Your success in Network Appliance NS0-157 is our sole target and we develop all our NS0-157 braindumps in a way that facilitates the attainment of this target. Not only is our NS0-157 study material the best you can find, it is also the most detailed and the most updated. NS0-157 Practice Exams for Network Appliance NS0-157 are written to the highest standards of technical accuracy.

Q57. - (Topic 1) 

Which hidden directory points to a Snapshot copy from a NFS client? 

A. %snapshot 

B. .snap 

C. .snapshot 

D. /snapshot 

Answer:

Explanation: This command rename the hidden .snapshot directory in every directory in the current volume. Reference:https://support.f5.com/kb/en-us/products/arx/manuals/product/arx-cli-maintenance-6-3-0/snapshot.html 


Q58. - (Topic 2) 

Which storage system combination is supported in a 4-node cluster? 

A. A pair of FAS3270s and a pair of FAS3020s 

B. A pair of FAS3270s with a FAS3240 and a FAS6240 

C. A pair of FAS6280s and a pair of E7900s 

D. A pair of FAS6280s and a pair of FAS3240s 

Answer:

Explanation: 

http://www.slideshare.net/netapp/ar-scinetappontap811scaleoutv016-copy (See page 3, 4) 


Q59. - (Topic 2) 

Which two actions protect an Infinite volume from the loss of a namespace constituent? (Choose two) 

A. Minor the namespace constituent by using an intracluster data protection mirror 

B. Mirror the namespace constituent by using an Intercluster data protection mirror 

C. Mirror the namespace constituent by using a load-sharing mirror 

D. Mirror the namespace constituent by using a FlexCache mirror 

Answer: B,C 


Q60. - (Topic 2) 

Which of the following steps must be completed before a CIFS share can be active? 

A. Configure name mapping 

B. License both NFS and CIFS 

C. Create a data LIF for the CIFS server on every node 

D. Reboot the node containing the CIFS Vserver root volume 

Answer:


Q61. - (Topic 3) 

Which two actions protect an Infinite volume from the loss of a namespace constituent? (Choose two) 

A. Minor the namespace constituent by using an intracluster data protection mirror 

B. Mirror the namespace constituent by using an Intercluster data protection mirror 

C. Mirror the namespace constituent by using a load-sharing mirror 

D. Mirror the namespace constituent by using a FlexCache mirror 

Answer: B,C 

Explanation: http://www.globbtv.com/microsite/18/Adjuntos/_TR-4078_INFINITEVOLUME_BPG.PDF 


Q62. - (Topic 3) 

For RAID-DP aggregates created with clustered Data ONTAP 8.2 or later, what is the default minimum number of disks? 

A. 1 

B. 2 

C. 3 

D. 4 

E. 5 

F. 6 

G. 10 

Answer:

Explanation: 

https://library.netapp.com/ecm/ecm_download_file/ECMP1196912 


Q63. - (Topic 3) 

Within clustered Data ONTAP 8.2 or later, which two functionalities are supported with an external asynchronous FPolicy server? (Choose two) 

A. Audit logging 

B. Compression and decompression services 

C. Encryption and decryption services 

D. File Access 

E. Hierarchical storage management 

Answer: A,D 

Explanation: 

https://library.netapp.com/ecmdocs/ECMP1196817/html/vserver/fpolicy/policy/external-engine/create.html 


Q64. - (Topic 1) 

What communication link is necessary in order to establish an inter-cluster relationship? 

A. The cluster interface on each node must be able to communicate with the intercluster interface on each node in the both the source and destination clusters 

B. The cluster interface on the source cluster must be able to communicate with the cluster interface on the destination cluster 

C. The intercluster interface on the source cluster must be able to communicate with the intercluster interface on the destination cluster 

D. The intercluster interface on the source cluster must be able to communicate with the cluster interface on the destination cluster 

Answer:

Explanation: 

https://library.netapp.com/ecm/ecm_download_file/ECMP1197114