http://www.aroopam.com/
Which one of these methods best describes the steps for creating CIFS Shares using FilerView?A. CIFS -> Configure -> OptionsB. CIFS->Shares->ManageC. CIFS->Configure->Setup WizardD. CIFS->Shares->AddAnswer: DGiven the content of the /etc/quotas file, select the appropriate answer for the following question:What would the default limit for the user wesson for the volume /vol/wmv be if their explicit quotaof 75 MB of disk space and 75K files was removed from the /etc/quotas file?"A. 50MB disk space, 15K filesB. 750MB disk space, 85K filesC. 100MB disk space, 75K filesD. 75MB disk space, 75K filesAnswer: AWhich of the following operations might generate this sysstat output?A. Disk ScrubB. Volume copyC. SnapMirrorD. Volume reconstructionAnswer: AGiven the content of the /etc/quotas file, fill in the blank by selecting the appropriate answer forThe following statement:"A CIFS user named wesson can use of disk space and 75K files in the /vol/wmv/proj1 qtree."A. 50MBB. 100MBC. 60MBD. 70MBAnswer: DYour storage appliance favors a Domain Controller located _________.A. In the same building as the storage applianceB. Based on the storage appliance's /etc/cifssec fileC. On the same subnet as the storage applianceD. Connected via a Wide Area NetworkAnswer: CCIFS file locking is __________.A. Stateless and utilizes advisory locksB. Stateless and utilizes mandatory locksC. Stateful and utilizes advisory locksD. Stateful and utilizes mandatory locksAnswer: DNFS versions 2 and 3 support ________ file locking.A. mandatoryB. advisoryC. opportunisticD. exclusiveAnswer: BIn the Windows environment, the storage appliance supports the use of local groups in managingUsers and groups.A. TrueB. FalseAnswer: AA qtree security style of UNIX will______________.A. Block CIFS access to the file systemB. Allow CIFS access to the file systemC. Block CIFS access unless the user is also a UNIX userD. Not allow write operations to CIFS usersAnswer: BCIFS clients can resolve symbolic links created by NFS clients on the storage appliance.A. TrueB. FalseAnswer: AWhich of the following symbolic links is NOT supported in Data ONTAP?A. MappedB. WidelinkC. No boundary checkingD. TargetedAnswer: DWhich one of the following will enable "symlink_strict_security"?A. options cifs.symlink_strict_security onB. cifs shares -change <sharename> -symlink_strict_securityC. options symlink_strict_security=trueD. options symlink_strict_security=onAnswer: BNTFS allows file access based on ___________.A. NT ACLs and UNIX permissionsB. SID and passwordC. NT ACLs and SIDD. UNIX permissionsAnswer: CWhich one of the following is NOT part of the UNIX security style?A. GIDB. OtherC. SIDD. UIDAnswer: CTo set the default security style for all newly created volumes on the storage appliance to haveMixed security, one must execute the following command:A. options qtree.default_security_style mixedB. options volume.default_security_style mixedC. options wafl.default_security_style mixedD. options default_security_style mixedAnswer: C
Which one of these methods best describes the steps for creating CIFS Shares using FilerView?
A. CIFS -> Configure -> Options
B. CIFS->Shares->Manage
C. CIFS->Configure->Setup Wizard
D. CIFS->Shares->Add
Answer: D
Given the content of the /etc/quotas file, select the appropriate answer for the following question:
What would the default limit for the user wesson for the volume /vol/wmv be if their explicit quota
of 75 MB of disk space and 75K files was removed from the /etc/quotas file?"
A. 50MB disk space, 15K files
B. 750MB disk space, 85K files
C. 100MB disk space, 75K files
D. 75MB disk space, 75K files
Answer: A
Which of the following operations might generate this sysstat output?
A. Disk Scrub
B. Volume copy
C. SnapMirror
D. Volume reconstruction
Answer: A
Given the content of the /etc/quotas file, fill in the blank by selecting the appropriate answer for
The following statement:
"A CIFS user named wesson can use of disk space and 75K files in the /vol/wmv/proj1 qtree."
A. 50MB
B. 100MB
C. 60MB
D. 70MB
Answer: D
Your storage appliance favors a Domain Controller located _________.
A. In the same building as the storage appliance
B. Based on the storage appliance's /etc/cifssec file
C. On the same subnet as the storage appliance
D. Connected via a Wide Area Network
Answer: C
CIFS file locking is __________.
A. Stateless and utilizes advisory locks
B. Stateless and utilizes mandatory locks
C. Stateful and utilizes advisory locks
D. Stateful and utilizes mandatory locks
Answer: D
NFS versions 2 and 3 support ________ file locking.
