Assessment Test Flashcards
Q1. Which volume security style is typically used with NFS clients
Unix
Linux
NFS
mixed
Unix
Q2 : which volume security style is typically used with SMB clients?
Windows
SMB
mixed
NTFS
NTFS
Q3: which statement is true concerning storage virtual machine (sVM) root volumes?
SVM root volumes should never contain user data
Storage VM root volumes should always contain user data
Storage VM root volumes should be created on every node in the cluster
Storage VM root volumes can be moved to other storage VMs nondisruptively
SVM root volumes should never contain user data
Q4 : which export policy security type should be used to enable you to access to the volume only as an anonymous user?
any
All
None
Anon
Q5: Which tow name services are valid to convert host names to IP addresses? (Choose two)
files
Network Information Services (NIS)
Kerberos 5
DNS
Lightweight Directory Access Protocol (LDAP)
Files, DNS
Q6: A volume with read and write access has been properly mounted on a Linux client. When you try to write to a file, you are denied. What would cause this condition? (Choose two).
Export Policy that is set only for read-only access
Client identifier format
UNIX file permissions
File access protocol setting
Security Type
Export Policy that is set only for read-only access.
Unix file permissions
Q7: Why might a system administrator be unable to see a share that ends with a $ in File explorer?
The system administrator is not logged into the cluster as an administrator
$ is a hidden share
The volume has not been exported
The share must be created first
$ is a hidden share
Q8: On a share, a user is provided with the share-permission change. The owner of a certain file in the share has provided read access to users. What are the user’s permissions?
The user can make modifications to the file.
The user cannot access the file.
The user can only read the file.
The user can only read the file
Q9: When a user is authenticated in a domain, what is the user given as a unique identifier?
Session identification (SID)
SMB share identifier (SSID)
CIFS share identifier (CSID)
Security identifier (SID)
Security Identifier (SID)
Q10: Which two values can a NAS client use to access a resource? (Choose two)
DNS host name
Host name
LDAP server IP address
IP address of the data LIF
DSN ip address
Host name, IP address of the data LIF
Q11: A NAS client connects to a volume that is on the same node as the LIF that it is accessing. The administrator moves the volume to an aggregate on a different node, to improve performance.
True or False: The client requires a remount at the new location
False
Q12: Which two methods can you use to load-balance access to multiple data LIFs in an SVM? (Choose two).
Indirect
Direct
On-box
Off-box (an “A” record)
Onbox, offbox