Network Appliance NetworkApplianceNACACertification NS0-120
試験番号: NS0-120
試験の名称: Data ONTAP Advanced Exam
バージョン:V8.02
問題と解答:90 Q&As
価格(日本円): \ 5900.00 JPY
更新:2010-07-13
1.Which of the following commands adds the share "netapp" to the /vol/vol2/home directory?
A.cifs shares dd netapp /vol/vol2/home cifs shares ?dd netapp /vol/vol2/home
B.cifs shares dd /vol/vol2/home/netapp cifs shares ?dd /vol/vol2/home/netapp
C.cifs shares dd netapp /vol/vol2 cifs shares ?dd netapp /vol/vol2
D.None of the above
Answer:A
2.Which of the following definitions best represents the function of the cifs setup command?
A.Displays the mount point of all shared directories
B.Displays the names of all mounted directories on the storage appliance
C.Displays the prompts for CIFS configuration information
D.Displays a list of the users on the storage appliance
Answer:C
3.Which one of the following commands is NOT a good command for troubleshooting connectivity
problems from the storage appliance console?
A.ping
B.ifstat
C.netdiag
D.iostat
Answer:D
4.If an NFS client attempts and fails to access a file opened by a CIFS application, which of the following
commands would you use to view the connection?
A.cifs audit
B.cifs sessions
C.cifs shares
D.cifs lookup
Answer:B
5.Which one of the following commands best displays the statistics for the network interface?
A.netstat
B.ifconfig
C.sysstat
D.ifstat
Answer:D
6.Which option should be used with the nfsstat command to assist in decoding export and mountd errors?
A.nfsstat -d
B.nfsstat -z
C.nfsstat -c
D.nfsstat -t
Answer:A
7.Which one of the following commands would you use to set up the network interface?
A.ifstat
B.ping
C.ifconfig
D.traceroute
Answer:C
8.If a qtree security style is UNIX, CIFS client file access is determined by ___________ .
A.NT ACLs
B.UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C.The last client to set permissions
D.(Not Allowed) A CIFS client cannot access files in a qtree with a security style of UNIX.
Answer:B
9.If the client is a CIFS client, locks are __________.
A.Advisory
B.Mandatory
C.Ordered
D.Optional
Answer:B
10.Which option of the exportfs command will temporarily export a resource while ignoring the options
specified in the /etc/exports file?
A.exportfs exportfs ?
B.exportfs -i
Answer:B
11.Which of the following statements would NOT apply to an entry in the /etc/exports file regarding
exporting directories, qtrees, and volumes?
A.Export each volume separately.
B.The storage appliance must resolve host names.
C.Export ancestors and their descendants.
D.Export /vol.
Answer:D
12.Which one of the following is NOT part of the UNIX security style?
A.GID
B.Other
C.SID
D.UID
Answer:C
13.NTFS allows file access based on ___________.
A.NT ACLs and UNIX permissions
B.SID and password
C.NT ACLs and SID
D.UNIX permissions
Answer:C
試験番号: NS0-120
試験の名称: Data ONTAP Advanced Exam
バージョン:V8.02
問題と解答:90 Q&As
価格(日本円): \ 5900.00 JPY
更新:2010-07-13
1.Which of the following commands adds the share "netapp" to the /vol/vol2/home directory?
A.cifs shares dd netapp /vol/vol2/home cifs shares ?dd netapp /vol/vol2/home
B.cifs shares dd /vol/vol2/home/netapp cifs shares ?dd /vol/vol2/home/netapp
C.cifs shares dd netapp /vol/vol2 cifs shares ?dd netapp /vol/vol2
D.None of the above
Answer:A
2.Which of the following definitions best represents the function of the cifs setup command?
A.Displays the mount point of all shared directories
B.Displays the names of all mounted directories on the storage appliance
C.Displays the prompts for CIFS configuration information
D.Displays a list of the users on the storage appliance
Answer:C
3.Which one of the following commands is NOT a good command for troubleshooting connectivity
problems from the storage appliance console?
A.ping
B.ifstat
C.netdiag
D.iostat
Answer:D
4.If an NFS client attempts and fails to access a file opened by a CIFS application, which of the following
commands would you use to view the connection?
A.cifs audit
B.cifs sessions
C.cifs shares
D.cifs lookup
Answer:B
5.Which one of the following commands best displays the statistics for the network interface?
A.netstat
B.ifconfig
C.sysstat
D.ifstat
Answer:D
6.Which option should be used with the nfsstat command to assist in decoding export and mountd errors?
A.nfsstat -d
B.nfsstat -z
C.nfsstat -c
D.nfsstat -t
Answer:A
7.Which one of the following commands would you use to set up the network interface?
A.ifstat
B.ping
C.ifconfig
D.traceroute
Answer:C
8.If a qtree security style is UNIX, CIFS client file access is determined by ___________ .
A.NT ACLs
B.UNIX permissions, and if the CIFS user name can be mapped to a UNIX user name
C.The last client to set permissions
D.(Not Allowed) A CIFS client cannot access files in a qtree with a security style of UNIX.
Answer:B
9.If the client is a CIFS client, locks are __________.
A.Advisory
B.Mandatory
C.Ordered
D.Optional
Answer:B
10.Which option of the exportfs command will temporarily export a resource while ignoring the options
specified in the /etc/exports file?
A.exportfs exportfs ?
B.exportfs -i
Answer:B
11.Which of the following statements would NOT apply to an entry in the /etc/exports file regarding
exporting directories, qtrees, and volumes?
A.Export each volume separately.
B.The storage appliance must resolve host names.
C.Export ancestors and their descendants.
D.Export /vol.
Answer:D
12.Which one of the following is NOT part of the UNIX security style?
A.GID
B.Other
C.SID
D.UID
Answer:C
13.NTFS allows file access based on ___________.
A.NT ACLs and UNIX permissions
B.SID and password
C.NT ACLs and SID
D.UNIX permissions
Answer:C
※コメント投稿者のブログIDはブログ作成者のみに通知されます