A. mandatory
B. advisory
C. opportunistic
D. exclusive
Answer: B
In the Windows environment, the storage appliance supports the use of local groups in managing
Users and groups.
A. True
B. False
Answer: A
A qtree security style of UNIX will______________.
A. Block CIFS access to the file system
B. Allow CIFS access to the file system
C. Block CIFS access unless the user is also a UNIX user
D. Not allow write operations to CIFS users
Answer: B
CIFS clients can resolve symbolic links created by NFS clients on the storage appliance.
A. True
B. False
Answer: A
Which of the following symbolic links is NOT supported in Data ONTAP?
A. Mapped
B. Widelink
C. No boundary checking
D. Targeted
Answer: D
Which one of the following will enable "symlink_strict_security"?
A. options cifs.symlink_strict_security on
B. cifs shares -change <sharename> -symlink_strict_security
C. options symlink_strict_security=true
D. options symlink_strict_security=on
Answer: B
NTFS allows file access based on ___________.
A. NT ACLs and UNIX permissions
B. SID and password
C. NT ACLs and SID
D. UNIX permissions
Answer: C
Which one of the following is NOT part of the UNIX security style?
A. GID
B. Other
C. SID
D. UID
Answer: C
To set the default security style for all newly created volumes on the storage appliance to have
Mixed security, one must execute the following command:
A. options qtree.default_security_style mixed
B. options volume.default_security_style mixed
C. options wafl.default_security_style mixed
D. options default_security_style mixed
Answer: C
Which one of these methods best describes the steps for creating CIFS Shares using FilerView?A. CIFS -> Configure -> OptionsB. CIFS->Shares->ManageC. CIFS->Configure->Setup WizardD. CIFS->Shares->AddAnswer: DGiven the content of the /etc/quotas file, select the appropriate answer for the following question:What would the default limit for the user wesson for the volume /vol/wmv be if their explicit quotaof 75 MB of disk space and 75K files was removed from the /etc/quotas file?"A. 50MB disk space, 15K filesB. 750MB disk space, 85K filesC. 100MB disk space, 75K filesD. 75MB disk space, 75K filesAnswer: AWhich of the following operations might generate this sysstat output?A. Disk ScrubB. Volume copyC. SnapMirrorD. Volume reconstructionAnswer: AGiven the content of the /etc/quotas file, fill in the blank by selecting the appropriate answer forThe following statement:"A CIFS user named wesson can use of disk space and 75K files in the /vol/wmv/proj1 qtree."A. 50MBB. 100MBC. 60MBD. 70MBAnswer: DYour storage appliance favors a Domain Controller located _________.A. In the same building as the storage applianceB. Based on the storage appliance's /etc/cifssec fileC. On the same subnet as the storage applianceD. Connected via a Wide Area NetworkAnswer: CCIFS file locking is __________.A. Stateless and utilizes advisory locksB. Stateless and utilizes mandatory locksC. Stateful and utilizes advisory locksD. Stateful and utilizes mandatory locksAnswer: DNFS versions 2 and 3 support ________ file locking.A. mandatoryB. advisoryC. opportunisticD. exclusiveAnswer: BIn the Windows environment, the storage appliance supports the use of local groups in managingUsers and groups.A. TrueB. FalseAnswer: AA qtree security style of UNIX will______________.A. Block CIFS access to the file systemB. Allow CIFS access to the file systemC. Block CIFS access unless the user is also a UNIX userD. Not allow write operations to CIFS usersAnswer: BCIFS clients can resolve symbolic links created by NFS clients on the storage appliance.A. TrueB. FalseAnswer: AWhich of the following symbolic links is NOT supported in Data ONTAP?A. MappedB. WidelinkC. No boundary checkingD. TargetedAnswer: DWhich one of the following will enable "symlink_strict_security"?A. options cifs.symlink_strict_security onB. cifs shares -change <sharename> -symlink_strict_securityC. options symlink_strict_security=trueD. options symlink_strict_security=onAnswer: BNTFS allows file access based on ___________.A. NT ACLs and UNIX permissionsB. SID and passwordC. NT ACLs and SIDD. UNIX permissionsAnswer: CWhich one of the following is NOT part of the UNIX security style?A. GIDB. OtherC. SIDD. UIDAnswer: CTo set the default security style for all newly created volumes on the storage appliance to haveMixed security, one must execute the following command:A. options qtree.default_security_style mixedB. options volume.default_security_style mixedC. options wafl.default_security_style mixedD. options default_security_style mixedAnswer: C
No comments:
Post a Comment
Leave Your Valuable Opinion