http://www.aroopam.com/
Choose one of the following definitions which best represents the function of the cifssetup command.A. It displays the names of all mounted directories on the storage applianceB. It displays the prompts for CIFS configuration informationC. It displays the mount point of all shared directoriesD. It displays a list of the users on the storage applianceAnswer: BCIFS client file access is determined by if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. The last client to set permissionsC. NT ACLsD. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameAnswer: DUse the NOW site __________ utility, to determine if a problem you are experiencing is knownto NetApp,.A. System Configuration GuideB. Release ComparisonC. EtherealD. Bugs OnlineAnswer: DChoose one of the following commands which you would use to view the connection, ifan NFS client attempts and fails to access a file opened by a CIFS application.A. cifs sessionsB. cifs lookupC. cifs auditD. cifs sharesAnswer: AThe root user is NOT exempt from________ , in Data ONTAP.A. user quotasB. group quotasC. tree quotasD. root quotasAnswer: CCIFS client file access is determined by ___________ , if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameC. The last client to set permissionsD. NT ACLsAnswer: BChoose from the following which option should be used with the nfsstat command toassist in decoding export and mountd errors.A. nfsstat -cB. nfsstat -tC. nfsstat -zD. nfsstat -dAnswer: DChoose one of the following commands which is NOT a good command fortroubleshooting connectivity problems from the storage appliance console.A. pingB. ifstatC. iostatD. netdiagAnswer: CChoose one of the following which is NOT part of the UNIX security style.A. GIDB. SIDC. OtherD. UIDAnswer: BChoose one of the following commands which best displays the statistics for the networkinterface.A. ifstatB. ifconfigC. netstatD. sysstatAnswer: A
Choose one of the following definitions which best represents the function of the cifs
setup command.
A. It displays the names of all mounted directories on the storage appliance
B. It displays the prompts for CIFS configuration information
C. It displays the mount point of all shared directories
D. It displays a list of the users on the storage appliance
Answer: B
CIFS client file access is determined by if a qtree security style is UNIX.
A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.
B. The last client to set permissions
C. NT ACLs
D. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
Answer: D
Use the NOW site __________ utility, to determine if a problem you are experiencing is known
to NetApp,.
A. System Configuration Guide
B. Release Comparison
C. Ethereal
D. Bugs Online
Answer: D
Choose one of the following commands which you would use to view the connection, if
an NFS client attempts and fails to access a file opened by a CIFS application.
A. cifs sessions
B. cifs lookup
C. cifs audit
D. cifs shares
Answer: A
The root user is NOT exempt from________ , in Data ONTAP.
A. user quotas
B. group quotas
C. tree quotas
D. root quotas
Answer: C
CIFS client file access is determined by ___________ , if a qtree security style is UNIX.
A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of
UNIX.
B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C. The last client to set permissions
D. NT ACLs
Answer: B
Choose from the following which option should be used with the nfsstat command to
assist in decoding export and mountd errors.
A. nfsstat -c
B. nfsstat -t
C. nfsstat -z
D. nfsstat -d
Answer: D
Choose one of the following commands which is NOT a good command for
troubleshooting connectivity problems from the storage appliance console.
A. ping
B. ifstat
C. iostat
D. netdiag
Answer: C
Choose one of the following which is NOT part of the UNIX security style.
A. GID
B. SID
C. Other
D. UID
Answer: B
Choose one of the following commands which best displays the statistics for the network
interface.
A. ifstat
B. ifconfig
C. netstat
D. sysstat
Answer: A
Choose one of the following definitions which best represents the function of the cifssetup command.A. It displays the names of all mounted directories on the storage applianceB. It displays the prompts for CIFS configuration informationC. It displays the mount point of all shared directoriesD. It displays a list of the users on the storage applianceAnswer: BCIFS client file access is determined by if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. The last client to set permissionsC. NT ACLsD. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameAnswer: DUse the NOW site __________ utility, to determine if a problem you are experiencing is knownto NetApp,.A. System Configuration GuideB. Release ComparisonC. EtherealD. Bugs OnlineAnswer: DChoose one of the following commands which you would use to view the connection, ifan NFS client attempts and fails to access a file opened by a CIFS application.A. cifs sessionsB. cifs lookupC. cifs auditD. cifs sharesAnswer: AThe root user is NOT exempt from________ , in Data ONTAP.A. user quotasB. group quotasC. tree quotasD. root quotasAnswer: CCIFS client file access is determined by ___________ , if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameC. The last client to set permissionsD. NT ACLsAnswer: BChoose from the following which option should be used with the nfsstat command toassist in decoding export and mountd errors.A. nfsstat -cB. nfsstat -tC. nfsstat -zD. nfsstat -dAnswer: DChoose one of the following commands which is NOT a good command fortroubleshooting connectivity problems from the storage appliance console.A. pingB. ifstatC. iostatD. netdiagAnswer: CChoose one of the following which is NOT part of the UNIX security style.A. GIDB. SIDC. OtherD. UIDAnswer: BChoose one of the following commands which best displays the statistics for the networkinterface.A. ifstatB. ifconfigC. netstatD. sysstatAnswer: A
No comments:
Post a Comment
Leave Your Valuable Opinion