mandatoryB. advisoryC. opportunisticD. exclusiveAnswer: BIn the Windows environment, the storage appliance supports the use of local groups in managingUsers and groups.A. TrueB. FalseAnswer: AA qtree security style of UNIX will______________.A. Block CIFS access to the file systemB. Allow CIFS access to the file systemC. Block CIFS access unless the user is also a UNIX userD. Not allow write operations to CIFS usersAnswer: BCIFS clients can resolve symbolic links created by NFS clients on the storage appliance.A. TrueB. FalseAnswer: AWhich of the following symbolic links is NOT supported in Data ONTAP?A. MappedB. WidelinkC. No boundary checkingD. TargetedAnswer: DWhich one of the following will enable "symlink_strict_security"?A. options cifs.symlink_strict_security onB. cifs shares -change <sharename> -symlink_strict_securityC. options symlink_strict_security=trueD. options symlink_strict_security=onAnswer: BNTFS allows file access based on ___________.A. NT ACLs and UNIX permissionsB. SID and passwordC. NT ACLs and SIDD. UNIX permissionsAnswer: CWhich one of the following is NOT part of the UNIX security style?A. GIDB. OtherC. SIDD. UIDAnswer: CTo set the default security style for all newly created volumes on the storage appliance to haveMixed security, one must execute the following command:A. options qtree.default_security_style mixedB. options volume.default_security_style mixedC. options wafl.default_security_style mixedD. options default_security_style mixedAnswer: C

No comments:

Post a Comment

Leave Your Valuable Opinion