Which two NetApp data security solutions can be licensed to help protect against ransomware attacks? (Choose two.)
Which two NetApp features would help you to recover from a file share that was encrypted by a ransomware event? (Choose two.)
An administrator is setting up SnapMirror SVM replication. One of the source data volumes uses cloud tiering with the snapshot-only tiering policy.
Which cloud tiering policy is supported on the destination volume?
A client is planning to configure a SnapMirror relationship between two sites. Normally their ISP provides network throughput of 100 Mbps; however, they can arrange to have this burst to 1 Gbps for a period of time at an additional cost.
Their intention is to back up 400 GB of Snapshot data each day using the burst option to keep the replication time to a minimum.
In this scenario, how much burst time do they need to purchase?
An ONTAP administrator is trying to configure a three-way-disaster recovery solution. Cluster 2 is within 50 km of Cluster 1, the primary cluster, with an RTT of 7 ms. Cluster 3 is over 300 km from Cluster 1 with an RTT of 29 ms.
In this scenario, what are two topologies that would accomplish this task? (Choose two.)
Enter your email address to download NetworkAppliance.NS0-528.v2025-12-05.q90 Dumps