An administrator is setting up SnapMirror SVM replication. One of the source data volumes uses
cloud tiering with the snapshot-only tiering policy.
Which cloud tiering policy is supported on the destination volume?
D
Explanation:
When using SnapMirror SVM replication, the cloud tiering policy on the destination volume must
match the source if tiering is to be preserved. The only supported tiering policy in this context is
snapshot-only, which moves cold Snapshot blocks to cloud tier. This ensures compatibility during
replication.
What are the two modes for Autonomous Ransomware Protection (ARP)? (Choose two.)
A, D
Explanation:
Autonomous Ransomware Protection (ARP) operates in two modes:
● Learning mode: ARP observes and learns baseline workload behaviors to distinguish between
normal and abnormal activity.
● Active mode: ARP actively monitors and can automatically respond to ransomware-like behavior
by alerting or taking protective actions.
You have created a SnapMirror relationship from your production volume serving SMB/CIFS data to
your DR cluster. After two days of updates, you do not see any of the expected snapshots on the
secondary volume.
Why is SnapMirror failing to replicate snapshots?
D
Explanation:
SnapMirror replication is driven by labels that match between the snapshot policy on the source
volume and the SnapMirror policy. If the snapshot policy on the source does not include the correct
SnapMirror label, SnapMirror will not recognize which snapshots to replicate, resulting in no
transfers.
A customer is running NetApp ONTAP 9.14.1 software and asks you to protect some data in a way
that even disk zeroing cannot delete.
Which command enforces the requirement?
A
Explanation:
The SnapLock Compliance mode provides WORM (Write Once, Read Many) protection that is
irrevocable, even by administrators, and not removable by disk zeroing or reinitialization. This
satisfies stringent regulatory and tamper-proof data protection requirements.
You need to upgrade to NetApp ONTAP 9.12.1 software on your source cluster in a SnapMirror
relationship. The source cluster differs from the destination cluster and you want to take advantage
of version-flexible SnapMirror replication.
Which option should you choose?
D
Explanation:
To take advantage of version-flexible SnapMirror (introduced with XDP-type relationships), you must
delete the existing DP-type relationship and create a new one using type XDP. DP-type relationships
do not support version flexibility, which allows the source and destination clusters to run different
ONTAP versions.
After setting up a new cluster peering relationship between a production site and a new DR site, the
customer mentions that the communication for this peer needs to be secured to help deter "man in
the middle" attacks.
What can you do on the NetApp end to secure the existing cluster peering?
C
Explanation:
To secure an existing cluster peering relationship, you can modify it to enable encryption by using the
-encryption-protocol-proposed option. This ensures that intercluster SnapMirror traffic is encrypted,
helping protect against man-in-the-middle attacks.
An administrator wants to automatically prevent volumes that are used in a SnapMirror relationship
from running out of space.
Which of the following volume snapshot autodelete modify parameters would ensure that this goal
can be accomplished?
C
Explanation:
Setting -commitment try on the volume snapshot autodelete modify command allows ONTAP to
automatically delete eligible Snapshot copies when a volume is running low on space, but only if it
can do so without violating SnapMirror or retention policies. This ensures volumes in SnapMirror
relationships stay healthy and do not run out of space unexpectedly.
Which two of the following need to be enabled to use tamper-proof Snapshot copies? (Choose two.)
A, D
Explanation:
To use tamper-proof Snapshot copies (e.g., SnapLock-based WORM Snapshots):
● The Compliance Clock must be initialized to enforce retention periods that cannot be bypassed.
● A NetApp ONTAP One license includes the SnapLock feature, which enables tamper-proof
snapshot functionality.
Your IT company is using NetApp FlexClone on a two node AFF cluster with 20TB of data to rapidly
provision environments for each developer.
Each environment is replicated to an eight node AFF C-Series cluster at a DR site using SnapMirror.
You notice that the environments are consuming significantly more disk space on the destination
cluster than on the source cluster.
In this scenario, which action will minimize the disk usage on the destination cluster?
D
Explanation:
FlexClone volumes are space-efficient on the source cluster because they share blocks with the
parent. However, SnapMirror transfers them as full physical copies by default unless you re-create
them as FlexClone volumes on the DR site.
Enabling FlexClone copies on the destination will preserve their space efficiency and minimize disk
usage on the DR cluster.
A customer wants to enable tamper-proof Snapshot copies on volume LockingVolume, which is
hosted on SVM LockingSVM. They have created the Snapshot policy, including the required retention
set. However, when they apply the policy to a volume, the Snapshot copies are not locked.
Which command must the customer issue before tamper-proof Snapshot copies can be enabled?
D
Explanation:
To enable tamper-proof (locked) Snapshot copies using SnapLock, the SnapLock Compliance Clock
must be initialized on all nodes in the cluster. Without initializing this clock, locked Snapshots cannot
be created, even if the policy and retention settings are configured.