NetApp ns0-528 practice test

Exam Title: Implementation Engineer - Data Protection Exam

Last update: Nov 27 ,2025
Question 1

An administrator is setting up SnapMirror SVM replication. One of the source data volumes uses
cloud tiering with the snapshot-only tiering policy.
Which cloud tiering policy is supported on the destination volume?

  • A. none
  • B. auto
  • C. all
  • D. snapshot-only
Answer:

D


Explanation:
When using SnapMirror SVM replication, the cloud tiering policy on the destination volume must
match the source if tiering is to be preserved. The only supported tiering policy in this context is
snapshot-only, which moves cold Snapshot blocks to cloud tier. This ensures compatibility during
replication.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

What are the two modes for Autonomous Ransomware Protection (ARP)? (Choose two.)

  • A. active
  • B. listening
  • C. passive
  • D. learning
Answer:

A, D


Explanation:
Autonomous Ransomware Protection (ARP) operates in two modes:
● Learning mode: ARP observes and learns baseline workload behaviors to distinguish between
normal and abnormal activity.
● Active mode: ARP actively monitors and can automatically respond to ransomware-like behavior
by alerting or taking protective actions.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

You have created a SnapMirror relationship from your production volume serving SMB/CIFS data to
your DR cluster. After two days of updates, you do not see any of the expected snapshots on the
secondary volume.
Why is SnapMirror failing to replicate snapshots?

  • A. The SnapMirror label is missing from the SnapMirror policy on the secondary volume.
  • B. SnapMirror is not properly licensed.
  • C. SVM peering is not properly configured.
  • D. The SnapMirror label is missing from the snapshot policy on the secondary volume.
Answer:

D


Explanation:
SnapMirror replication is driven by labels that match between the snapshot policy on the source
volume and the SnapMirror policy. If the snapshot policy on the source does not include the correct
SnapMirror label, SnapMirror will not recognize which snapshots to replicate, resulting in no
transfers.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

A customer is running NetApp ONTAP 9.14.1 software and asks you to protect some data in a way
that even disk zeroing cannot delete.
Which command enforces the requirement?

  • A. volume create -snaplock-type compliance
  • B. volume create -snaplock-type enterprise
  • C. aggregate create -snaplock-type compliance
  • D. aggregate create -snaplock-type enterprise
Answer:

A


Explanation:
The SnapLock Compliance mode provides WORM (Write Once, Read Many) protection that is
irrevocable, even by administrators, and not removable by disk zeroing or reinitialization. This
satisfies stringent regulatory and tamper-proof data protection requirements.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

You need to upgrade to NetApp ONTAP 9.12.1 software on your source cluster in a SnapMirror
relationship. The source cluster differs from the destination cluster and you want to take advantage
of version-flexible SnapMirror replication.
Which option should you choose?

  • A. SnapMirror automatically converts existing DP-type relationships to XDP-type relationships.
  • B. Run the command snapmirror resync and set the type to XDP.
  • C. Delete the XDP-type relationship and create a new DP-type relationship.
  • D. Delete the DP-type relationship and create a new XDP-type relationship.
Answer:

D


Explanation:
To take advantage of version-flexible SnapMirror (introduced with XDP-type relationships), you must
delete the existing DP-type relationship and create a new one using type XDP. DP-type relationships
do not support version flexibility, which allows the source and destination clusters to run different
ONTAP versions.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

After setting up a new cluster peering relationship between a production site and a new DR site, the
customer mentions that the communication for this peer needs to be secured to help deter "man in
the middle" attacks.
What can you do on the NetApp end to secure the existing cluster peering?

  • A. Modify the firewall policy settings on the Intercluster LIFs.
  • B. Enable aggregate level encryption.
  • C. Modify the relationship using -encryption-protocol-proposed.
  • D. Enable IPsec between the sites.
Answer:

C


Explanation:
To secure an existing cluster peering relationship, you can modify it to enable encryption by using the
-encryption-protocol-proposed option. This ensures that intercluster SnapMirror traffic is encrypted,
helping protect against man-in-the-middle attacks.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

An administrator wants to automatically prevent volumes that are used in a SnapMirror relationship
from running out of space.
Which of the following volume snapshot autodelete modify parameters would ensure that this goal
can be accomplished?

  • A. -defer-delete scheduled
  • B. -commitment disrupt
  • C. -commitment try
  • D. -defer-delete user_created
Answer:

C


Explanation:
Setting -commitment try on the volume snapshot autodelete modify command allows ONTAP to
automatically delete eligible Snapshot copies when a volume is running low on space, but only if it
can do so without violating SnapMirror or retention policies. This ensures volumes in SnapMirror
relationships stay healthy and do not run out of space unexpectedly.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which two of the following need to be enabled to use tamper-proof Snapshot copies? (Choose two.)

  • A. Compliance Clock
  • B. three NTP servers
  • C. SnapRestore license
  • D. NetApp ONTAP One license
Answer:

A, D


Explanation:
To use tamper-proof Snapshot copies (e.g., SnapLock-based WORM Snapshots):
● The Compliance Clock must be initialized to enforce retention periods that cannot be bypassed.
● A NetApp ONTAP One license includes the SnapLock feature, which enables tamper-proof
snapshot functionality.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Your IT company is using NetApp FlexClone on a two node AFF cluster with 20TB of data to rapidly
provision environments for each developer.
Each environment is replicated to an eight node AFF C-Series cluster at a DR site using SnapMirror.
You notice that the environments are consuming significantly more disk space on the destination
cluster than on the source cluster.
In this scenario, which action will minimize the disk usage on the destination cluster?

  • A. Consolidate the SnapMirror destination volumes onto a single aggregate.
  • B. Distribute the SnapMirror destination volumes evenly across the available aggregates.
  • C. Enable SnapMirror network compression.
  • D. Enable Flexclone copies on the DR side.
Answer:

D


Explanation:
FlexClone volumes are space-efficient on the source cluster because they share blocks with the
parent. However, SnapMirror transfers them as full physical copies by default unless you re-create
them as FlexClone volumes on the DR site.
Enabling FlexClone copies on the destination will preserve their space efficiency and minimize disk
usage on the DR cluster.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

A customer wants to enable tamper-proof Snapshot copies on volume LockingVolume, which is
hosted on SVM LockingSVM. They have created the Snapshot policy, including the required retention
set. However, when they apply the policy to a volume, the Snapshot copies are not locked.
Which command must the customer issue before tamper-proof Snapshot copies can be enabled?

  • A. volume modify -volume LockingVolume -anti-ransomware-state enable
  • B. volume modify -volume LockingVolume -snapdir-access false
  • C. snaplock event-retention apply -vserver LockingSVM
  • D. snaplock compliance-clock initialize -node *
Answer:

D


Explanation:
To enable tamper-proof (locked) Snapshot copies using SnapLock, the SnapLock Compliance Clock
must be initialized on all nodes in the cluster. Without initializing this clock, locked Snapshots cannot
be created, even if the policy and retention settings are configured.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 6
Viewing questions 1-10 out of 64
Go To
page 2