Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the Netapp NCIE-Data Protection NS0-528 Questions and answers with ValidTests

Exam NS0-528 All Questions
Exam NS0-528 Premium Access

View all detail and faqs for the NS0-528 exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is the minimal interface requirement for a SnapMirror relationship between clusters?

Options:

A.

one data LIF per SVM

B.

one cable directly connected to both clusters

C.

one intercluster LIF per node

D.

one intercluster LIF per SVM

Expert Solution
Questions # 12:

Which two NetApp data security solutions can be licensed to help protect against ransomware attacks? (Choose two.)

Options:

A.

Spot Security

B.

Cloud Insights

C.

BlueXP tiering

D.

ONTAP One

Expert Solution
Questions # 13:

Your customer wants to set up a local retention time of at least four months. They also want to protect a week of retention from being deleted by ransomware or rogue administrators.

Which two settings create the correct Snapshot policy to achieve this? (Choose two.)

Options:

A.

Enable Autonomous Ransomware Protection (ARP) on the volume.

B.

Create a Snapshot policy with the weekly Snapshot copy retention time set to 122 days.

C.

Create a Snapshot policy with the maximum daily snapshots set to 122.

D.

Set the SnapLock retention period for the daily Snapshot copies to 7 days.

Expert Solution
Questions # 14:

You are tasked with planning a backup solution for a VMware environment running Windows VM. There is a requirement that production datastores must have ten days of local backups and a daily replication to a DR cluster site. The development datastores require only 7 days of local backups. There is also a requirement for a tool for the VMware administrators that enables them to monitor backups and perform restores.

What procedure can you use to meet the requirements?

Options:

A.

Deploy the NetApp SnapCenter Plug-In for Microsoft Windows from vCenter, create policies for production and development, and create resource groups for the production and development datastores.

B.

Install the NetApp SnapCenter Server from the GUI, create policies for production and development, and create resource groups for the production and development datastores.

C.

Deploy the NetApp SnapCenter Plug-In for VMware vSphere from vCenter, create policies for production and development, and create resource groups for the production and development datastores.

D.

In NetApp ONTAP System Manager, create Snapshot policies for production and development datastore volumes, and create a protection relationship for each production volume.

Expert Solution
Questions # 15:

An administrator is deploying NetApp BlueXP backup and recovery for VMs to protect both Windows and Linux systems. The site has two instances of VMware Cloud on AWS that need to be backed up.

How will this goal be accomplished? (Choose two.)

Options:

A.

Pair each instance of VMware Cloud on AWS with a unique instance of BlueXP backup and recovery.

B.

Deploy one instance of BlueXP backup and recovery on a single Linux VM.

C.

Pair both instances of VMware Cloud on AWS to a single instance of BlueXP backup and recovery.

D.

Deploy two instances of BlueXP backup and recovery on separate Linux VMs.

Expert Solution
Questions # 16:

What are the two modes for Autonomous Ransomware Protection (ARP)? (Choose two.)

Options:

A.

active

B.

listening

C.

passive

D.

learning

Expert Solution
Questions # 17:

As the administrator of a NetApp cluster with multi-admin approval enabled for volume deletes, you have been tasked with deleting a volume. No other administrator is available to approve this request.

What do you need to do to disable multi-admin approval?

Options:

A.

Multi-admin approval cannot be disabled

B.

Open a NetApp support case

C.

Use volume delete -force true command

D.

Click the Enabled toggle button in ONTAP System Manager

Expert Solution
Questions # 18:

After setting up a new cluster peering relationship between a production site and a new DR site, the customer mentions that the communication for this peer needs to be secured to help deter "man in the middle" attacks.

What can you do on the NetApp end to secure the existing cluster peering?

Options:

A.

Modify the firewall policy settings on the Intercluster LIFs.

B.

Enable aggregate level encryption.

C.

Modify the relationship using -encryption-protocol-proposed.

D.

Enable IPsec between the sites.

Expert Solution
Questions # 19:

Your customer set up a SnapMirror synchronous relationship between two sites. They want to convert it to a SnapMirror active sync configuration for availability reasons.

What action must you take before you convert this relationship?

Options:

A.

Change the SnapMirror policy to Continuous.

B.

Destroy all volumes in the destination SVM.

C.

Unmap all LUNs on the destination volumes.

D.

Stop the destination SVM that is hosting the LUNs.

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions