For security reasons, you must track the access of files of a specific folder.
In this scenario, what should you do to accomplish this task from the storage side?
A. Implement a Vscan solution.
B. Use a cron job to save the audit log.
C. Use role-based access control to track access.
D. Implement an FPolicy solution.
When you replace a motherboard, which step will completely test the newly installed component?
A. From ONTAP, execute sldiag.
B. From the LOADER prompt, type boot_ontap maint, then execute sldiag.
C. From the LOADER prompt, type boot_diags, then execute sldiag.
D. From the LOADER prompt, execute sldiag.
What are two conditions that would cause writes in memory to be written to disk? (Choose two.)
A. The NVRAM (NVLog) fills up.
B. A user presses "Save".
C. Drive capacity becomes available.
D. A Snapshot copy is taken.
In the AFF A200 shown in the exhibit, which port is a CNA port?
A. |0|0|
B. e0c/0c
C. e0a
D. 0a
A customer receives the message shown below in their EMS logs.
Tue Jun 27 18:34:18 CEST [netapp-ct1: cp_worker: wafl.cp.toolong:error]: Aggregate AG1_NTAP_PROD experienced a long CP. Tue Jun 27 18:37:10 CEST
Which two data sources do you use to explain this message? (Choose two.)
A. ONTAP System Manager
B. Performance Archive
C. Active IQ Unified Manager
D. mgwd.log
You want to use the supported method to upgrade the ONTAP version of a Cloud Volumes ONTAP instance from ONTAP 9.5 to ONTAP 9.6.
In this scenario, which NetApp tool accomplishes this task?
A. Cloud Manager
B. Cloud Insights
C. Active IQ Unified Manager
D. ONTAP System Manager
Which NetApp HCI component communicates with activeiq.solidfire.com and the Cloud Data Services portal?
A. the NetApp Element software vSphere plug-in
B. the management node (mNode)
C. the NetApp Trident software
D. the NetApp Element software Management Interface
Several clients are accessing an ONTAP SnapMirror DP destination volume. Some clients frequently access the newest SnapMirror volume data. Accessing this data is much slower when compared to clients that directly access data on the source. You use the wafl scan status command against the destination.
What is a symptom of the problem in this scenario?
A. blocks used summary update
B. active bitmap rearrangement
C. container block reclamation
D. volume deswizzling
A customer has reported an unexplained reboot of an ONTAP node that did not generate a panic string or a core file.
In this scenario, which two sets of logs do you collect to further diagnosis the issue? (Choose two.)
A. system core
B. sp status
C. events all
D. sp status -d
You perform a security trace when troubleshooting a data access problem for a user. The results are shown in the exhibit.
What should you do to solve this issue?
A. Grant the user Read Attributes access to the path.
B. Add the user to the BUILTIN\power Users group.
C. Add the user to the BUILTIN\Users group.
D. Grant the user Execute access to the path.