You have configured SVM Disaster Recovery on your cluster, and you set the identity-preserve option to
false.
In this scenario, which objects are replicated?
A. SAN LIFs
B. NFS Export policies
C. DNS and DNS hosts
D. Snapshot copies
Which two performance threshold policies in OnCommand Unified Manager are configurable? (Choose two.)
A. user-defined
B. volume
C. system-defined
D. dynamic
Two 100 GB space-reserved LUNs and one 100 GB non-space-reserved LUN were created in System
Manager in a 1 TB volume.
In this scenario, how much space has been allocated for writes to the three LUNs?
A. 1 TB
B. 300 GB
C. 100 GB
D. 200 GB
An administrator is configuring a third-party software for NDMP. The application is targeting the IP of the data LIF of the SVM called "SVM1". NDMP is configured as the SVM scope. The NDMP service is not enabled for the admin SVM. SVM1 has a user called "Tom" with the backup role. Tom can connect by using SSH to the controller with the credentials that he used to configure the third-party software. The authentication of the third-party software is failing. In this scenario, what is the reason for the authentication failure?
A. The NDMP password has not been generated for Tom.
B. The application is not targeting the IP of the cluster or node management LIF.
C. The NDMP service is not enabled for the admin SVM.
D. The user Tom does not belong to the admin SVM.
A storage administrator wants to convert a switchless cluster to a switched cluster. You need to determine
which switches are supported in ONTAP 9.3.
In this scenario, which tool would satisfy the requirement?
A. Config Advisor
B. Hardware Universe
C. OnCommand System Manager
D. OnCommand Unified Manager
You have a volume storing a large number of 1KB to 2KB compressed zip files. In this scenario, which storage efficiency feature should you use?
A. data compaction
B. secondary compression
C. adaptive compression
D. deduplication
What are two client specifications for an export rule? (Choose two.)
A. 192.168.100.0/16
B. 192.168.100.0/0
C. 0.0.0.0/16
D. 0.0.0.0/0
You must create separate SVMs that are based on teams. You also need to create separate SVMs that
are based on the block-level and file-level protocols. Your DevOps team requests NFS and CIFS protocols,
your AI team requests NFS and NVMe protocols, and your marketing team requests SMB and iSCSI
protocols.
In this scenario, what is the minimum number of SVMs that you must create to satisfy these requirements?
A. 3
B. 5
C. 6
D. 4
What is the purpose of Epsilon?
A. to monitor cluster health
B. to be used as a load-balancer for a 2-node cluster
C. to evaluate the differences in node configurations
D. to be used as a tie-breaker for a cluster quorum
If an SVM is renamed and it is participating in an intercluster SVM peer relationship, what is the result?
A. SVM peers are removed and they need to be re-created.
B. Snapshot copies are renamed with the new SVM unique identifier.
C. SnapMirror relationships appear as broken and a resync is required.
D. Remote clusters are updated with the new peer SVM name.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only NetApp exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your NS0-160 exam preparations and NetApp certification application, do not hesitate to visit our Vcedump.com to find your solutions here.