Enter your email address:

Delivered by FeedBurner

NS0-121 Data ONTAP Advanced Exam Part 2

http://www.aroopam.com/
Choose one of the following definitions which best represents the function of the cifs

setup command.

A. It displays the names of all mounted directories on the storage appliance

B. It displays the prompts for CIFS configuration information

C. It displays the mount point of all shared directories

D. It displays a list of the users on the storage appliance

Answer: B

CIFS client file access is determined by  if a qtree security style is UNIX.

A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of

UNIX.

B. The last client to set permissions

C. NT ACLs

D. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name

Answer: D

Use the NOW site __________ utility, to determine if a problem you are experiencing is known

to NetApp,.

A. System Configuration Guide

B. Release Comparison

C. Ethereal

D. Bugs Online

Answer: D

Choose one of the following commands which you would use to view the connection, if

an NFS client attempts and fails to access a file opened by a CIFS application.

A. cifs sessions

B. cifs lookup

C. cifs audit

D. cifs shares

Answer: A

The root user is NOT exempt from________ , in Data ONTAP.

A. user quotas

B. group quotas

C. tree quotas

D. root quotas

Answer: C

CIFS client file access is determined by ___________ , if a qtree security style is UNIX.

A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style of

UNIX.

B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name

C. The last client to set permissions

D. NT ACLs

Answer: B

Choose from the following which option should be used with the nfsstat command to

assist in decoding export and mountd errors.

A. nfsstat -c

B. nfsstat -t

C. nfsstat -z

D. nfsstat -d

Answer: D

Choose one of the following commands which is NOT a good command for

troubleshooting connectivity problems from the storage appliance console.

A. ping

B. ifstat

C. iostat

D. netdiag

Answer: C

Choose one of the following which is NOT part of the UNIX security style.

A. GID

B. SID

C. Other

D. UID

Answer: B

Choose one of the following commands which best displays the statistics for the network

interface.

A. ifstat

B. ifconfig

C. netstat

D. sysstat

Answer: A

Choose one of the following definitions which best represents the function of the cifssetup command.A. It displays the names of all mounted directories on the storage applianceB. It displays the prompts for CIFS configuration informationC. It displays the mount point of all shared directoriesD. It displays a list of the users on the storage applianceAnswer: BCIFS client file access is determined by  if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. The last client to set permissionsC. NT ACLsD. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameAnswer: DUse the NOW site __________ utility, to determine if a problem you are experiencing is knownto NetApp,.A. System Configuration GuideB. Release ComparisonC. EtherealD. Bugs OnlineAnswer: DChoose one of the following commands which you would use to view the connection, ifan NFS client attempts and fails to access a file opened by a CIFS application.A. cifs sessionsB. cifs lookupC. cifs auditD. cifs sharesAnswer: AThe root user is NOT exempt from________ , in Data ONTAP.A. user quotasB. group quotasC. tree quotasD. root quotasAnswer: CCIFS client file access is determined by ___________ , if a qtree security style is UNIX.A. (Not Allowed) A CIFS client cannot access files in a qtree with a security style ofUNIX.B. UNIX permissions, and if the CIFS user name can be mapped to a UNIX user nameC. The last client to set permissionsD. NT ACLsAnswer: BChoose from the following which option should be used with the nfsstat command toassist in decoding export and mountd errors.A. nfsstat -cB. nfsstat -tC. nfsstat -zD. nfsstat -dAnswer: DChoose one of the following commands which is NOT a good command fortroubleshooting connectivity problems from the storage appliance console.A. pingB. ifstatC. iostatD. netdiagAnswer: CChoose one of the following which is NOT part of the UNIX security style.A. GIDB. SIDC. OtherD. UIDAnswer: BChoose one of the following commands which best displays the statistics for the networkinterface.A. ifstatB. ifconfigC. netstatD. sysstatAnswer: A

No comments:

Post a Comment

Leave Your Valuable Opinion