Assessment Test Flashcards

1
Q

Q1. Which volume security style is typically used with NFS clients

Unix
Linux
NFS
mixed

A

Unix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q2 : which volume security style is typically used with SMB clients?

Windows
SMB
mixed
NTFS

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q3: which statement is true concerning storage virtual machine (sVM) root volumes?

SVM root volumes should never contain user data
Storage VM root volumes should always contain user data
Storage VM root volumes should be created on every node in the cluster
Storage VM root volumes can be moved to other storage VMs nondisruptively

A

SVM root volumes should never contain user data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q4 : which export policy security type should be used to enable you to access to the volume only as an anonymous user?

any
All
None
Anon

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q5: Which tow name services are valid to convert host names to IP addresses? (Choose two)

files
Network Information Services (NIS)
Kerberos 5
DNS
Lightweight Directory Access Protocol (LDAP)

A

Files, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q6: A volume with read and write access has been properly mounted on a Linux client. When you try to write to a file, you are denied. What would cause this condition? (Choose two).

Export Policy that is set only for read-only access
Client identifier format
UNIX file permissions
File access protocol setting
Security Type

A

Export Policy that is set only for read-only access.
Unix file permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q7: Why might a system administrator be unable to see a share that ends with a $ in File explorer?

The system administrator is not logged into the cluster as an administrator
$ is a hidden share
The volume has not been exported
The share must be created first

A

$ is a hidden share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q8: On a share, a user is provided with the share-permission change. The owner of a certain file in the share has provided read access to users. What are the user’s permissions?

The user can make modifications to the file.
The user cannot access the file.
The user can only read the file.

A

The user can only read the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q9: When a user is authenticated in a domain, what is the user given as a unique identifier?

Session identification (SID)
SMB share identifier (SSID)
CIFS share identifier (CSID)
Security identifier (SID)

A

Security Identifier (SID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q10: Which two values can a NAS client use to access a resource? (Choose two)

DNS host name
Host name
LDAP server IP address
IP address of the data LIF
DSN ip address

A

Host name, IP address of the data LIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q11: A NAS client connects to a volume that is on the same node as the LIF that it is accessing. The administrator moves the volume to an aggregate on a different node, to improve performance.

True or False: The client requires a remount at the new location

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q12: Which two methods can you use to load-balance access to multiple data LIFs in an SVM? (Choose two).

Indirect
Direct
On-box
Off-box (an “A” record)

A

Onbox, offbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly