Wait, is there a 'Peer Relationship for Dummies' book I can read before this exam? I'm still trying to figure out how many sysadmins it takes to screw in an ONTAP cluster...
C is definitely true too. Peering encryption can't be enabled until the authentication is set up first. Wouldn't want any unauthorized clusters peeking in on my data!
I think B is also true. LDAP users and groups can be used to configure the peering authentication, right? Gotta love all these ONTAP authentication options!
A and D seem like the correct answers here. The cluster peer show command is definitely the way to verify the peering status, and using an ONTAP generated passphrase is a common way to authenticate the peering.
Moon
13 days agoJustine
25 days agoMalcolm
3 days agoKate
14 days agoSarah
27 days agoFrancine
5 days agoLouis
6 days agoArgelia
27 days agoMitsue
28 days agoJade
1 months agoTanesha
1 months agoXuan
1 months agoFletcher
6 days agoCherelle
19 days agoLuisa
27 days agoShelia
1 months ago